>>> kops: Building testing/kops 1.28.4-r4 (using abuild 3.13.0-r3) started Tue, 11 Jun 2024 09:15:14 +0000 >>> kops: Checking sanity of /home/buildozer/aports/testing/kops/APKBUILD... >>> kops: Analyzing dependencies... >>> kops: Installing for build: build-base kubernetes go bash (1/5) Installing kubernetes (1.30.1-r0) (2/5) Installing go (1.22.4-r1) (3/5) Installing readline (8.2.10-r0) (4/5) Installing bash (5.2.26-r0) Executing bash-5.2.26-r0.post-install (5/5) Installing .makedepends-kops (20240611.091516) Executing busybox-1.36.1-r31.trigger OK: 562 MiB in 112 packages >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Cleaning up tmpdir >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 47 32.7M 47 15.6M 0 0 30.6M 0 0:00:01 --:--:-- 0:00:01 30.6M 100 32.7M 100 32.7M 0 0 41.3M 0 --:--:-- --:--:-- --:--:-- 41.3M >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz >>> kops: Checking sha512sums... kops-1.28.4.tar.gz: OK >>> kops: Unpacking /var/cache/distfiles/edge/kops-1.28.4.tar.gz... fatal: not a git repository (or any of the parent directories): .git mkdir -p /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64 GOOS=linux GOARCH=amd64 go build "-trimpath" -o /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64/kops -ldflags=all=" -X k8s.io/kops.Version=1.28.4 -X k8s.io/kops.GitVersion=" k8s.io/kops/cmd/kops go: downloading github.com/spf13/viper v1.16.0 go: downloading github.com/aws/aws-sdk-go v1.49.24 go: downloading github.com/aws/amazon-ec2-instance-selector/v2 v2.4.1 go: downloading golang.org/x/crypto v0.14.0 go: downloading github.com/google/go-containerregistry v0.16.1 go: downloading go.uber.org/multierr v1.11.0 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading k8s.io/apimachinery v0.28.1 go: downloading helm.sh/helm/v3 v3.12.3 go: downloading github.com/spf13/cobra v1.7.0 go: downloading github.com/spf13/pflag v1.0.5 go: downloading k8s.io/api v0.28.1 go: downloading k8s.io/cli-runtime v0.28.1 go: downloading k8s.io/klog/v2 v2.100.1 go: downloading k8s.io/client-go v0.28.1 go: downloading k8s.io/kubectl v0.28.1 go: downloading sigs.k8s.io/yaml v1.3.0 go: downloading k8s.io/klog v1.0.0 go: downloading github.com/cert-manager/cert-manager v1.12.3 go: downloading golang.org/x/net v0.17.0 go: downloading github.com/MakeNowJust/heredoc/v2 v2.0.1 go: downloading github.com/Masterminds/sprig/v3 v3.2.3 go: downloading github.com/scaleway/scaleway-sdk-go v1.0.0-beta.20.0.20230829075301-d16b548612e4 go: downloading github.com/MakeNowJust/heredoc v1.0.0 go: downloading golang.org/x/sync v0.3.0 go: downloading k8s.io/cloud-provider-aws v1.28.1 go: downloading github.com/apparentlymart/go-cidr v1.1.0 go: downloading github.com/Azure/azure-pipeline-go v0.2.3 go: downloading github.com/Azure/azure-storage-blob-go v0.15.0 go: downloading github.com/go-ini/ini v1.67.0 go: downloading github.com/gophercloud/gophercloud v1.6.0 go: downloading github.com/pkg/sftp v1.13.6 go: downloading golang.org/x/oauth2 v0.11.0 go: downloading google.golang.org/api v0.138.0 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/fsnotify/fsnotify v1.6.0 go: downloading github.com/mitchellh/mapstructure v1.5.0 go: downloading github.com/spf13/afero v1.9.5 go: downloading github.com/spf13/cast v1.5.1 go: downloading github.com/spf13/jwalterweatherman v1.1.0 go: downloading github.com/go-logr/logr v1.2.4 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 go: downloading github.com/imdario/mergo v0.3.15 go: downloading github.com/evanphx/json-patch v5.6.0+incompatible go: downloading github.com/google/uuid v1.3.1 go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/docker/cli v24.0.5+incompatible go: downloading github.com/pelletier/go-toml v1.9.5 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading github.com/google/gofuzz v1.2.0 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.3.0 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 go: downloading github.com/sergi/go-diff v1.3.1 go: downloading github.com/digitalocean/godo v1.102.1 go: downloading github.com/hetznercloud/hcloud-go v1.50.0 go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible go: downloading github.com/Azure/go-autorest/autorest v0.11.29 go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.12 go: downloading k8s.io/mount-utils v0.28.1 go: downloading github.com/Masterminds/goutils v1.1.1 go: downloading github.com/Masterminds/semver/v3 v3.2.1 go: downloading github.com/huandu/xstrings v1.4.0 go: downloading github.com/mitchellh/copystructure v1.2.0 go: downloading github.com/shopspring/decimal v1.3.1 go: downloading github.com/pkg/errors v0.9.1 go: downloading github.com/Azure/go-autorest v14.2.0+incompatible go: downloading golang.org/x/sys v0.13.0 go: downloading github.com/chai2010/gettext-go v1.0.2 go: downloading github.com/mitchellh/go-wordwrap v1.0.1 go: downloading github.com/russross/blackfriday/v2 v2.1.0 go: downloading golang.org/x/term v0.13.0 go: downloading google.golang.org/grpc v1.57.0 go: downloading github.com/spotinst/spotinst-sdk-go v1.145.0 go: downloading gopkg.in/square/go-jose.v2 v2.6.0 go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 go: downloading golang.org/x/exp v0.0.0-20230817173708-d852ddb80c63 go: downloading github.com/mattn/go-ieproxy v0.0.1 go: downloading gopkg.in/gcfg.v1 v1.2.3 go: downloading k8s.io/cloud-provider v0.28.0 go: downloading k8s.io/component-base v0.28.1 go: downloading k8s.io/csi-translation-lib v0.28.0 go: downloading github.com/kr/fs v0.1.0 go: downloading github.com/hashicorp/hcl v1.0.0 go: downloading github.com/pelletier/go-toml/v2 v2.0.8 go: downloading github.com/magiconair/properties v1.8.7 go: downloading golang.org/x/time v0.3.0 go: downloading github.com/golang/protobuf v1.5.3 go: downloading github.com/google/gnostic-models v0.6.8 go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible go: downloading gopkg.in/ini.v1 v1.67.0 go: downloading github.com/charmbracelet/bubbles v0.13.0 go: downloading github.com/charmbracelet/bubbletea v0.21.0 go: downloading github.com/charmbracelet/lipgloss v0.5.0 go: downloading github.com/evertras/bubble-table v0.14.4 go: downloading github.com/muesli/termenv v0.11.1-0.20220212125758-44cd13922739 go: downloading github.com/subosito/gotenv v1.4.2 go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading golang.org/x/text v0.13.0 go: downloading sigs.k8s.io/kustomize/api v0.13.5-0.20230601165947-6ce0bf390ce3 go: downloading sigs.k8s.io/kustomize/kyaml v0.14.3-0.20230601165947-6ce0bf390ce3 go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de go: downloading github.com/docker/distribution v2.8.2+incompatible go: downloading github.com/containerd/stargz-snapshotter/estargz v0.14.3 go: downloading cloud.google.com/go/compute/metadata v0.2.3 go: downloading k8s.io/cloud-provider-gcp/providers v0.27.1 go: downloading github.com/mitchellh/reflectwalk v1.0.2 go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/moby/term v0.0.0-20221205130635-1aeaba878587 go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.22 go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.5 go: downloading github.com/Azure/go-autorest/logger v0.2.1 go: downloading github.com/dimchansky/utfbom v1.1.1 go: downloading github.com/Azure/go-autorest/tracing v0.6.0 go: downloading cloud.google.com/go/compute v1.23.0 go: downloading github.com/google/go-querystring v1.1.0 go: downloading github.com/hashicorp/go-retryablehttp v0.7.4 go: downloading google.golang.org/protobuf v1.31.0 go: downloading github.com/prometheus/client_golang v1.16.0 go: downloading github.com/moby/sys/mountinfo v0.6.2 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading k8s.io/component-helpers v0.28.1 go: downloading github.com/jmespath/go-jmespath v0.4.0 go: downloading k8s.io/apiextensions-apiserver v0.28.0 go: downloading sigs.k8s.io/gateway-api v0.7.0 go: downloading github.com/oliveagle/jsonpath v0.0.0-20180606110733-2e52cf6e6852 go: downloading github.com/docker/docker v24.0.5+incompatible go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20230807174057-1744710a1577 go: downloading github.com/go-openapi/swag v0.22.3 go: downloading github.com/go-openapi/jsonreference v0.20.2 go: downloading github.com/google/go-cmp v0.5.9 go: downloading github.com/klauspost/compress v1.16.5 go: downloading github.com/opencontainers/image-spec v1.1.0-rc4 go: downloading github.com/google/btree v1.0.1 go: downloading github.com/lucasb-eyer/go-colorful v1.2.0 go: downloading github.com/mattn/go-runewidth v0.0.13 go: downloading github.com/muesli/reflow v0.3.0 go: downloading github.com/sahilm/fuzzy v0.1.0 go: downloading github.com/atotto/clipboard v0.1.4 go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading github.com/prometheus/client_model v0.4.0 go: downloading github.com/prometheus/procfs v0.10.1 go: downloading github.com/containerd/containerd v1.7.5 go: downloading oras.land/oras-go v1.2.4-0.20230829103011-4d0bf161925b go: downloading github.com/exponent-io/jsonpath v0.0.0-20151013193312-d6023ce2651d go: downloading github.com/containerd/console v1.0.3 go: downloading github.com/mattn/go-isatty v0.0.17 go: downloading github.com/muesli/ansi v0.0.0-20211018074035-2e021307bc4b go: downloading github.com/muesli/cancelreader v0.2.0 go: downloading github.com/vbatts/tar-split v0.11.3 go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/docker/docker-credential-helpers v0.8.0 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading github.com/GoogleCloudPlatform/k8s-cloud-provider v1.18.1-0.20220218231025-f11817397a1b go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.2.0 go: downloading github.com/prometheus/common v0.44.0 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading github.com/go-openapi/jsonpointer v0.19.6 go: downloading github.com/rivo/uniseg v0.2.0 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/emicklei/go-restful/v3 v3.10.2 go: downloading github.com/go-errors/errors v1.4.2 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/googleapis/gax-go/v2 v2.12.0 go: downloading github.com/moby/spdystream v0.2.0 go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading github.com/xlab/treeprint v1.2.0 go: downloading github.com/google/s2a-go v0.1.5 go: downloading go.opencensus.io v0.24.0 go: downloading github.com/gorilla/mux v1.8.0 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.2.5 go: downloading go.starlark.net v0.0.0-20230525235612-a134d8f9ddca go: downloading github.com/moby/locker v1.0.1 go: downloading github.com/docker/go-metrics v0.0.1 go: downloading go.opentelemetry.io/otel v1.15.0 go: downloading go.opentelemetry.io/otel/trace v1.15.0 go: downloading google.golang.org/appengine v1.6.7 go: downloading github.com/docker/go-units v0.5.0 go: downloading github.com/morikuni/aec v1.0.0 go: downloading github.com/go-logr/stdr v1.2.2 go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.1 fatal: not a git repository (or any of the parent directories): .git go test -v ./... go: downloading sigs.k8s.io/controller-runtime v0.16.1 go: downloading github.com/stretchr/testify v1.8.4 go: downloading k8s.io/kubelet v0.28.1 go: downloading github.com/jacksontj/memberlistmesh v0.0.0-20190905163944-93462b9d2bb7 go: downloading github.com/weaveworks/mesh v0.0.0-20191105120815-58dbcc3e8e63 go: downloading github.com/google/go-tpm-tools v0.4.0 go: downloading github.com/google/go-tpm v0.9.0 go: downloading k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading github.com/hashicorp/memberlist v0.3.1 go: downloading github.com/hashicorp/go-sockaddr v1.0.2 go: downloading github.com/oklog/ulid v1.3.1 go: downloading golang.org/x/tools v0.12.1-0.20230815132531-74c255bcf846 go: downloading github.com/hashicorp/go-msgpack v0.5.3 go: downloading github.com/armon/go-metrics v0.4.0 go: downloading github.com/hashicorp/go-multierror v1.1.1 go: downloading github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529 go: downloading github.com/miekg/dns v1.1.50 go: downloading github.com/hashicorp/errwrap v1.1.0 go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 go: downloading github.com/hashicorp/golang-lru v0.5.4 go: downloading github.com/evanphx/json-patch/v5 v5.6.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading github.com/google/go-sev-guest v0.6.1 go: downloading github.com/pborman/uuid v1.2.0 go: downloading github.com/google/logger v1.1.1 go: downloading golang.org/x/mod v0.12.0 ? k8s.io/kops [no test files] ? k8s.io/kops/channels/cmd/channels [no test files] ? k8s.io/kops/channels/pkg/api [no test files] ? k8s.io/kops/cloudmock/aws/mockautoscaling [no test files] ? k8s.io/kops/cloudmock/aws/mockec2 [no test files] ? k8s.io/kops/cloudmock/aws/mockelb [no test files] ? k8s.io/kops/cloudmock/aws/mockelbv2 [no test files] ? k8s.io/kops/cloudmock/aws/mockeventbridge [no test files] ? k8s.io/kops/cloudmock/aws/mockiam [no test files] ? k8s.io/kops/cloudmock/aws/mockroute53 [no test files] ? k8s.io/kops/cloudmock/aws/mocksqs [no test files] ? k8s.io/kops/cloudmock/gce [no test files] ? k8s.io/kops/cloudmock/gce/gcphttp [no test files] ? k8s.io/kops/cloudmock/gce/mockcloudresourcemanager [no test files] ? k8s.io/kops/cloudmock/gce/mockcompute [no test files] ? k8s.io/kops/cloudmock/gce/mockdns [no test files] ? k8s.io/kops/cloudmock/gce/mockiam [no test files] ? k8s.io/kops/cloudmock/gce/mockstorage [no test files] ? k8s.io/kops/cloudmock/openstack [no test files] ? k8s.io/kops/cloudmock/openstack/mockblockstorage [no test files] ? k8s.io/kops/cloudmock/openstack/mockcompute [no test files] ? k8s.io/kops/cloudmock/openstack/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack/mockimage [no test files] ? k8s.io/kops/cloudmock/openstack/mockloadbalancer [no test files] ? k8s.io/kops/cloudmock/openstack/mocknetworking [no test files] ? k8s.io/kops/cloudmock/scaleway/mockdns [no test files] === RUN Test_Filtering --- PASS: Test_Filtering (0.00s) === RUN Test_Replacement --- PASS: Test_Replacement (0.00s) === RUN Test_GetRequiredUpdates --- PASS: Test_GetRequiredUpdates (0.00s) === RUN Test_NeedsRollingUpdate I0611 09:17:45.842775 52539 addon.go:250] addon test wants to update all nodes I0611 09:17:45.846370 52539 addon.go:250] addon test wants to update workers nodes I0611 09:17:45.846797 52539 addon.go:250] addon test wants to update control-plane nodes --- PASS: Test_NeedsRollingUpdate (0.00s) === RUN Test_InstallPKI I0611 09:17:45.847365 52539 addon.go:283] installing PKI for "test" I0611 09:17:46.256172 52539 addon.go:283] installing PKI for "test" --- PASS: Test_InstallPKI (0.81s) === RUN Test_IsPKIInstalled --- PASS: Test_IsPKIInstalled (0.00s) PASS ok k8s.io/kops/channels/pkg/channels 0.898s === RUN TestGetUpdates --- PASS: TestGetUpdates (0.00s) PASS ok k8s.io/kops/channels/pkg/cmd 0.091s ? k8s.io/kops/cmd/kops/util [no test files] ? k8s.io/kops/cmd/kops-controller [no test files] ? k8s.io/kops/cmd/kops-controller/controllers [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/config [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/server [no test files] ? k8s.io/kops/cmd/kops-utils-cp [no test files] ? k8s.io/kops/cmd/nodeup [no test files] ? k8s.io/kops/dns-controller/cmd/dns-controller [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/interfaces [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/rrstype [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/tests [no test files] ? k8s.io/kops/examples/kops-api-example [no test files] ? k8s.io/kops/nodeup/pkg/model/networking [no test files] ? k8s.io/kops/pkg/acls/gce [no test files] ? k8s.io/kops/pkg/acls [no test files] ? k8s.io/kops/nodeup/pkg/model/resources [no test files] ? k8s.io/kops/pkg/apis/kops/registry [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/apis/nodeup [no test files] ? k8s.io/kops/pkg/bootstrap [no test files] ? k8s.io/kops/pkg/applylib [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset [no test files] ? k8s.io/kops/pkg/applylib/mocks/mockkubeapiserver [no test files] ? k8s.io/kops/pkg/applylib/mocks [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/scheme [no test files] ? k8s.io/kops/pkg/client/simple [no test files] ? k8s.io/kops/pkg/client/simple/api [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/clouds [no test files] ? k8s.io/kops/pkg/clusteraddons [no test files] ? k8s.io/kops/pkg/commands/commandutils [no test files] ? k8s.io/kops/pkg/configserver [no test files] ? k8s.io/kops/pkg/dump [no test files] ? k8s.io/kops/pkg/kopscontrollerclient [no test files] ? k8s.io/kops/pkg/kubemanifest [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awscloudcontrollermanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/kuberouter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/nodeterminationhandler [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/certmanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/clusterautoscaler [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/dnscontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/externaldns [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/karpenter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsebscsidriver [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsloadbalancercontroller [no test files] ? k8s.io/kops/pkg/model/components/kopscontroller [no test files] ? k8s.io/kops/pkg/model/domodel [no test files] ? k8s.io/kops/pkg/model/gcemodel [no test files] ? k8s.io/kops/pkg/model/hetznermodel [no test files] ? k8s.io/kops/pkg/model/scalewaymodel [no test files] ? k8s.io/kops/pkg/nodeidentity/do [no test files] ? k8s.io/kops/pkg/nodeidentity [no test files] ? k8s.io/kops/pkg/resolver [no test files] ? k8s.io/kops/pkg/resources [no test files] ? k8s.io/kops/pkg/nodeidentity/gce [no test files] ? k8s.io/kops/pkg/nodeidentity/hetzner [no test files] ? k8s.io/kops/pkg/resources/digitalocean [no test files] ? k8s.io/kops/pkg/resources/hetzner [no test files] ? k8s.io/kops/pkg/nodeidentity/openstack [no test files] ? k8s.io/kops/pkg/resources/scaleway [no test files] ? k8s.io/kops/pkg/resources/spotinst [no test files] ? k8s.io/kops/pkg/nodeidentity/scaleway [no test files] ? k8s.io/kops/pkg/resources/openstack [no test files] ? k8s.io/kops/pkg/resources/ops [no test files] ? k8s.io/kops/pkg/rbac [no test files] ? k8s.io/kops/pkg/mutexes [no test files] ? k8s.io/kops/pkg/templates [no test files] ? k8s.io/kops/pkg/sshcredentials [no test files] ? k8s.io/kops/pkg/nodeidentity/aws [no test files] ? k8s.io/kops/pkg/testutils [no test files] ? k8s.io/kops/pkg/testutils/golden [no test files] ? k8s.io/kops/pkg/testutils/testcontext [no test files] ? k8s.io/kops/pkg/tokens [no test files] ? k8s.io/kops/pkg/try [no test files] ? k8s.io/kops/pkg/values [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns [no test files] ? k8s.io/kops/pkg/wellknownoperators [no test files] ? k8s.io/kops/pkg/wellknownports [no test files] ? k8s.io/kops/pkg/wellknownusers [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns/provider [no test files] ? k8s.io/kops/protokube/cmd/protokube [no test files] ? k8s.io/kops/protokube/pkg/etcd [no test files] ? k8s.io/kops/protokube/pkg/gossip/do [no test files] ? k8s.io/kops/protokube/pkg/gossip/aws [no test files] ? k8s.io/kops/protokube/pkg/gossip/hetzner [no test files] ? k8s.io/kops/protokube/pkg/gossip/memberlist [no test files] ? k8s.io/kops/protokube/pkg/gossip/mesh [no test files] ? k8s.io/kops/protokube/pkg/gossip/openstack [no test files] ? k8s.io/kops/protokube/pkg/gossip/scaleway [no test files] ? k8s.io/kops/proto/kops/bootstrap/v1 [no test files] ? k8s.io/kops/protokube/pkg/gossip [no test files] ? k8s.io/kops/protokube/pkg/protokube [no test files] ? k8s.io/kops/pkg/zones [no test files] ? k8s.io/kops/tests/fuzz [no test files] ? k8s.io/kops/tests/integration/channel/simple [no test files] ? k8s.io/kops/upup/models [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/bootstrapchannelbuilder [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcediscovery [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcemetadata [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmsigner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmverifier [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/do [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetzner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetznertasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/scalewaytasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/spotinsttasks [no test files] ? k8s.io/kops/upup/pkg/fi/loader [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/install [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/local [no test files] ? k8s.io/kops/upup/pkg/fi/secrets [no test files] ? k8s.io/kops/upup/tools/generators/fitask [no test files] ? k8s.io/kops/util/pkg/env [no test files] ? k8s.io/kops/util/pkg/architectures [no test files] ? k8s.io/kops/util/pkg/mirrors [no test files] ? k8s.io/kops/util/pkg/tables [no test files] ? k8s.io/kops/util/pkg/ui [no test files] === RUN TestCreateClusterMinimal I0611 09:17:54.549266 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:54.549436 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:54.549479 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:54.549520 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:54.549552 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:54.549612 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:54.549662 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:54.549679 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:54.549708 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:54.549733 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:54.555890 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.555963 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.604831 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:54.605052 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:54.605466 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:54.618283 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:54.618378 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:54.618406 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:54.618438 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:54.618462 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:54.618493 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:54.618518 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:54.618534 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:54.618559 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:54.618576 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:54.622456 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.622521 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.680488 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:54.680676 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:54.680987 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:54.686662 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:54.686749 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:54.686774 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:54.686800 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:54.686822 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:54.687051 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:54.688746 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:54.689234 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:54.689268 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:54.689289 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:54.693348 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.693400 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.733713 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:54.733986 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:54.734508 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:54.743219 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:54.743342 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:54.743382 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:54.743431 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:54.743467 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:54.743519 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:54.743561 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:54.743592 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:54.743630 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:54.743657 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:54.748282 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.748377 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.788722 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:54.788918 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:54.789237 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:54.795044 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:54.795138 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:54.795168 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:54.795204 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:54.795228 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:54.795264 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:54.795294 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:54.795310 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:54.795334 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:54.795352 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:54.798987 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.799046 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.872731 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:54.872992 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:54.873420 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:54.891790 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:54.891911 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:54.891953 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:54.892002 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:54.892039 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:54.892094 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:54.892136 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:54.892170 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:54.892206 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:54.892236 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:54.951294 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:54.951357 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.021659 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:55.021787 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:55.022141 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:55.029159 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.029273 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.029313 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.029348 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.029372 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.029408 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.029439 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.029461 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.029486 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.029506 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.033193 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.033250 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.083308 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:55.083493 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:55.083822 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterMinimal (0.54s) === RUN TestCreateClusterHetzner I0611 09:17:55.089741 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.089857 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.089886 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.089922 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.089948 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.089984 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.090017 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.090033 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.090057 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.090074 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.093988 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.094033 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0611 09:17:55.144313 55409 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0611 09:17:55.144360 55409 new_cluster.go:1373] Cloud Provider ID: "hetzner" I0611 09:17:55.151521 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.151631 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.151664 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.151699 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.151726 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.151763 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.151793 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.151811 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.151836 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.151856 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.155822 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.155906 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.199794 55409 new_cluster.go:1373] Cloud Provider ID: "hetzner" --- PASS: TestCreateClusterHetzner (0.12s) === RUN TestCreateClusterOpenStack I0611 09:17:55.208841 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.208983 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.209025 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.209069 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.209109 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.209160 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.209203 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.209235 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.209277 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.209308 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.213733 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.213778 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0611 09:17:55.264850 55409 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0611 09:17:55.264893 55409 new_cluster.go:1373] Cloud Provider ID: "openstack" I0611 09:17:55.267371 55409 subnets.go:224] Assigned CIDR 10.0.0.0/16 to subnet us-test1 --- PASS: TestCreateClusterOpenStack (0.07s) === RUN TestCreateClusterOpenStackOctavia I0611 09:17:55.274522 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.274612 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.274641 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.274670 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.274693 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.274722 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.274746 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.274762 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.274784 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.274800 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.278396 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.278439 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0611 09:17:55.322216 55409 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0611 09:17:55.322287 55409 new_cluster.go:1373] Cloud Provider ID: "openstack" I0611 09:17:55.325918 55409 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0611 09:17:55.325947 55409 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackOctavia (0.06s) === RUN TestCreateClusterOpenStackNoDNS I0611 09:17:55.333524 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.333618 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.333645 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.333674 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.333696 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.333727 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.333754 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.333770 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.333794 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.333813 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.337686 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.337741 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0611 09:17:55.409101 55409 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0611 09:17:55.409146 55409 new_cluster.go:1373] Cloud Provider ID: "openstack" I0611 09:17:55.409197 55409 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0611 09:17:55.409213 55409 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackNoDNS (0.08s) === RUN TestCreateClusterCilium I0611 09:17:55.417068 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.417180 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.417213 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.417244 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.417269 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.417305 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.417335 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.417351 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.417374 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.417392 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.421364 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.421404 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.458023 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:55.458199 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:55.458523 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterCilium (0.05s) === RUN TestCreateClusterOverride I0611 09:17:55.464495 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.464601 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.464630 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.464659 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.464688 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.464724 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.464755 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.464771 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.464794 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.464811 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.468962 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.469040 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.536025 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:55.536495 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:55.536776 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterOverride (0.08s) === RUN TestCreateClusterKubernetesFeatureGates I0611 09:17:55.542328 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.542412 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.542436 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.542466 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.542488 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.542517 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.542542 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.542577 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.542610 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.542627 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.573585 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.573640 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.674717 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:55.674886 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:55.675241 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKubernetesFeatureGates (0.14s) === RUN TestCreateClusterComplex I0611 09:17:55.681477 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.681569 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.681593 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.681621 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.681642 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.681674 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.681699 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.681715 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.681738 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.681754 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.685447 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.685492 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.716468 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:55.716869 55409 subnets.go:224] Assigned CIDR 10.0.0.0/18 to subnet us-test-1a I0611 09:17:55.716887 55409 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1b I0611 09:17:55.716899 55409 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1c I0611 09:17:55.717254 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplex (0.05s) === RUN TestCreateClusterComplexPrivate I0611 09:17:55.729924 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.730031 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.730063 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.730098 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.730126 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.730162 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.730193 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.730209 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.730235 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.730254 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.734110 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.734153 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.802773 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:55.803139 55409 subnets.go:205] Assigned CIDR 10.0.0.0/21 to subnet utility-us-test-1a I0611 09:17:55.803154 55409 subnets.go:205] Assigned CIDR 10.0.8.0/21 to subnet utility-us-test-1a-1 I0611 09:17:55.803165 55409 subnets.go:205] Assigned CIDR 10.0.16.0/21 to subnet utility-us-test-1a-4 I0611 09:17:55.803173 55409 subnets.go:205] Assigned CIDR 10.0.24.0/21 to subnet utility-us-test-1b I0611 09:17:55.803180 55409 subnets.go:205] Assigned CIDR 10.0.32.0/21 to subnet utility-us-test-1b-2 I0611 09:17:55.803190 55409 subnets.go:205] Assigned CIDR 10.0.40.0/21 to subnet utility-us-test-1c I0611 09:17:55.803198 55409 subnets.go:205] Assigned CIDR 10.0.48.0/21 to subnet utility-us-test-1c-3 I0611 09:17:55.803211 55409 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1a I0611 09:17:55.803219 55409 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1b I0611 09:17:55.803229 55409 subnets.go:224] Assigned CIDR 10.0.192.0/18 to subnet us-test-1c I0611 09:17:55.803706 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplexPrivate (0.09s) === RUN TestCreateClusterHA I0611 09:17:55.817560 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.817693 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.817733 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.817777 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.817830 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.817880 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.817918 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.817943 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.817980 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.818004 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.826076 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.826166 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.910271 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:55.910593 55409 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0611 09:17:55.910606 55409 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0611 09:17:55.910616 55409 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0611 09:17:55.910942 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:55.924553 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.924674 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.924715 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.924765 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.924807 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.924861 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.924908 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.924941 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.924978 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.925006 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.929562 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.929607 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.970501 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:55.970826 55409 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0611 09:17:55.970843 55409 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0611 09:17:55.970851 55409 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0611 09:17:55.971178 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHA (0.16s) === RUN TestCreateClusterMinimalGCE I0611 09:17:55.981242 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:55.981381 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:55.981421 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:55.981464 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:55.981503 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:55.981551 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:55.981591 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:55.981625 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:55.981665 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:55.981692 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:55.986574 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:55.986652 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.025838 55409 new_cluster.go:1373] Cloud Provider ID: "gce" I0611 09:17:56.025969 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 I0611 09:17:56.031631 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.031713 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.031743 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.031775 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.031803 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.031837 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.031865 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.031882 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.031907 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.031927 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.035774 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.035819 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.120648 55409 new_cluster.go:1373] Cloud Provider ID: "gce" I0611 09:17:56.120738 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterMinimalGCE (0.14s) === RUN TestCreateClusterHAGCE I0611 09:17:56.126158 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.126247 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.126274 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.126301 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.126325 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.126357 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.126385 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.126401 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.126424 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.126440 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.130238 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.130282 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.170624 55409 new_cluster.go:1373] Cloud Provider ID: "gce" I0611 09:17:56.170752 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterHAGCE (0.05s) === RUN TestCreateClusterGCE I0611 09:17:56.179125 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.179211 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.179236 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.179264 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.179285 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.179316 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.179342 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.179358 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.179380 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.179396 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.190151 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.190229 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.250066 55409 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0611 09:17:56.250147 55409 new_cluster.go:1373] Cloud Provider ID: "gce" I0611 09:17:56.250237 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterGCE (0.08s) === RUN TestCreateClusterHASharedZone I0611 09:17:56.255843 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.255936 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.255964 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.255995 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.256019 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.256051 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.256080 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.256098 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.256122 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.256140 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.259810 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.259851 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0611 09:17:56.332725 55409 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0611 09:17:56.332765 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:56.333001 55409 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0611 09:17:56.333300 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZone (0.09s) === RUN TestCreateClusterHASharedZones I0611 09:17:56.341232 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.341318 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.341345 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.341375 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.341400 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.341431 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.341457 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.341475 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.341499 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.341517 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.349016 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.349076 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0611 09:17:56.426855 55409 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0611 09:17:56.426902 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:56.427245 55409 subnets.go:224] Assigned CIDR 172.20.0.0/17 to subnet us-test-1a I0611 09:17:56.427260 55409 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1b I0611 09:17:56.427612 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZones (0.10s) === RUN TestCreateClusterPrivate I0611 09:17:56.437357 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.437451 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.437478 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.437512 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.437537 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.437572 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.437601 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.437618 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.437642 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.437659 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.441822 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.441884 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.493377 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:56.493594 55409 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0611 09:17:56.493613 55409 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0611 09:17:56.493928 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:56.493959 55409 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterPrivate (0.06s) === RUN TestCreateClusterPrivateGCE I0611 09:17:56.500642 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.500727 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.500751 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.500782 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.500805 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.500833 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.500861 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.500877 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.500902 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.500919 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.504870 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.504930 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.550806 55409 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0611 09:17:56.550938 55409 new_cluster.go:1373] Cloud Provider ID: "gce" I0611 09:17:56.551132 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterPrivateGCE (0.06s) === RUN TestCreateClusterWithNGWSpecified I0611 09:17:56.565529 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.565630 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.565659 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.565690 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.565714 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.565748 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.565778 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.565797 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.565822 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.565839 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.572006 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.572074 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.606426 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:56.606646 55409 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0611 09:17:56.606665 55409 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0611 09:17:56.606998 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:56.607031 55409 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithNGWSpecified (0.05s) === RUN TestCreateClusterWithINGWSpecified I0611 09:17:56.613843 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.613950 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.613981 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.614015 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.614041 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.614078 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.614107 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.614124 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.614150 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.614168 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.618042 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.618091 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.709374 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:56.709619 55409 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0611 09:17:56.709642 55409 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0611 09:17:56.710008 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:56.710047 55409 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithINGWSpecified (0.10s) === RUN TestCreateClusterSharedVPC I0611 09:17:56.717563 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.717673 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.717704 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.717739 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.717767 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.717818 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.717853 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.717875 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.717907 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.717928 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.722321 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.722374 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.782817 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:56.782996 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.783055 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.783093 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.783110 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.783157 55409 subnets.go:224] Assigned CIDR 10.0.0.0/12 to subnet us-test-1a I0611 09:17:56.783463 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedVPC (0.07s) === RUN TestCreateClusterSharedSubnets I0611 09:17:56.789189 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.789285 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.789311 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.789338 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.789362 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.789396 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.789426 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.789443 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.789467 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.789485 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.793689 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.793769 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.865535 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.865584 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.865669 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:56.865808 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.865829 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.865851 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.865866 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.866162 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnets (0.08s) === RUN TestCreateClusterSharedSubnetsVpcLookup I0611 09:17:56.871445 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.871529 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.871551 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.871577 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.871600 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.871628 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.871653 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.871673 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.871695 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.871712 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.876047 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.876108 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.942406 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:17:56.942459 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.942482 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.942565 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:56.942749 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.942772 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.942793 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.942809 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.943142 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnetsVpcLookup (0.08s) === RUN TestCreateClusterPrivateSharedSubnets I0611 09:17:56.949010 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.949101 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.949128 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.949157 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.949181 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.949212 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.949240 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.949260 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.949285 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.949303 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.953399 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.953444 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.984008 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.984054 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.984109 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.984129 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.984192 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:56.984367 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.984390 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.984414 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:17:56.984431 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:17:56.984781 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterPrivateSharedSubnets (0.04s) === RUN TestCreateClusterIPv6 I0611 09:17:56.990665 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:56.990755 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:56.990781 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:56.990810 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:56.990836 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:56.990868 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:56.990896 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:56.990914 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:56.990938 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:56.990956 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:56.995034 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:56.995086 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:57.054433 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:57.054733 55409 subnets.go:205] Assigned CIDR 172.20.0.0/21 to subnet utility-us-test-1a I0611 09:17:57.054760 55409 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet dualstack-us-test-1a I0611 09:17:57.055541 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterIPv6 (0.07s) === RUN TestCreateClusterDifferentAMIs I0611 09:17:57.064877 55409 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0611 09:17:57.064900 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:57.065037 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:57.065072 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:57.065113 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:57.065152 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:57.065198 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:57.065237 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:57.065270 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:57.065308 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:57.065336 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:57.070982 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:57.071021 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:57.105519 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:57.105609 55409 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0611 09:17:57.105627 55409 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0611 09:17:57.105934 55409 zones.go:93] ListHostedZonesPages { } I0611 09:17:57.112861 55409 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestCreateClusterDifferentAMIs (0.05s) === RUN TestCreateClusterKarpenter I0611 09:17:57.112948 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:57.113034 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:57.113059 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:57.113089 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:57.113113 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:57.113141 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:57.113167 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:57.113186 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:57.113209 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:57.113225 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:57.118664 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:57.118752 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0611 09:17:57.195529 55409 new_cluster.go:1373] Cloud Provider ID: "aws" I0611 09:17:57.195697 55409 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0611 09:17:57.195712 55409 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0611 09:17:57.195720 55409 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0611 09:17:57.196044 55409 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKarpenter (0.09s) === RUN TestParseCloudLabels --- PASS: TestParseCloudLabels (0.00s) === RUN TestConfirmation --- PASS: TestConfirmation (0.00s) === RUN TestEditInstanceGroup I0611 09:17:57.202308 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:57.202377 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:57.202402 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:57.202462 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:57.202488 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:57.202523 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:57.202550 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:57.202569 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:57.202593 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:57.202611 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:57.207723 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } --- PASS: TestEditInstanceGroup (0.01s) === RUN TestMinimal I0611 09:17:57.208874 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:17:57.208942 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:17:57.208964 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:17:57.208986 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:17:57.209009 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:17:57.209034 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:17:57.209054 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:17:57.209070 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:17:57.209093 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:17:57.209106 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:17:57.222385 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0611 09:17:57.224013 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:17:57.224057 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0611 09:18:02.960252 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:06.495590 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:18:06.502193 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:06.502226 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:06.502315 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:06.502792 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:18:06.507826 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:18:06.508296 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:06.508599 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:06.508837 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:06.508968 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:06.509703 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:18:06.510089 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:18:06.510618 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:18:06.513866 55409 target.go:111] Terraform output is in /tmp/test1180008983/out --- PASS: TestMinimal (9.31s) === RUN TestMinimal_v1_23 I0611 09:18:06.516638 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:06.516738 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:06.516772 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:06.516803 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:06.516829 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:06.516869 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:06.516899 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:06.516915 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:06.516938 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:06.516957 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:06.532398 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0611 09:18:06.534351 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:06.534413 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:08.618256 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:08.733189 55409 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0611 09:18:08.736167 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:08.736280 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:08.736402 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:08.739971 55409 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0611 09:18:08.763272 55409 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0611 09:18:08.764845 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:08.765186 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:08.766284 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:08.766401 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:08.766552 55409 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0611 09:18:08.766989 55409 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0611 09:18:08.767457 55409 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0611 09:18:08.771054 55409 target.go:111] Terraform output is in /tmp/test1531536256/out --- PASS: TestMinimal_v1_23 (2.26s) === RUN TestMinimal_v1_24 I0611 09:18:08.773976 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:08.774083 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:08.774121 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:08.774167 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:08.774201 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:08.774249 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:08.774290 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:08.774318 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:08.774358 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:08.774386 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:08.794236 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:18:08.797510 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:08.797592 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:10.708079 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:10.824722 55409 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0611 09:18:10.827020 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:10.827061 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:10.827189 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:10.832402 55409 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0611 09:18:10.835980 55409 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0611 09:18:10.836183 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:10.836419 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:10.836797 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:10.836849 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:10.836975 55409 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0611 09:18:10.837247 55409 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0611 09:18:10.837486 55409 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0611 09:18:10.840791 55409 target.go:111] Terraform output is in /tmp/test566976294/out --- PASS: TestMinimal_v1_24 (2.07s) === RUN TestMinimal_v1_25 I0611 09:18:10.843556 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:10.843638 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:10.843668 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:10.843699 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:10.843725 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:10.843758 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:10.843786 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:10.843803 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:10.843826 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:10.843842 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:10.858670 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0611 09:18:10.860619 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:10.860677 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:12.802448 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:12.945645 55409 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0611 09:18:12.946574 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:12.946601 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:12.946693 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:12.947486 55409 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0611 09:18:12.950849 55409 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0611 09:18:12.951053 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:12.951169 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:12.951489 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:12.951541 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:12.951618 55409 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0611 09:18:12.951806 55409 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0611 09:18:12.952047 55409 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0611 09:18:12.958533 55409 target.go:111] Terraform output is in /tmp/test3613414882/out --- PASS: TestMinimal_v1_25 (2.12s) === RUN TestMinimal_v1_26 I0611 09:18:12.961447 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:12.961536 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:12.961567 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:12.961597 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:12.961623 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:12.961656 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:12.961683 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:12.961700 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:12.961722 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:12.961738 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:12.977486 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0611 09:18:12.979520 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:12.979585 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:14.962941 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:15.100414 55409 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0611 09:18:15.100966 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:15.100989 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:15.101064 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:15.104731 55409 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0611 09:18:15.129129 55409 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0611 09:18:15.129372 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:15.129797 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:15.130180 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:15.130753 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:15.131457 55409 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0611 09:18:15.131673 55409 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0611 09:18:15.131909 55409 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0611 09:18:15.135068 55409 target.go:111] Terraform output is in /tmp/test2867083897/out --- PASS: TestMinimal_v1_26 (2.18s) === RUN TestMinimal_v1_27 I0611 09:18:15.138014 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:15.138207 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:15.138275 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:15.138349 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:15.138413 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:15.138487 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:15.138552 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:15.138596 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:15.138660 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:15.138700 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:15.154234 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0611 09:18:15.156197 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:15.156254 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:18.088916 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:18.256335 55409 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0611 09:18:18.256602 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:18.256639 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:18.256737 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:18.260857 55409 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0611 09:18:18.266472 55409 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0611 09:18:18.266796 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:18.267018 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:18.267290 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:18.267483 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:18.267551 55409 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0611 09:18:18.267721 55409 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0611 09:18:18.268033 55409 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0611 09:18:18.273657 55409 target.go:111] Terraform output is in /tmp/test1001683304/out --- PASS: TestMinimal_v1_27 (3.14s) === RUN TestMinimal_NoneDNS I0611 09:18:18.278326 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:18.278456 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:18.278499 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:18.278541 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:18.278577 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:18.278627 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:18.278672 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:18.278702 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:18.278741 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:18.278768 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0611 09:18:18.307577 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:18.307667 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:19.743466 55409 executor.go:111] Tasks: 0 done / 110 total; 43 can run I0611 09:18:19.747092 55409 executor.go:111] Tasks: 43 done / 110 total; 24 can run I0611 09:18:19.750138 55409 executor.go:111] Tasks: 67 done / 110 total; 29 can run I0611 09:18:19.751352 55409 executor.go:111] Tasks: 96 done / 110 total; 2 can run I0611 09:18:19.751411 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:19.751468 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:19.751576 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:19.751674 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:19.754655 55409 executor.go:111] Tasks: 98 done / 110 total; 4 can run I0611 09:18:19.754765 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:19.754915 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:19.755204 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:19.755355 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:19.755484 55409 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0611 09:18:19.755749 55409 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0611 09:18:19.756022 55409 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0611 09:18:19.761888 55409 target.go:111] Terraform output is in /tmp/test3514326332/out --- PASS: TestMinimal_NoneDNS (1.49s) === RUN TestHetzner I0611 09:18:19.766459 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:18:21.791590 55409 executor.go:111] Tasks: 0 done / 46 total; 37 can run I0611 09:18:21.799398 55409 executor.go:111] Tasks: 37 done / 46 total; 3 can run I0611 09:18:21.799814 55409 executor.go:111] Tasks: 40 done / 46 total; 2 can run I0611 09:18:21.805210 55409 executor.go:111] Tasks: 42 done / 46 total; 4 can run I0611 09:18:21.805935 55409 executor.go:111] Tasks: 46 done / 46 total; 0 can run I0611 09:18:21.808602 55409 target.go:111] Terraform output is in /tmp/test999368808/out --- PASS: TestHetzner (2.05s) === RUN TestNvidia I0611 09:18:21.811943 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:21.812073 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:21.812119 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:21.812166 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:21.812209 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:21.812261 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:21.812302 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:21.812331 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:21.812367 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:21.812401 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:21.837034 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:18:21.840279 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:21.840365 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:23.718703 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:23.836155 55409 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0611 09:18:23.836815 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:23.836843 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:23.836933 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:23.839165 55409 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0611 09:18:23.845139 55409 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0611 09:18:23.845550 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:23.845766 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:23.846036 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:23.846496 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:23.846607 55409 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0611 09:18:23.846864 55409 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0611 09:18:23.847066 55409 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0611 09:18:23.850193 55409 target.go:111] Terraform output is in /tmp/test982301713/out --- PASS: TestNvidia (2.04s) === RUN TestMinimalGossip I0611 09:18:23.852936 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:23.853020 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:23.853049 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:23.853077 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:23.853101 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:23.853134 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:23.853161 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:23.853178 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:23.853202 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:23.853220 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:18:23.872018 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:23.872083 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:25.258550 55409 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0611 09:18:25.264152 55409 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0611 09:18:25.270890 55409 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0611 09:18:25.271224 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:25.271371 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:25.271735 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:25.271808 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:25.271910 55409 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0611 09:18:25.272259 55409 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0611 09:18:25.272516 55409 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0611 09:18:25.366245 55409 target.go:111] Terraform output is in /tmp/test4132709603/out --- PASS: TestMinimalGossip (1.63s) === RUN TestMinimalGossipIRSA I0611 09:18:25.478357 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:25.478480 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:25.478519 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:25.478557 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:25.478593 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:25.478631 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:25.478671 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:25.478687 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:25.478713 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:25.478740 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:18:25.495304 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:25.495370 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:26.895782 55409 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0611 09:18:26.901018 55409 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0611 09:18:26.904023 55409 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0611 09:18:26.904218 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:26.904371 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:26.904489 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:26.904602 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:26.904668 55409 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0611 09:18:26.904794 55409 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0611 09:18:26.905035 55409 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0611 09:18:26.907821 55409 target.go:111] Terraform output is in /tmp/test4027192016/out --- PASS: TestMinimalGossipIRSA (1.43s) === RUN TestMinimalGCE I0611 09:18:26.910361 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:26.911193 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:18:28.894496 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:18:28.894579 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:18:28.894656 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0611 09:18:28.894677 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0611 09:18:28.894691 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0611 09:18:28.894735 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0611 09:18:28.895605 55409 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0611 09:18:28.898124 55409 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0611 09:18:28.901258 55409 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0611 09:18:28.901851 55409 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0611 09:18:28.902035 55409 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0611 09:18:28.903941 55409 target.go:111] Terraform output is in /tmp/test3503333320/out --- PASS: TestMinimalGCE (2.00s) === RUN TestMinimalGCEPrivate I0611 09:18:28.905971 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:28.906962 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:18:30.585280 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:18:30.585355 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:18:30.585449 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/main" W0611 09:18:30.585465 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/events" W0611 09:18:30.585479 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com" W0611 09:18:30.585526 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0611 09:18:30.586443 55409 executor.go:111] Tasks: 0 done / 65 total; 41 can run I0611 09:18:30.588909 55409 executor.go:111] Tasks: 41 done / 65 total; 17 can run I0611 09:18:30.593200 55409 executor.go:111] Tasks: 58 done / 65 total; 5 can run I0611 09:18:30.593960 55409 executor.go:111] Tasks: 63 done / 65 total; 2 can run I0611 09:18:30.594132 55409 executor.go:111] Tasks: 65 done / 65 total; 0 can run I0611 09:18:30.596212 55409 target.go:111] Terraform output is in /tmp/test3144901963/out --- PASS: TestMinimalGCEPrivate (1.69s) === RUN TestMinimalGCEInternalLoadBalancer I0611 09:18:30.598239 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.599391 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:18:32.304012 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:18:32.304068 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:18:32.304156 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/main" W0611 09:18:32.304175 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/events" W0611 09:18:32.304189 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com" W0611 09:18:32.304230 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0611 09:18:32.304260 55409 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0611 09:18:32.305261 55409 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0611 09:18:32.307842 55409 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0611 09:18:32.308177 55409 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0611 09:18:32.308486 55409 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0611 09:18:32.311592 55409 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0611 09:18:32.312276 55409 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0611 09:18:32.312435 55409 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0611 09:18:32.312725 55409 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0611 09:18:32.313006 55409 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0611 09:18:32.316308 55409 target.go:111] Terraform output is in /tmp/test962021859/out --- PASS: TestMinimalGCEInternalLoadBalancer (1.72s) === RUN TestMinimalGCEPublicLoadBalancer I0611 09:18:32.319765 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:32.321626 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:18:33.983312 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:18:33.983400 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:18:33.983549 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/main" W0611 09:18:33.983571 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/events" W0611 09:18:33.983592 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com" W0611 09:18:33.983654 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0611 09:18:33.985468 55409 executor.go:111] Tasks: 0 done / 71 total; 43 can run I0611 09:18:33.988653 55409 executor.go:111] Tasks: 43 done / 71 total; 19 can run I0611 09:18:33.992104 55409 executor.go:111] Tasks: 62 done / 71 total; 7 can run I0611 09:18:33.993077 55409 executor.go:111] Tasks: 69 done / 71 total; 2 can run I0611 09:18:33.993227 55409 executor.go:111] Tasks: 71 done / 71 total; 0 can run I0611 09:18:33.995277 55409 target.go:111] Terraform output is in /tmp/test3587259826/out --- PASS: TestMinimalGCEPublicLoadBalancer (1.68s) === RUN TestMinimalGCELongClusterName I0611 09:18:33.997427 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:33.998487 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:18:35.617561 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:18:35.617682 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:18:35.617811 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0611 09:18:35.617836 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0611 09:18:35.617865 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0611 09:18:35.617936 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0611 09:18:35.618916 55409 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0611 09:18:35.624146 55409 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0611 09:18:35.632096 55409 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0611 09:18:35.633086 55409 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0611 09:18:35.633291 55409 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0611 09:18:35.635480 55409 target.go:111] Terraform output is in /tmp/test950736830/out --- PASS: TestMinimalGCELongClusterName (1.64s) === RUN TestMinimalGCEInternalLoadBalancerLongClusterName I0611 09:18:35.637641 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:35.638885 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:18:37.290371 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:18:37.290425 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:18:37.290528 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0611 09:18:37.290545 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0611 09:18:37.290561 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0611 09:18:37.290602 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0611 09:18:37.290635 55409 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0611 09:18:37.291579 55409 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0611 09:18:37.296300 55409 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0611 09:18:37.296757 55409 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0611 09:18:37.296883 55409 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0611 09:18:37.299342 55409 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0611 09:18:37.299859 55409 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0611 09:18:37.299987 55409 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0611 09:18:37.300094 55409 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0611 09:18:37.300211 55409 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0611 09:18:37.302322 55409 target.go:111] Terraform output is in /tmp/test2268122821/out --- PASS: TestMinimalGCEInternalLoadBalancerLongClusterName (1.67s) === RUN TestMinimalGCEDNSNone I0611 09:18:37.304514 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:37.305604 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:18:38.923122 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:18:38.923181 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:18:38.923289 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0611 09:18:38.923307 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0611 09:18:38.923322 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0611 09:18:38.923364 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0611 09:18:38.923395 55409 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0611 09:18:38.924408 55409 executor.go:111] Tasks: 0 done / 72 total; 41 can run I0611 09:18:38.931441 55409 executor.go:111] Tasks: 41 done / 72 total; 18 can run I0611 09:18:38.931822 55409 executor.go:111] Tasks: 59 done / 72 total; 2 can run I0611 09:18:38.932020 55409 executor.go:111] Tasks: 61 done / 72 total; 2 can run I0611 09:18:38.937216 55409 executor.go:111] Tasks: 63 done / 72 total; 4 can run I0611 09:18:38.938058 55409 executor.go:111] Tasks: 67 done / 72 total; 2 can run I0611 09:18:38.938212 55409 executor.go:111] Tasks: 69 done / 72 total; 1 can run I0611 09:18:38.938424 55409 executor.go:111] Tasks: 70 done / 72 total; 2 can run I0611 09:18:38.938610 55409 executor.go:111] Tasks: 72 done / 72 total; 0 can run I0611 09:18:38.942118 55409 target.go:111] Terraform output is in /tmp/test1920445933/out --- PASS: TestMinimalGCEDNSNone (1.64s) === RUN TestMinimalScaleway I0611 09:18:38.945524 55409 featureflag.go:164] FeatureFlag "Scaleway"=true I0611 09:18:38.945549 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:18:41.077389 55409 executor.go:111] Tasks: 0 done / 49 total; 37 can run I0611 09:18:41.081719 55409 executor.go:111] Tasks: 37 done / 49 total; 6 can run I0611 09:18:41.085793 55409 executor.go:111] Tasks: 43 done / 49 total; 6 can run I0611 09:18:41.086724 55409 executor.go:111] Tasks: 49 done / 49 total; 0 can run I0611 09:18:41.088773 55409 target.go:111] Terraform output is in /tmp/test412443447/out I0611 09:18:41.091664 55409 featureflag.go:164] FeatureFlag "Scaleway"=false --- PASS: TestMinimalScaleway (2.15s) === RUN TestHA I0611 09:18:41.091783 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:41.091899 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:41.091940 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:41.091991 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:41.092032 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:41.092080 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:41.092124 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:41.092151 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:41.092188 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:41.092216 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:41.123667 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:18:41.127132 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:41.127218 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:41.127275 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:41.127326 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:42.440280 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:42.582294 55409 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0611 09:18:42.583253 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:42.583291 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:42.583377 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:42.585644 55409 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0611 09:18:42.592740 55409 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0611 09:18:42.593034 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:42.593256 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:42.593427 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:42.593665 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:42.593922 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:42.594012 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:42.594182 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:42.594270 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:42.594387 55409 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0611 09:18:42.594731 55409 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0611 09:18:42.595098 55409 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0611 09:18:42.600267 55409 target.go:111] Terraform output is in /tmp/test1290633701/out --- PASS: TestHA (1.51s) === RUN TestHighAvailabilityGCE I0611 09:18:42.604554 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:42.607437 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:18:44.265475 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:18:44.265586 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:18:44.265709 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/main" W0611 09:18:44.265737 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/events" W0611 09:18:44.265759 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com" W0611 09:18:44.265817 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0611 09:18:44.265888 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0611 09:18:44.265949 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0611 09:18:44.267970 55409 executor.go:111] Tasks: 0 done / 82 total; 49 can run I0611 09:18:44.270282 55409 executor.go:111] Tasks: 49 done / 82 total; 19 can run I0611 09:18:44.277224 55409 executor.go:111] Tasks: 68 done / 82 total; 8 can run I0611 09:18:44.277919 55409 executor.go:111] Tasks: 76 done / 82 total; 6 can run I0611 09:18:44.278155 55409 executor.go:111] Tasks: 82 done / 82 total; 0 can run I0611 09:18:44.280820 55409 target.go:111] Terraform output is in /tmp/test3956967199/out --- PASS: TestHighAvailabilityGCE (1.68s) === RUN TestComplex I0611 09:18:44.283524 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:44.283608 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:44.283637 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:44.283692 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:44.283719 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:44.283751 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:44.283779 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:44.283798 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:44.283821 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:44.283838 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:44.307558 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:18:44.310014 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:44.310074 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:46.253037 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:46.374415 55409 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0611 09:18:46.374798 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:46.374824 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:46.374906 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:46.376374 55409 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0611 09:18:46.378406 55409 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0611 09:18:46.379133 55409 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0611 09:18:46.379468 55409 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0611 09:18:46.379571 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:46.379628 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:46.379680 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:46.379774 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:46.382845 55409 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0611 09:18:46.382962 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:46.383180 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:46.383334 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:46.383931 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:46.384048 55409 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0611 09:18:46.384306 55409 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0611 09:18:46.384641 55409 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0611 09:18:46.391335 55409 target.go:111] Terraform output is in /tmp/test1086854442/out I0611 09:18:46.396154 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:46.396270 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:46.396317 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:46.396362 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:46.396405 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:46.396454 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:46.396495 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:46.396527 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:46.396566 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:46.396596 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:46.431653 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:18:46.435893 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:46.435992 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:47.746809 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:47.909139 55409 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0611 09:18:47.910667 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:47.910690 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:47.910802 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:47.913641 55409 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0611 09:18:47.918973 55409 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0611 09:18:47.923730 55409 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0611 09:18:47.924056 55409 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0611 09:18:47.924094 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:47.924168 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:47.926000 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:47.926058 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:47.932609 55409 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0611 09:18:47.932820 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:47.933557 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:47.933931 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:47.934301 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:47.934604 55409 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0611 09:18:47.935122 55409 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0611 09:18:47.935628 55409 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0611 09:18:47.941338 55409 target.go:111] Terraform output is in /tmp/test3574938839/out --- PASS: TestComplex (3.66s) === RUN TestCompress I0611 09:18:47.946105 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:47.946264 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:47.946310 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:47.946361 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:47.946397 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:47.946450 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:47.946490 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:47.946517 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:47.946550 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:47.946576 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:47.968358 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:18:47.971320 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:47.971411 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:49.245288 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:49.406046 55409 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0611 09:18:49.408581 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:49.408614 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:49.408755 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:49.411675 55409 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0611 09:18:49.417011 55409 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0611 09:18:49.417458 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:49.417639 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:49.418506 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:49.419105 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:49.419220 55409 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0611 09:18:49.419433 55409 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0611 09:18:49.419780 55409 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0611 09:18:49.423347 55409 target.go:111] Terraform output is in /tmp/test1100461526/out --- PASS: TestCompress (1.48s) === RUN TestExternalPolicies I0611 09:18:49.426389 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:49.426469 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:49.426509 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:49.426555 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:49.426588 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:49.426635 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:49.426663 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:49.426697 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:49.426720 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:49.426737 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:49.442300 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:18:49.445282 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:49.445377 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:50.725447 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:50.903106 55409 executor.go:111] Tasks: 0 done / 115 total; 47 can run I0611 09:18:50.904996 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:50.905055 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:50.905203 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:50.911703 55409 executor.go:111] Tasks: 47 done / 115 total; 22 can run I0611 09:18:50.914744 55409 executor.go:111] Tasks: 69 done / 115 total; 30 can run I0611 09:18:50.915759 55409 executor.go:111] Tasks: 99 done / 115 total; 4 can run W0611 09:18:50.915930 55409 api.go:53] PageSize not implemented W0611 09:18:50.916057 55409 api.go:53] PageSize not implemented I0611 09:18:50.921932 55409 executor.go:111] Tasks: 103 done / 115 total; 4 can run I0611 09:18:50.922111 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:50.922274 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:50.922767 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:50.922862 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:50.922956 55409 executor.go:111] Tasks: 107 done / 115 total; 2 can run I0611 09:18:50.923330 55409 executor.go:111] Tasks: 109 done / 115 total; 6 can run I0611 09:18:50.923714 55409 executor.go:111] Tasks: 115 done / 115 total; 0 can run I0611 09:18:50.929895 55409 target.go:111] Terraform output is in /tmp/test1442564722/out --- PASS: TestExternalPolicies (1.51s) === RUN TestMinimalIPv6 I0611 09:18:50.934771 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:50.934904 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:50.934947 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:50.934993 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:50.935035 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:50.935087 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:50.935129 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:50.935157 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:50.935195 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:50.935222 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:50.964390 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:18:50.967880 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:50.967959 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:52.262896 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:52.448844 55409 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0611 09:18:52.451921 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:52.451966 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:52.452123 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:52.455007 55409 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0611 09:18:52.459561 55409 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0611 09:18:52.460298 55409 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0611 09:18:52.460896 55409 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0611 09:18:52.461051 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:52.461188 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:52.461337 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:52.461423 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:52.466723 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:18:52.466895 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:52.467058 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:52.467335 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:52.467871 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:52.467986 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:18:52.468279 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:18:52.468566 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:18:52.475530 55409 target.go:111] Terraform output is in /tmp/test1012886601/out --- PASS: TestMinimalIPv6 (1.55s) === RUN TestMinimalIPv6Calico I0611 09:18:52.480389 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:52.480522 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:52.480565 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:52.480609 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:52.480647 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:52.480700 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:52.480783 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:52.480812 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:52.480850 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:52.480879 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:52.509058 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:18:52.512258 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:52.512330 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:53.801356 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:54.226867 55409 executor.go:111] Tasks: 0 done / 138 total; 47 can run I0611 09:18:54.228433 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:54.228489 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:54.228608 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:54.230351 55409 executor.go:111] Tasks: 47 done / 138 total; 25 can run I0611 09:18:54.233811 55409 executor.go:111] Tasks: 72 done / 138 total; 37 can run I0611 09:18:54.234772 55409 executor.go:111] Tasks: 109 done / 138 total; 9 can run I0611 09:18:54.235270 55409 executor.go:111] Tasks: 118 done / 138 total; 8 can run I0611 09:18:54.235333 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:54.235408 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:54.235557 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:54.235675 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:54.241308 55409 executor.go:111] Tasks: 126 done / 138 total; 4 can run I0611 09:18:54.241535 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:54.241816 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:54.242407 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:54.242602 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:54.242722 55409 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0611 09:18:54.243150 55409 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0611 09:18:54.243517 55409 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0611 09:18:54.250675 55409 target.go:111] Terraform output is in /tmp/test2441886970/out --- PASS: TestMinimalIPv6Calico (1.78s) === RUN TestMinimalIPv6Cilium I0611 09:18:54.256429 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:54.256562 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:54.256605 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:54.256648 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:54.256687 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:54.256743 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:54.256826 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:54.256855 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:54.256893 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:54.256918 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:54.289919 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:18:54.294497 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:54.294597 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:55.597368 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:55.808038 55409 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0611 09:18:55.808236 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:55.808260 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:55.808333 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:55.817109 55409 executor.go:111] Tasks: 47 done / 137 total; 25 can run I0611 09:18:55.820765 55409 executor.go:111] Tasks: 72 done / 137 total; 36 can run I0611 09:18:55.821680 55409 executor.go:111] Tasks: 108 done / 137 total; 9 can run I0611 09:18:55.822160 55409 executor.go:111] Tasks: 117 done / 137 total; 8 can run I0611 09:18:55.822424 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:55.822515 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:55.822638 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:55.822722 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:55.828156 55409 executor.go:111] Tasks: 125 done / 137 total; 4 can run I0611 09:18:55.828323 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:55.828493 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:55.829019 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:55.829109 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:55.829197 55409 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0611 09:18:55.829528 55409 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0611 09:18:55.829842 55409 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0611 09:18:55.836620 55409 target.go:111] Terraform output is in /tmp/test2896982079/out --- PASS: TestMinimalIPv6Cilium (1.59s) === RUN TestMinimalIPv6NoSubnetPrefix I0611 09:18:55.841885 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:55.842059 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:55.842116 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:55.842194 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:55.842262 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:55.842353 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:55.842419 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:55.842478 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:55.842551 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:55.842599 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:55.871909 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:18:55.875715 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:55.875809 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:57.172470 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:57.356791 55409 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0611 09:18:57.357388 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:57.357438 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:57.359225 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:57.366257 55409 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0611 09:18:57.369576 55409 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0611 09:18:57.370521 55409 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0611 09:18:57.371035 55409 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0611 09:18:57.371143 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:57.371234 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:57.371309 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:18:57.371390 55409 loadbalancers.go:35] PageSize not implemented I0611 09:18:57.377149 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:18:57.377328 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:57.377559 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:57.378090 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:57.378181 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:57.378280 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:18:57.378603 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:18:57.378939 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:18:57.385786 55409 target.go:111] Terraform output is in /tmp/test1795950329/out --- PASS: TestMinimalIPv6NoSubnetPrefix (1.55s) === RUN TestMinimalWarmPool I0611 09:18:57.390895 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:57.391034 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:57.391076 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:57.391143 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:57.391201 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:57.391256 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:57.391300 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:57.391330 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:57.391373 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:57.391403 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:57.416225 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:18:57.419639 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:57.419719 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:58.712472 55409 zones.go:93] ListHostedZonesPages { } I0611 09:18:58.934626 55409 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0611 09:18:58.935649 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:18:58.935678 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:18:58.935774 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:18:58.938047 55409 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0611 09:18:58.943543 55409 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0611 09:18:58.944042 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:58.944351 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:58.945203 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:58.945298 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:58.945384 55409 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0611 09:18:58.945684 55409 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0611 09:18:58.946095 55409 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0611 09:18:58.951466 55409 target.go:111] Terraform output is in /tmp/test1939043714/out --- PASS: TestMinimalWarmPool (1.57s) === RUN TestMinimalEtcd I0611 09:18:58.960338 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:58.960480 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:58.960526 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:58.960572 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:58.960612 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:58.960666 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:58.960711 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:58.960738 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:58.960774 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:58.960808 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:58.986608 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:18:58.989939 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:18:58.990025 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:00.405831 55409 zones.go:93] ListHostedZonesPages { } W0611 09:19:00.563012 55409 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc W0611 09:19:00.563078 55409 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 10 W0611 09:19:00.565917 55409 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc I0611 09:19:00.579747 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:19:00.581371 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:00.581409 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:00.581503 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:00.583299 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:19:00.589029 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:19:00.589579 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:00.589814 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:00.590097 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:00.590574 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:00.590690 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:19:00.590957 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:19:00.591317 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:19:00.596485 55409 target.go:111] Terraform output is in /tmp/test2132164351/out --- PASS: TestMinimalEtcd (1.64s) === RUN TestMinimalGp3 I0611 09:19:00.605006 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:00.605150 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:00.605194 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:00.605243 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:00.605284 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:00.605336 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:00.605382 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:00.605409 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:00.605447 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:00.605476 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:00.631355 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:00.634654 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:00.634744 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:02.093836 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:02.268908 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:19:02.269641 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:02.269675 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:02.269809 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:02.272399 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:19:02.277028 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:19:02.277336 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:02.277518 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:02.277806 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:02.278167 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:02.278290 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:19:02.278491 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:19:02.278857 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:19:02.284332 55409 target.go:111] Terraform output is in /tmp/test2349054626/out --- PASS: TestMinimalGp3 (1.69s) === RUN TestMinimalLongClusterName I0611 09:19:02.292375 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:02.292540 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:02.292585 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:02.292632 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:02.292670 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:02.292720 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:02.292762 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:02.292790 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:02.292828 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:02.292857 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:02.316289 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:02.319445 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:02.319529 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0611 09:19:03.604653 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:03.779230 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:19:03.780258 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:03.780299 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:03.780376 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:03.781970 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:19:03.788015 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:19:03.788700 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:03.788997 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:03.789467 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:03.789537 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:03.789660 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:19:03.789973 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:19:03.790331 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:19:03.800706 55409 target.go:111] Terraform output is in /tmp/test3539861642/out --- PASS: TestMinimalLongClusterName (1.51s) === RUN TestExistingSG I0611 09:19:03.805582 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:03.805727 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:03.805778 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:03.805831 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:03.805874 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:03.805931 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:03.805979 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:03.806009 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:03.806046 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:03.806076 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:03.840031 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:03.843797 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:03.843891 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:03.843949 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:03.844006 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.112139 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:05.294333 55409 executor.go:111] Tasks: 0 done / 163 total; 53 can run I0611 09:19:05.294868 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:05.294896 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:05.294987 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:05.300888 55409 executor.go:111] Tasks: 53 done / 163 total; 26 can run I0611 09:19:05.304337 55409 executor.go:111] Tasks: 79 done / 163 total; 54 can run I0611 09:19:05.305591 55409 executor.go:111] Tasks: 133 done / 163 total; 6 can run W0611 09:19:05.305661 55409 api.go:53] PageSize not implemented W0611 09:19:05.305804 55409 api.go:53] PageSize not implemented W0611 09:19:05.305927 55409 api.go:53] PageSize not implemented W0611 09:19:05.306067 55409 api.go:53] PageSize not implemented I0611 09:19:05.311517 55409 executor.go:111] Tasks: 139 done / 163 total; 8 can run I0611 09:19:05.311696 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.311820 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.312097 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.312297 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.312405 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.312684 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.312864 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.312956 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.313036 55409 executor.go:111] Tasks: 147 done / 163 total; 4 can run I0611 09:19:05.313429 55409 executor.go:111] Tasks: 151 done / 163 total; 12 can run I0611 09:19:05.313815 55409 executor.go:111] Tasks: 163 done / 163 total; 0 can run I0611 09:19:05.322725 55409 target.go:111] Terraform output is in /tmp/test3725173980/out --- PASS: TestExistingSG (1.52s) === RUN TestBastionAdditionalUserData I0611 09:19:05.328682 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:05.328819 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:05.328869 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:05.328918 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:05.328960 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:05.329014 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:05.329060 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:05.329091 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:05.329129 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:05.329158 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:05.362530 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:05.365970 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.366061 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:05.366119 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:06.655695 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:06.835075 55409 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0611 09:19:06.835294 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:06.835314 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:06.835380 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:06.840425 55409 executor.go:111] Tasks: 47 done / 137 total; 30 can run I0611 09:19:06.846206 55409 executor.go:111] Tasks: 77 done / 137 total; 35 can run I0611 09:19:06.847054 55409 executor.go:111] Tasks: 112 done / 137 total; 6 can run W0611 09:19:06.847142 55409 api.go:53] PageSize not implemented W0611 09:19:06.847183 55409 api.go:53] PageSize not implemented W0611 09:19:06.847331 55409 api.go:53] PageSize not implemented I0611 09:19:06.853745 55409 executor.go:111] Tasks: 118 done / 137 total; 7 can run I0611 09:19:06.854031 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:06.854291 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:06.854493 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:06.854754 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:06.855048 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:06.855451 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:06.855576 55409 executor.go:111] Tasks: 125 done / 137 total; 3 can run I0611 09:19:06.855946 55409 executor.go:111] Tasks: 128 done / 137 total; 9 can run I0611 09:19:06.856379 55409 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0611 09:19:06.863312 55409 target.go:111] Terraform output is in /tmp/test2334944286/out --- PASS: TestBastionAdditionalUserData (1.54s) === RUN TestPrivateFlannel I0611 09:19:06.868711 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:06.868845 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:06.868892 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:06.868938 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:06.868979 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:06.869032 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:06.869118 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:06.869147 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:06.869187 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:06.869217 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:06.896403 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:19:06.899711 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:06.899790 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:06.899842 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:08.202522 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:08.399757 55409 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0611 09:19:08.400231 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:08.400264 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:08.400368 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:08.407735 55409 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0611 09:19:08.411325 55409 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0611 09:19:08.411998 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:08.412175 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:08.412284 55409 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0611 09:19:08.412349 55409 api.go:53] PageSize not implemented W0611 09:19:08.412448 55409 api.go:53] PageSize not implemented I0611 09:19:08.417951 55409 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0611 09:19:08.418283 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:08.418499 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:08.418967 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:08.419038 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:08.419146 55409 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0611 09:19:08.419448 55409 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0611 09:19:08.419788 55409 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0611 09:19:08.426861 55409 target.go:111] Terraform output is in /tmp/test3631306555/out --- PASS: TestPrivateFlannel (1.56s) === RUN TestPrivateCalico I0611 09:19:08.432231 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:08.432368 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:08.432413 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:08.432459 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:08.432501 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:08.432556 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:08.432640 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:08.432673 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:08.432713 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:08.432745 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:08.461677 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:19:08.465042 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:08.465118 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:08.465167 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:09.773446 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:10.224735 55409 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0611 09:19:10.225276 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:10.225303 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:10.225372 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:10.227082 55409 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0611 09:19:10.230310 55409 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0611 09:19:10.230895 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:10.231010 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:10.231190 55409 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0611 09:19:10.231335 55409 api.go:53] PageSize not implemented W0611 09:19:10.231593 55409 api.go:53] PageSize not implemented I0611 09:19:10.241619 55409 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0611 09:19:10.241969 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:10.242265 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:10.242842 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:10.243076 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:10.243193 55409 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0611 09:19:10.243565 55409 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0611 09:19:10.244343 55409 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0611 09:19:10.252226 55409 target.go:111] Terraform output is in /tmp/test2913371929/out --- PASS: TestPrivateCalico (1.83s) === RUN TestPrivateCilium I0611 09:19:10.258512 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:10.258650 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:10.258696 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:10.258748 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:10.258791 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:10.258846 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:10.258891 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:10.258921 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:10.258959 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:10.258988 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:10.286392 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:10.289594 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:10.289663 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:10.289709 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:11.568257 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:11.787471 55409 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0611 09:19:11.788288 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:11.788337 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:11.788480 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:11.790594 55409 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0611 09:19:11.794116 55409 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0611 09:19:11.794510 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:11.794675 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:11.794983 55409 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0611 09:19:11.795192 55409 api.go:53] PageSize not implemented W0611 09:19:11.795270 55409 api.go:53] PageSize not implemented I0611 09:19:11.800780 55409 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0611 09:19:11.801056 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:11.801226 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:11.801525 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:11.801945 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:11.802059 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:19:11.802362 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:19:11.802701 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:19:11.809492 55409 target.go:111] Terraform output is in /tmp/test1971361317/out --- PASS: TestPrivateCilium (1.56s) === RUN TestPrivateCilium2 I0611 09:19:11.814622 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:11.814755 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:11.814802 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:11.814850 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:11.814889 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:11.814944 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:11.815027 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:11.815056 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:11.815098 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:11.815127 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:11.848821 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:19:11.852552 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:11.852647 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:11.852707 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:13.165934 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:13.826599 55409 executor.go:111] Tasks: 0 done / 138 total; 50 can run I0611 09:19:13.828132 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:13.828183 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:13.828319 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:13.829861 55409 executor.go:111] Tasks: 50 done / 138 total; 30 can run I0611 09:19:13.833193 55409 executor.go:111] Tasks: 80 done / 138 total; 36 can run I0611 09:19:13.834025 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:13.834186 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:13.834301 55409 executor.go:111] Tasks: 116 done / 138 total; 6 can run W0611 09:19:13.834473 55409 api.go:53] PageSize not implemented W0611 09:19:13.834597 55409 api.go:53] PageSize not implemented I0611 09:19:13.840066 55409 executor.go:111] Tasks: 122 done / 138 total; 8 can run I0611 09:19:13.840340 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:13.840531 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:13.841012 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:13.841137 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:13.841234 55409 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0611 09:19:13.841528 55409 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0611 09:19:13.841867 55409 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0611 09:19:13.855167 55409 target.go:111] Terraform output is in /tmp/test3208278653/out --- PASS: TestPrivateCilium2 (2.05s) === RUN TestPrivateCiliumAdvanced I0611 09:19:13.865711 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:13.865848 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:13.865894 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:13.865943 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:13.866008 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:13.866062 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:13.866103 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:13.866132 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:13.866171 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:13.866199 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:13.897922 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:13.901210 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:13.901286 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:13.901332 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:15.171510 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:15.389601 55409 executor.go:111] Tasks: 0 done / 142 total; 54 can run I0611 09:19:15.389967 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:15.390006 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:15.390096 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:15.393321 55409 executor.go:111] Tasks: 54 done / 142 total; 30 can run I0611 09:19:15.396828 55409 executor.go:111] Tasks: 84 done / 142 total; 36 can run I0611 09:19:15.397388 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:15.397600 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:15.397715 55409 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0611 09:19:15.397758 55409 api.go:53] PageSize not implemented W0611 09:19:15.397852 55409 api.go:53] PageSize not implemented I0611 09:19:15.404260 55409 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0611 09:19:15.404656 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:15.404957 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:15.405443 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:15.405551 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:15.405667 55409 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0611 09:19:15.405954 55409 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0611 09:19:15.406302 55409 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0611 09:19:15.413680 55409 target.go:111] Terraform output is in /tmp/test1602131107/out --- PASS: TestPrivateCiliumAdvanced (1.55s) === RUN TestPrivateCiliumENI I0611 09:19:15.419163 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:15.419306 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:15.419354 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:15.419400 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:15.419438 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:15.419493 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:15.419536 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:15.419565 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:15.419604 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:15.419638 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:15.453652 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:15.457361 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:15.457514 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:15.457603 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:16.720614 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:16.931411 55409 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0611 09:19:16.932224 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:16.932259 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:16.932354 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:16.934684 55409 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0611 09:19:16.938134 55409 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0611 09:19:16.938810 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:16.938965 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:16.939066 55409 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0611 09:19:16.939107 55409 api.go:53] PageSize not implemented W0611 09:19:16.939264 55409 api.go:53] PageSize not implemented I0611 09:19:16.944620 55409 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0611 09:19:16.945341 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:16.945560 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:16.945777 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:16.946421 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:16.946528 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:19:16.946800 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:19:16.947130 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:19:16.953974 55409 target.go:111] Terraform output is in /tmp/test4195880037/out --- PASS: TestPrivateCiliumENI (1.54s) === RUN TestPrivateCanal I0611 09:19:16.959173 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:16.959304 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:16.959345 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:16.959389 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:16.959430 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:16.959481 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:16.959565 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:16.959597 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:16.959636 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:16.959668 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:16.986112 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:19:16.989185 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:16.989257 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:16.989311 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:18.558684 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:18.981281 55409 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0611 09:19:18.982058 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:18.982092 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:18.982226 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:18.984301 55409 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0611 09:19:18.991495 55409 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0611 09:19:18.992024 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:18.992246 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:18.992461 55409 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0611 09:19:18.992548 55409 api.go:53] PageSize not implemented W0611 09:19:18.992701 55409 api.go:53] PageSize not implemented I0611 09:19:18.998880 55409 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0611 09:19:18.999114 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:18.999388 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:18.999856 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:18.999981 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:19.000113 55409 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0611 09:19:19.000400 55409 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0611 09:19:19.000802 55409 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0611 09:19:19.008024 55409 target.go:111] Terraform output is in /tmp/test1837416732/out --- PASS: TestPrivateCanal (2.07s) === RUN TestPrivateKopeio I0611 09:19:19.025039 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:19.025182 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:19.025228 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:19.025280 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:19.025323 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:19.025376 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:19.025420 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:19.025449 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:19.025489 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:19.025517 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:19.053893 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:19.057467 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:19.057552 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:19.057610 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:20.374912 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:20.558692 55409 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0611 09:19:20.559092 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:20.559142 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:20.559246 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:20.562357 55409 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0611 09:19:20.565885 55409 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0611 09:19:20.566375 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:20.566606 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:20.566743 55409 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0611 09:19:20.566980 55409 api.go:53] PageSize not implemented W0611 09:19:20.567124 55409 api.go:53] PageSize not implemented I0611 09:19:20.572838 55409 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0611 09:19:20.573121 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:20.573338 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:20.573612 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:20.574074 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:20.574181 55409 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0611 09:19:20.574510 55409 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0611 09:19:20.574851 55409 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0611 09:19:20.582005 55409 target.go:111] Terraform output is in /tmp/test3600892542/out --- PASS: TestPrivateKopeio (1.57s) === RUN TestUnmanaged I0611 09:19:20.591135 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:20.591286 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:20.591338 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:20.591391 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:20.591430 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:20.591485 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:20.591532 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:20.591560 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:20.591597 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:20.591628 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:20.621385 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:20.625009 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:20.625092 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:20.625150 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:21.931923 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:22.103552 55409 executor.go:111] Tasks: 0 done / 126 total; 46 can run I0611 09:19:22.106842 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:22.106869 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:22.106935 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:22.109756 55409 executor.go:111] Tasks: 46 done / 126 total; 27 can run I0611 09:19:22.113577 55409 executor.go:111] Tasks: 73 done / 126 total; 33 can run I0611 09:19:22.114287 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:22.114580 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:22.114737 55409 executor.go:111] Tasks: 106 done / 126 total; 5 can run W0611 09:19:22.114784 55409 api.go:53] PageSize not implemented W0611 09:19:22.114907 55409 api.go:53] PageSize not implemented I0611 09:19:22.120433 55409 executor.go:111] Tasks: 111 done / 126 total; 7 can run I0611 09:19:22.120780 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:22.121067 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:22.121568 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:22.121660 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:22.121750 55409 executor.go:111] Tasks: 118 done / 126 total; 2 can run I0611 09:19:22.122102 55409 executor.go:111] Tasks: 120 done / 126 total; 6 can run I0611 09:19:22.122417 55409 executor.go:111] Tasks: 126 done / 126 total; 0 can run I0611 09:19:22.128834 55409 target.go:111] Terraform output is in /tmp/test628413614/out --- PASS: TestUnmanaged (1.54s) === RUN TestPrivateSharedSubnet I0611 09:19:22.133764 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:22.133919 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:22.133962 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:22.134008 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:22.134049 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:22.134099 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:22.134141 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:22.134168 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:22.134208 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:22.134234 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:22.161629 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:22.164826 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:22.164898 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:22.164945 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:23.449253 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:23.627550 55409 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0611 09:19:23.628302 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:23.628350 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:23.628475 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:23.631029 55409 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0611 09:19:23.631450 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:19:23.634196 55409 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0611 09:19:23.634644 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:23.634781 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:23.634897 55409 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0611 09:19:23.634950 55409 api.go:53] PageSize not implemented W0611 09:19:23.635053 55409 api.go:53] PageSize not implemented I0611 09:19:23.641515 55409 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0611 09:19:23.641780 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:23.642114 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:23.643336 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:23.643693 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:23.643968 55409 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0611 09:19:23.645395 55409 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0611 09:19:23.646602 55409 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0611 09:19:23.653126 55409 target.go:111] Terraform output is in /tmp/test2623379355/out --- PASS: TestPrivateSharedSubnet (1.52s) === RUN TestPrivateSharedIP I0611 09:19:23.658135 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:23.658269 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:23.658313 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:23.658361 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:23.658403 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:23.658456 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:23.658495 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:23.658525 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:23.658561 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:23.658589 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:23.685825 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:23.689248 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:23.689334 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:23.689390 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:24.986388 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:25.163274 55409 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0611 09:19:25.164000 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:25.164043 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:25.164157 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:25.166768 55409 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0611 09:19:25.167435 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:19:25.169754 55409 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0611 09:19:25.170033 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:25.170244 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:25.170503 55409 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0611 09:19:25.170663 55409 api.go:53] PageSize not implemented W0611 09:19:25.170714 55409 api.go:53] PageSize not implemented I0611 09:19:25.176157 55409 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0611 09:19:25.176433 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:25.176616 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:25.177085 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:25.177169 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:25.177288 55409 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0611 09:19:25.177631 55409 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0611 09:19:25.177940 55409 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0611 09:19:25.184682 55409 target.go:111] Terraform output is in /tmp/test33454870/out --- PASS: TestPrivateSharedIP (1.53s) === RUN TestPrivateDns1 I0611 09:19:25.189680 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:25.189835 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:25.189882 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:25.189940 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:25.189993 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:25.190060 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:25.190111 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:25.190155 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:25.190215 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:25.190248 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0611 09:19:25.226827 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:25.226912 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:25.226970 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:26.763489 55409 executor.go:111] Tasks: 0 done / 135 total; 46 can run I0611 09:19:26.772890 55409 executor.go:111] Tasks: 46 done / 135 total; 28 can run I0611 09:19:26.773331 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "internal.example.com" I0611 09:19:26.773386 55409 zones.go:40] GetHostedZone { Id: "/hostedzone/Z2AFAKE1ZON3NO" } I0611 09:19:26.773524 55409 dnszone.go:248] Existing zone "internal.example.com." found; will configure TF to reuse I0611 09:19:26.773553 55409 dnszone.go:271] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding I0611 09:19:26.773742 55409 executor.go:111] Tasks: 74 done / 135 total; 39 can run I0611 09:19:26.774327 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:26.774546 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:26.777227 55409 executor.go:111] Tasks: 113 done / 135 total; 6 can run W0611 09:19:26.777492 55409 api.go:53] PageSize not implemented W0611 09:19:26.777627 55409 api.go:53] PageSize not implemented I0611 09:19:26.783078 55409 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0611 09:19:26.783351 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:26.783500 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:26.783854 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:26.784242 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:26.784357 55409 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0611 09:19:26.784726 55409 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0611 09:19:26.785062 55409 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0611 09:19:26.792324 55409 target.go:111] Terraform output is in /tmp/test1159593695/out --- PASS: TestPrivateDns1 (1.61s) === RUN TestPrivateDns2 I0611 09:19:26.797363 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:26.797493 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:26.797541 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:26.797591 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:26.797633 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:26.797684 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:26.797727 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:26.797758 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:26.797859 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:26.797892 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:26.831513 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:26.831669 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:26.831772 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:28.316136 55409 executor.go:111] Tasks: 0 done / 132 total; 45 can run I0611 09:19:28.322090 55409 executor.go:111] Tasks: 45 done / 132 total; 26 can run I0611 09:19:28.322417 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:19:28.322515 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "private.example.com" I0611 09:19:28.322560 55409 zones.go:40] GetHostedZone { Id: "/hostedzone/Z3AFAKE1ZOMORE" } I0611 09:19:28.322654 55409 dnszone.go:248] Existing zone "private.example.com." found; will configure TF to reuse I0611 09:19:28.322674 55409 dnszone.go:262] VPC "vpc-12345678" already associated with zone "private.example.com." I0611 09:19:28.322987 55409 executor.go:111] Tasks: 71 done / 132 total; 39 can run I0611 09:19:28.323635 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:28.323804 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:28.325952 55409 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0611 09:19:28.326030 55409 api.go:53] PageSize not implemented W0611 09:19:28.326185 55409 api.go:53] PageSize not implemented I0611 09:19:28.331483 55409 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0611 09:19:28.331666 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:28.331975 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:28.332105 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:28.334335 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:28.334647 55409 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0611 09:19:28.335452 55409 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0611 09:19:28.336791 55409 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0611 09:19:28.343981 55409 target.go:111] Terraform output is in /tmp/test558324005/out --- PASS: TestPrivateDns2 (1.55s) === RUN TestDiscoveryFeatureGate I0611 09:19:28.348941 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:28.349071 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:28.349114 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:28.349198 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:28.349240 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:28.349377 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:28.349511 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:28.349586 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:28.349688 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:28.349763 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:28.375939 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:19:28.379290 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:28.379375 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:29.654092 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:29.871048 55409 executor.go:111] Tasks: 0 done / 113 total; 52 can run I0611 09:19:29.871639 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:29.871678 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:29.871826 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:29.875365 55409 executor.go:111] Tasks: 52 done / 113 total; 28 can run I0611 09:19:29.884895 55409 executor.go:111] Tasks: 80 done / 113 total; 25 can run I0611 09:19:29.885508 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:29.885693 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:29.886277 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:29.886366 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:29.886459 55409 executor.go:111] Tasks: 105 done / 113 total; 2 can run I0611 09:19:29.886819 55409 executor.go:111] Tasks: 107 done / 113 total; 6 can run I0611 09:19:29.887129 55409 executor.go:111] Tasks: 113 done / 113 total; 0 can run I0611 09:19:29.894156 55409 target.go:111] Terraform output is in /tmp/test1609058894/out --- PASS: TestDiscoveryFeatureGate (1.55s) === RUN TestVFSServiceAccountIssuerDiscovery I0611 09:19:29.900337 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:29.900471 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:29.900517 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:29.900561 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:29.900599 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:29.900653 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:29.900698 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:29.900728 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:29.900766 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:29.900793 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:29.924465 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:29.927204 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:29.927280 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:31.213722 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:31.396836 55409 executor.go:111] Tasks: 0 done / 104 total; 47 can run I0611 09:19:31.398858 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:31.398906 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:31.399026 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:31.401223 55409 executor.go:111] Tasks: 47 done / 104 total; 24 can run I0611 09:19:31.407238 55409 executor.go:111] Tasks: 71 done / 104 total; 25 can run I0611 09:19:31.407460 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:31.407994 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:31.408492 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:31.408588 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:31.408720 55409 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0611 09:19:31.409071 55409 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0611 09:19:31.409396 55409 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0611 09:19:31.418251 55409 target.go:111] Terraform output is in /tmp/test1144256238/out --- PASS: TestVFSServiceAccountIssuerDiscovery (1.52s) === RUN TestAWSLBController I0611 09:19:31.423291 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:31.423503 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:31.423577 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:31.423657 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:31.423713 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:31.423763 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:31.423804 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:31.423835 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:31.423872 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:31.423912 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:31.449801 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:31.453191 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:31.453280 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:32.716302 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:33.450896 55409 executor.go:111] Tasks: 0 done / 116 total; 54 can run I0611 09:19:33.451888 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:33.451921 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:33.452021 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:33.456095 55409 executor.go:111] Tasks: 54 done / 116 total; 29 can run I0611 09:19:33.465981 55409 executor.go:111] Tasks: 83 done / 116 total; 25 can run I0611 09:19:33.466613 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:33.466859 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:33.467322 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:33.467390 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:33.467500 55409 executor.go:111] Tasks: 108 done / 116 total; 2 can run I0611 09:19:33.467812 55409 executor.go:111] Tasks: 110 done / 116 total; 6 can run I0611 09:19:33.468188 55409 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0611 09:19:33.475873 55409 target.go:111] Terraform output is in /tmp/test1742887847/out --- PASS: TestAWSLBController (2.06s) === RUN TestManyAddons I0611 09:19:33.486763 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:33.486901 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:33.486948 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:33.487003 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:33.487047 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:33.487106 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:33.487150 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:33.487180 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:33.487222 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:33.487252 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:33.512532 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:33.515483 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:33.515557 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:34.784494 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:35.609867 55409 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0611 09:19:35.615471 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:35.616042 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:35.616137 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:35.619829 55409 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0611 09:19:35.625641 55409 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0611 09:19:35.626070 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:35.626348 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:35.626581 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:35.627210 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:35.627369 55409 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0611 09:19:35.627756 55409 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0611 09:19:35.628206 55409 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0611 09:19:35.634942 55409 target.go:111] Terraform output is in /tmp/test3040062004/out --- PASS: TestManyAddons (2.16s) === RUN TestManyAddonsCCMIRSA I0611 09:19:35.646070 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:35.646226 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:35.646273 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:35.646322 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:35.646359 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:35.646414 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:35.646460 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:35.646488 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:35.646525 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:35.646553 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:35.675747 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:35.679436 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:35.679525 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:36.966279 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:37.839424 55409 executor.go:111] Tasks: 0 done / 123 total; 59 can run I0611 09:19:37.840151 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:37.840207 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:37.840291 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:37.845220 55409 executor.go:111] Tasks: 59 done / 123 total; 30 can run I0611 09:19:37.851205 55409 executor.go:111] Tasks: 89 done / 123 total; 26 can run I0611 09:19:37.851530 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:37.851965 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:37.852227 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:37.852393 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:37.852510 55409 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0611 09:19:37.852846 55409 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0611 09:19:37.853206 55409 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0611 09:19:37.866046 55409 target.go:111] Terraform output is in /tmp/test2980245804/out --- PASS: TestManyAddonsCCMIRSA (2.23s) === RUN TestManyAddonsCCMIRSA23 I0611 09:19:37.876227 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:37.876366 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:37.876416 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:37.876466 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:37.876510 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:37.876566 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:37.876612 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:37.876644 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:37.876682 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:37.876711 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:37.904062 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0611 09:19:37.907566 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:37.907652 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:39.187190 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:40.036315 55409 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0611 09:19:40.038194 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:40.038230 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:40.038333 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:40.043612 55409 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0611 09:19:40.049811 55409 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0611 09:19:40.050365 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:40.050603 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:40.051059 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:40.051185 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:40.051293 55409 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0611 09:19:40.051613 55409 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0611 09:19:40.051961 55409 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0611 09:19:40.060475 55409 target.go:111] Terraform output is in /tmp/test3981618401/out --- PASS: TestManyAddonsCCMIRSA23 (2.20s) === RUN TestManyAddonsCCMIRSA24 I0611 09:19:40.072586 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:40.072723 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:40.072769 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:40.072816 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:40.072855 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:40.072905 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:40.072947 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:40.072978 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:40.073023 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:40.073052 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:40.104318 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:19:40.108958 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:40.109048 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:41.416358 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:42.283616 55409 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0611 09:19:42.286145 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:42.286201 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:42.286318 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:42.288120 55409 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0611 09:19:42.298723 55409 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0611 09:19:42.299871 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:42.300240 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:42.300600 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:42.300762 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:42.300929 55409 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0611 09:19:42.301251 55409 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0611 09:19:42.301581 55409 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0611 09:19:42.310028 55409 target.go:111] Terraform output is in /tmp/test1360465438/out --- PASS: TestManyAddonsCCMIRSA24 (2.25s) === RUN TestManyAddonsCCMIRSA25 I0611 09:19:42.322284 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:42.322455 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:42.322518 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:42.322609 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:42.322676 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:42.322768 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:42.322834 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:42.322890 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:42.322963 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:42.323012 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:42.350010 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0611 09:19:42.353231 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:42.353325 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:43.643266 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:44.508472 55409 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0611 09:19:44.509570 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:44.509597 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:44.509662 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:44.515525 55409 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0611 09:19:44.522814 55409 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0611 09:19:44.523295 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:44.523567 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:44.524030 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:44.524170 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:44.524295 55409 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0611 09:19:44.524681 55409 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0611 09:19:44.525025 55409 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0611 09:19:44.533207 55409 target.go:111] Terraform output is in /tmp/test266161290/out --- PASS: TestManyAddonsCCMIRSA25 (2.22s) === RUN TestManyAddonsCCMIRSA26 I0611 09:19:44.544867 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:44.545006 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:44.545053 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:44.545105 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:44.545148 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:44.545202 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:44.545246 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:44.545275 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:44.545313 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:44.545341 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:44.576703 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0611 09:19:44.581308 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:44.581469 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:45.869363 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:46.764504 55409 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0611 09:19:46.768682 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:46.768733 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:46.768857 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:46.771850 55409 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0611 09:19:46.777515 55409 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0611 09:19:46.777768 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:46.778107 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:46.778345 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:46.778832 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:46.778944 55409 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0611 09:19:46.779291 55409 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0611 09:19:46.779660 55409 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0611 09:19:46.787518 55409 target.go:111] Terraform output is in /tmp/test1004660657/out --- PASS: TestManyAddonsCCMIRSA26 (2.26s) === RUN TestManyAddonsGCE I0611 09:19:46.804895 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:19:49.022112 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:19:49.022171 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:19:49.022247 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/main" W0611 09:19:49.022264 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/events" W0611 09:19:49.022280 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com" W0611 09:19:49.022323 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0611 09:19:49.023207 55409 executor.go:111] Tasks: 0 done / 67 total; 44 can run I0611 09:19:49.031848 55409 executor.go:111] Tasks: 44 done / 67 total; 17 can run I0611 09:19:49.039442 55409 executor.go:111] Tasks: 61 done / 67 total; 4 can run I0611 09:19:49.040458 55409 executor.go:111] Tasks: 65 done / 67 total; 2 can run I0611 09:19:49.040680 55409 executor.go:111] Tasks: 67 done / 67 total; 0 can run I0611 09:19:49.044815 55409 target.go:111] Terraform output is in /tmp/test2456242052/out --- PASS: TestManyAddonsGCE (2.25s) === RUN TestCCM I0611 09:19:49.052739 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:49.052878 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:49.052924 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:49.052970 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:49.053008 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:49.053063 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:49.053106 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:49.053134 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:49.053174 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:49.053204 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:49.085330 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:49.089611 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:49.089716 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:50.376909 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:51.213423 55409 executor.go:111] Tasks: 0 done / 110 total; 51 can run I0611 09:19:51.213946 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:51.213974 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:51.214056 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:51.217659 55409 executor.go:111] Tasks: 51 done / 110 total; 24 can run I0611 09:19:51.226860 55409 executor.go:111] Tasks: 75 done / 110 total; 27 can run I0611 09:19:51.227364 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:51.227805 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:51.228017 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:51.228492 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:51.228605 55409 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0611 09:19:51.228923 55409 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0611 09:19:51.229406 55409 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0611 09:19:51.236719 55409 target.go:111] Terraform output is in /tmp/test484485149/out --- PASS: TestCCM (2.19s) === RUN TestExternalDNS I0611 09:19:51.246724 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:51.246855 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:51.246904 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:51.246952 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:51.246992 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:51.247042 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:51.247089 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:51.247117 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:51.247157 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:51.247186 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:51.270991 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:51.273971 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:51.274055 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:52.573661 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:52.757437 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:19:52.758575 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:52.758606 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:52.758694 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:52.761165 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:19:52.767062 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:19:52.767294 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:52.767814 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:52.769111 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:52.769525 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:52.769721 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:19:52.770418 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:19:52.771929 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:19:52.778638 55409 target.go:111] Terraform output is in /tmp/test2835879442/out --- PASS: TestExternalDNS (1.54s) === RUN TestExternalDNSIRSA I0611 09:19:52.783788 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:52.783994 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:52.784045 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:52.784096 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:52.784137 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:52.784192 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:52.784237 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:52.784265 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:52.784303 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:52.784330 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:52.809073 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:52.812472 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:52.812561 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:54.099735 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:54.316651 55409 executor.go:111] Tasks: 0 done / 112 total; 51 can run I0611 09:19:54.317177 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:54.317216 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:54.317347 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:54.321166 55409 executor.go:111] Tasks: 51 done / 112 total; 28 can run I0611 09:19:54.331581 55409 executor.go:111] Tasks: 79 done / 112 total; 25 can run I0611 09:19:54.331869 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:54.332430 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:54.332623 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:54.332965 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:54.333099 55409 executor.go:111] Tasks: 104 done / 112 total; 2 can run I0611 09:19:54.333433 55409 executor.go:111] Tasks: 106 done / 112 total; 6 can run I0611 09:19:54.333812 55409 executor.go:111] Tasks: 112 done / 112 total; 0 can run I0611 09:19:54.340564 55409 target.go:111] Terraform output is in /tmp/test1375023581/out --- PASS: TestExternalDNSIRSA (1.56s) === RUN TestKarpenter I0611 09:19:54.346466 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:54.346597 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:54.346640 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:54.346685 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:54.346729 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:54.346783 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:54.346827 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:54.346854 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:54.346892 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:54.346917 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:54.377502 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:19:54.380800 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:54.380869 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:54.380915 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:55.688366 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:55.885293 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:55.885414 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:55.885506 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0611 09:19:56.032895 55409 pruning.go:115] manifest includes an object of GroupKind Secret, which will not be pruned W0611 09:19:56.032967 55409 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0611 09:19:56.032987 55409 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned W0611 09:19:56.032999 55409 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0611 09:19:56.033011 55409 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned I0611 09:19:56.059761 55409 executor.go:111] Tasks: 0 done / 122 total; 54 can run I0611 09:19:56.061368 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:56.061411 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:56.061501 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:56.066610 55409 executor.go:111] Tasks: 54 done / 122 total; 31 can run I0611 09:19:56.072260 55409 executor.go:111] Tasks: 85 done / 122 total; 29 can run I0611 09:19:56.072622 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:56.072969 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:56.073250 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:56.073480 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:56.073801 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:56.073916 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:56.074060 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:56.074411 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:56.074563 55409 executor.go:111] Tasks: 114 done / 122 total; 2 can run I0611 09:19:56.074929 55409 executor.go:111] Tasks: 116 done / 122 total; 6 can run I0611 09:19:56.075344 55409 executor.go:111] Tasks: 122 done / 122 total; 0 can run I0611 09:19:56.082682 55409 target.go:111] Terraform output is in /tmp/test550169387/out --- PASS: TestKarpenter (1.74s) === RUN TestSharedSubnet I0611 09:19:56.089825 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:56.089955 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:56.089999 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:56.090045 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:56.090083 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:56.090136 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:56.090177 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:56.090204 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:56.090244 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:56.090272 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:56.118533 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:56.121737 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:56.121827 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:57.433554 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:57.603666 55409 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0611 09:19:57.604088 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:57.604127 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:57.604235 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:57.607160 55409 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0611 09:19:57.608633 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:19:57.617186 55409 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0611 09:19:57.618705 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:57.618995 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:57.619484 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:57.619569 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:57.619705 55409 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0611 09:19:57.620036 55409 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0611 09:19:57.620385 55409 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0611 09:19:57.625436 55409 target.go:111] Terraform output is in /tmp/test206166208/out --- PASS: TestSharedSubnet (1.54s) === RUN TestSharedVPC I0611 09:19:57.631006 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:57.631168 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:57.631218 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:57.631268 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:57.631312 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:57.631401 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:57.631484 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:57.631523 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:57.631565 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:57.631595 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:57.655470 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:19:57.658661 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:57.658763 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:58.919854 55409 zones.go:93] ListHostedZonesPages { } I0611 09:19:59.099654 55409 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0611 09:19:59.101591 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:19:59.101640 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:19:59.101742 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:19:59.103779 55409 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0611 09:19:59.104334 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:19:59.112263 55409 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0611 09:19:59.112704 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:59.113040 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:59.113316 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:59.113814 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:59.113925 55409 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0611 09:19:59.114213 55409 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0611 09:19:59.114587 55409 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0611 09:19:59.119758 55409 target.go:111] Terraform output is in /tmp/test1490016559/out --- PASS: TestSharedVPC (1.49s) === RUN TestSharedVPCIPv6 I0611 09:19:59.124346 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:19:59.124493 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:19:59.124537 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:19:59.124579 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:19:59.124617 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:19:59.124671 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:19:59.124716 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:19:59.124744 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:19:59.124783 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:19:59.124814 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:19:59.126822 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:19:59.126880 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:19:59.153331 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:19:59.153387 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0611 09:19:59.153487 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:19:59.157289 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:19:59.157367 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:00.440695 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:00.626786 55409 executor.go:111] Tasks: 0 done / 133 total; 45 can run I0611 09:20:00.627259 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:00.627293 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:00.627388 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:00.632770 55409 executor.go:111] Tasks: 45 done / 133 total; 29 can run I0611 09:20:00.635754 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:20:00.635930 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:20:00.638002 55409 executor.go:111] Tasks: 74 done / 133 total; 37 can run I0611 09:20:00.639697 55409 executor.go:111] Tasks: 111 done / 133 total; 6 can run I0611 09:20:00.639805 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:00.639885 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:00.640006 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:00.640088 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:00.645337 55409 executor.go:111] Tasks: 117 done / 133 total; 8 can run I0611 09:20:00.645654 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:00.645947 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:00.646425 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:00.646516 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:00.646718 55409 executor.go:111] Tasks: 125 done / 133 total; 2 can run I0611 09:20:00.647297 55409 executor.go:111] Tasks: 127 done / 133 total; 6 can run I0611 09:20:00.647671 55409 executor.go:111] Tasks: 133 done / 133 total; 0 can run I0611 09:20:00.654129 55409 target.go:111] Terraform output is in /tmp/test3743923037/out --- PASS: TestSharedVPCIPv6 (1.53s) === RUN TestExistingIAM I0611 09:20:00.659066 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:00.659196 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:00.659240 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:00.659283 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:00.659321 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:00.659376 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:00.659418 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:00.659446 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:00.659485 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:00.659513 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:00.691833 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:00.695424 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:00.695888 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:00.695951 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:00.696010 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:01.980724 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:02.155741 55409 executor.go:111] Tasks: 0 done / 117 total; 51 can run I0611 09:20:02.158307 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:02.158369 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:02.158513 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:02.165050 55409 executor.go:111] Tasks: 51 done / 117 total; 19 can run I0611 09:20:02.170868 55409 executor.go:111] Tasks: 70 done / 117 total; 31 can run I0611 09:20:02.171087 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.171295 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.171738 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.171947 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.172190 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.172311 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.172452 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.172539 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.172672 55409 executor.go:111] Tasks: 101 done / 117 total; 4 can run I0611 09:20:02.173130 55409 executor.go:111] Tasks: 105 done / 117 total; 12 can run I0611 09:20:02.173469 55409 executor.go:111] Tasks: 117 done / 117 total; 0 can run I0611 09:20:02.180342 55409 target.go:111] Terraform output is in /tmp/test75412647/out --- PASS: TestExistingIAM (1.53s) === RUN TestPhaseNetwork I0611 09:20:02.185683 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:02.185812 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:02.185856 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:02.185901 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:02.185939 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:02.185991 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:02.186036 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:02.186066 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:02.186106 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:02.186134 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:02.218895 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:02.222279 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.222371 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:02.222431 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:03.499384 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:03.668605 55409 executor.go:111] Tasks: 0 done / 135 total; 47 can run I0611 09:20:03.669183 55409 executor.go:111] Tasks: 47 done / 135 total; 30 can run I0611 09:20:03.669755 55409 executor.go:111] Tasks: 77 done / 135 total; 36 can run I0611 09:20:03.670219 55409 executor.go:111] Tasks: 113 done / 135 total; 6 can run I0611 09:20:03.670483 55409 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0611 09:20:03.670721 55409 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0611 09:20:03.670820 55409 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0611 09:20:03.670890 55409 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0611 09:20:03.671993 55409 target.go:111] Terraform output is in /tmp/test3303505222/out --- PASS: TestPhaseNetwork (1.49s) === RUN TestExternalLoadBalancer I0611 09:20:03.672572 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:03.672714 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:03.672764 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:03.672816 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:03.672856 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:03.672911 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:03.672964 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:03.672994 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:03.673036 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:03.673065 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:03.698008 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:03.701246 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:03.701349 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.003577 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:05.181460 55409 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0611 09:20:05.182377 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:05.182407 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:05.182483 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:05.185159 55409 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0611 09:20:05.194094 55409 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0611 09:20:05.195300 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.195998 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.196197 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.196760 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.196894 55409 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0611 09:20:05.197214 55409 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0611 09:20:05.197562 55409 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0611 09:20:05.203198 55409 target.go:111] Terraform output is in /tmp/test3857230030/out --- PASS: TestExternalLoadBalancer (1.54s) === RUN TestPhaseIAM integration_test.go:1062: unable to test w/o allowing failed validation --- SKIP: TestPhaseIAM (0.00s) === RUN TestPhaseCluster integration_test.go:1070: unable to test w/o allowing failed validation --- SKIP: TestPhaseCluster (0.00s) === RUN TestMixedInstancesASG I0611 09:20:05.208289 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:05.208426 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:05.208472 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:05.208522 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:05.208565 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:05.208621 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:05.208665 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:05.208693 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:05.208730 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:05.208760 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:05.240736 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:05.244275 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.244356 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.244412 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.244597 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.244645 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.244689 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:05.244736 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.521329 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:06.711877 55409 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0611 09:20:06.712773 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:06.712812 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:06.712909 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:06.715058 55409 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0611 09:20:06.721052 55409 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0611 09:20:06.721336 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.721554 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.721857 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.721978 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.723184 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.723730 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.723931 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.724119 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.724344 55409 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0611 09:20:06.725569 55409 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0611 09:20:06.727311 55409 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0611 09:20:06.735930 55409 target.go:111] Terraform output is in /tmp/test1034144577/out --- PASS: TestMixedInstancesASG (1.53s) === RUN TestMixedInstancesSpotASG I0611 09:20:06.741896 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:06.742032 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:06.742077 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:06.742126 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:06.742165 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:06.742217 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:06.742263 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:06.742291 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:06.742328 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:06.742354 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:06.773583 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:06.776670 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.776738 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.776783 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.776826 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.776865 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.776901 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:06.776935 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.071660 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:08.266786 55409 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0611 09:20:08.267981 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:08.268034 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:08.268131 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:08.271075 55409 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0611 09:20:08.281308 55409 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0611 09:20:08.281876 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.282211 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.282423 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.282663 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.282833 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.282958 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.283055 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.283333 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.283461 55409 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0611 09:20:08.283832 55409 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0611 09:20:08.284195 55409 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0611 09:20:08.292574 55409 target.go:111] Terraform output is in /tmp/test448857221/out --- PASS: TestMixedInstancesSpotASG (1.56s) === RUN TestAdditionalObjects I0611 09:20:08.298375 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:08.298504 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:08.298547 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:08.298592 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:08.298630 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:08.298686 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:08.298728 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:08.298756 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:08.298793 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:08.298820 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:08.321667 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0611 09:20:08.324007 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:08.324069 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:09.610728 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:09.771169 55409 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0611 09:20:09.772148 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:09.772182 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:09.772272 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:09.776377 55409 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0611 09:20:09.782163 55409 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0611 09:20:09.782615 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:09.784255 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:09.784727 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:09.785212 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:09.785409 55409 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0611 09:20:09.786215 55409 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0611 09:20:09.786778 55409 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0611 09:20:09.793562 55409 target.go:111] Terraform output is in /tmp/test1218267833/out --- PASS: TestAdditionalObjects (1.50s) === RUN TestContainerd I0611 09:20:09.798617 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:09.798758 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:09.798807 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:09.798858 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:09.798900 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:09.798956 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:09.799001 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:09.799031 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:09.799070 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:09.799099 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:09.823182 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:09.826123 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:09.826209 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:11.137696 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:11.309356 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:20:11.311323 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:11.311361 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:11.311468 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:11.313554 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:20:11.319218 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:20:11.319514 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:11.319745 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:11.320256 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:11.320370 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:11.320494 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:20:11.321215 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:20:11.321555 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:20:11.326714 55409 target.go:111] Terraform output is in /tmp/test3262136999/out --- PASS: TestContainerd (1.53s) === RUN TestContainerdCustom I0611 09:20:11.331431 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:11.331571 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:11.331619 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:11.331671 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:11.331712 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:11.331772 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:11.331820 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:11.331851 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:11.331890 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:11.331921 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:11.357516 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:11.360959 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:11.361049 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:11.884249 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:12.051478 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:20:12.051983 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:12.052034 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:12.052167 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:12.054809 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:20:12.060411 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:20:12.061008 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.061353 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.061571 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.062137 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.062261 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:20:12.062588 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:20:12.062921 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:20:12.068307 55409 target.go:111] Terraform output is in /tmp/test3906213482/out --- PASS: TestContainerdCustom (0.74s) === RUN TestDockerCustom I0611 09:20:12.073521 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:12.073673 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:12.073718 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:12.073767 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:12.073806 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:12.073864 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:12.073911 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:12.073940 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:12.073981 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:12.074011 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:12.104226 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0611 09:20:12.107654 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.107742 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.629972 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:12.796435 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:20:12.797879 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:12.797919 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:12.798079 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:12.799557 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:20:12.805701 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:20:12.806114 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.806261 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.806722 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.806851 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.806966 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:20:12.807344 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:20:12.807722 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:20:12.817398 55409 target.go:111] Terraform output is in /tmp/test252514716/out --- PASS: TestDockerCustom (0.75s) === RUN TestAPIServerNodes I0611 09:20:12.822592 55409 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0611 09:20:12.822640 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:12.822835 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:12.822905 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:12.822988 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:12.823063 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:12.823140 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:12.823205 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:12.823254 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:12.823321 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:12.823373 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:12.849581 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0611 09:20:12.852921 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.853003 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:12.853057 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:14.272675 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:14.446998 55409 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0611 09:20:14.447862 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:14.447891 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:14.447971 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:14.455341 55409 executor.go:111] Tasks: 47 done / 114 total; 28 can run I0611 09:20:14.461531 55409 executor.go:111] Tasks: 75 done / 114 total; 27 can run I0611 09:20:14.461764 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:14.462005 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:14.462294 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:14.462378 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:14.462706 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:14.462800 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:14.462889 55409 executor.go:111] Tasks: 102 done / 114 total; 3 can run I0611 09:20:14.463227 55409 executor.go:111] Tasks: 105 done / 114 total; 9 can run I0611 09:20:14.463680 55409 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0611 09:20:14.469785 55409 target.go:111] Terraform output is in /tmp/test1411260506/out I0611 09:20:14.474942 55409 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestAPIServerNodes (1.65s) === RUN TestNTHIMDSProcessor I0611 09:20:14.475071 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:14.475201 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:14.475243 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:14.475288 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:14.475327 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:14.475379 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:14.475423 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:14.475453 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:14.475492 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:14.475518 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:14.505337 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:14.509069 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:14.509161 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:15.788177 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:15.965587 55409 executor.go:111] Tasks: 0 done / 90 total; 44 can run I0611 09:20:15.966155 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:15.966180 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:15.966253 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:15.969122 55409 executor.go:111] Tasks: 44 done / 90 total; 19 can run I0611 09:20:15.975146 55409 executor.go:111] Tasks: 63 done / 90 total; 21 can run I0611 09:20:15.975741 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:15.975958 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:15.976442 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:15.976542 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:15.976632 55409 executor.go:111] Tasks: 84 done / 90 total; 2 can run I0611 09:20:15.976926 55409 executor.go:111] Tasks: 86 done / 90 total; 4 can run I0611 09:20:15.977191 55409 executor.go:111] Tasks: 90 done / 90 total; 0 can run I0611 09:20:15.986506 55409 target.go:111] Terraform output is in /tmp/test407867261/out --- PASS: TestNTHIMDSProcessor (1.52s) === RUN TestNTHIMDSProcessorIRSA I0611 09:20:15.990710 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:15.990842 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:15.990887 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:15.990932 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:15.990969 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:15.991020 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:15.991063 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:15.991092 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:15.991156 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:15.991186 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:16.016768 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:16.019721 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:16.019795 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:17.303840 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:17.514915 55409 executor.go:111] Tasks: 0 done / 101 total; 50 can run I0611 09:20:17.515435 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:17.515498 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:17.515639 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:17.519790 55409 executor.go:111] Tasks: 50 done / 101 total; 24 can run I0611 09:20:17.525698 55409 executor.go:111] Tasks: 74 done / 101 total; 21 can run I0611 09:20:17.526029 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:17.526172 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:17.526502 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:17.526938 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:17.527046 55409 executor.go:111] Tasks: 95 done / 101 total; 2 can run I0611 09:20:17.527312 55409 executor.go:111] Tasks: 97 done / 101 total; 4 can run I0611 09:20:17.527621 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:20:17.536598 55409 target.go:111] Terraform output is in /tmp/test2075686293/out --- PASS: TestNTHIMDSProcessorIRSA (1.55s) === RUN TestCustomIRSA I0611 09:20:17.542472 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:17.542614 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:17.542660 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:17.542710 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:17.542749 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:17.542801 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:17.542845 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:17.542873 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:17.542909 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:17.542943 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:17.570389 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:17.574356 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:17.574481 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:18.866736 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:19.505424 55409 executor.go:111] Tasks: 0 done / 114 total; 52 can run I0611 09:20:19.507531 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:19.507594 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:19.507756 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:19.514288 55409 executor.go:111] Tasks: 52 done / 114 total; 29 can run I0611 09:20:19.522377 55409 executor.go:111] Tasks: 81 done / 114 total; 25 can run I0611 09:20:19.522816 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:19.523086 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:19.523571 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:19.523668 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:19.523755 55409 executor.go:111] Tasks: 106 done / 114 total; 2 can run I0611 09:20:19.524079 55409 executor.go:111] Tasks: 108 done / 114 total; 6 can run I0611 09:20:19.524481 55409 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0611 09:20:19.531256 55409 target.go:111] Terraform output is in /tmp/test4227294552/out --- PASS: TestCustomIRSA (2.00s) === RUN TestClusterNameDigit I0611 09:20:19.543213 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:19.543369 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:19.543420 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:19.543471 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:19.543517 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:19.543575 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:19.543623 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:19.543652 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:19.543690 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:19.543718 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:19.572420 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:19.575887 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:19.575977 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:20.866119 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:21.052042 55409 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0611 09:20:21.052676 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:21.052722 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:21.052822 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:21.057128 55409 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0611 09:20:21.066774 55409 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0611 09:20:21.067678 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:21.068497 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:21.068709 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:21.068955 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:21.069100 55409 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0611 09:20:21.069409 55409 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0611 09:20:21.069685 55409 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0611 09:20:21.075837 55409 target.go:111] Terraform output is in /tmp/test1658795737/out --- PASS: TestClusterNameDigit (1.54s) === RUN TestCASPriorityExpander I0611 09:20:21.081150 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:21.081292 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:21.081339 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:21.081390 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:21.081431 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:21.081487 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:21.081532 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:21.081562 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:21.081601 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:21.081630 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:21.111063 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0611 09:20:21.114411 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:21.114535 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:21.114585 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:21.114647 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0611 09:20:23.051811 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:23.252166 55409 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0611 09:20:23.255343 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:23.255397 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:23.255542 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:23.256942 55409 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0611 09:20:23.267311 55409 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0611 09:20:23.267679 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.267965 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.268514 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.268711 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.268911 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.269329 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.269590 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.269771 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.269892 55409 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0611 09:20:23.270196 55409 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0611 09:20:23.270597 55409 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0611 09:20:23.277895 55409 target.go:111] Terraform output is in /tmp/test2951941678/out --- PASS: TestCASPriorityExpander (2.20s) === RUN TestCASPriorityExpanderCustom I0611 09:20:23.283308 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:23.283444 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:23.283516 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:23.283570 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:23.283614 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:23.283668 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:23.283714 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:23.283741 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:23.283781 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:23.283810 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:20:23.314402 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0611 09:20:23.317687 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.317788 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.317847 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:23.317897 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0611 09:20:24.617021 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:24.819368 55409 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0611 09:20:24.820442 55409 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0611 09:20:24.820498 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:24.820655 55409 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0611 09:20:24.823572 55409 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0611 09:20:24.833180 55409 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0611 09:20:24.833499 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:24.833802 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:24.834114 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:24.834344 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:24.834540 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:24.835000 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:24.835102 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:24.835313 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:24.835431 55409 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0611 09:20:24.835960 55409 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0611 09:20:24.836522 55409 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0611 09:20:24.843291 55409 target.go:111] Terraform output is in /tmp/test3710239549/out --- PASS: TestCASPriorityExpanderCustom (1.57s) === RUN TestLifecycleMinimalAWS I0611 09:20:24.848780 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:24.848917 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:24.848963 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:24.849011 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:24.849051 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:24.849109 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:24.849158 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:24.849187 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:24.849226 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:24.849257 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0611 09:20:24.872736 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0611 09:20:24.875995 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:24.876085 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0611 09:20:26.269422 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:26.450721 55409 iamrole.go:89] ListRoles: { } I0611 09:20:26.452179 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:20:26.452494 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] }] } I0611 09:20:26.452548 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0611 09:20:26.452702 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0611 09:20:26.452773 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:26.452819 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0611 09:20:26.452956 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:26.452993 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0611 09:20:26.453018 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:26.453176 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:26.453221 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:26.453339 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:26.453502 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:26.453683 55409 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.453806 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:20:26.453861 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:26.454026 55409 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.454118 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0611 09:20:26.454175 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0611 09:20:26.454205 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:20:26.454246 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:26.454980 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:26.455166 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.456502 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:20:26.456641 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:26.456758 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0611 09:20:26.456853 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0611 09:20:26.456860 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:26.456907 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0611 09:20:26.456922 55409 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0611 09:20:26.457103 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0611 09:20:26.457023 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0611 09:20:26.457198 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0611 09:20:26.457338 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:26.457446 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:26.457421 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0611 09:20:26.457514 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:26.457573 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0611 09:20:26.457755 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:26.457995 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0611 09:20:26.458010 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0611 09:20:26.458208 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:26.458301 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:26.458345 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:26.458415 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:26.458467 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:26.458518 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:26.458615 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0611 09:20:26.458704 55409 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0611 09:20:26.458760 55409 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.458838 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:26.459012 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:20:26.459066 55409 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0611 09:20:26.459286 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0611 09:20:26.462679 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:20:26.462974 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.463184 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.463472 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0611 09:20:26.463640 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" }] }] } I0611 09:20:26.463906 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.464156 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0611 09:20:26.464318 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.464612 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.464768 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:26.464888 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:26.464980 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:26.465093 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0611 09:20:26.465272 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:26.465406 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.465579 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:20:26.465695 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:26.465822 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:26.465950 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.466153 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0611 09:20:26.466292 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0611 09:20:26.466347 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0611 09:20:26.466392 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:20:26.466445 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.466587 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:26.466730 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:20:26.467078 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:20:26.467391 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:20:26.467754 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:20:26.467824 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:26.467868 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:26.467938 55409 dns.go:235] Pre-creating DNS records I0611 09:20:26.467971 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:26.473593 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0611 09:20:26.476630 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:26.476717 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0611 09:20:27.846661 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:28.023544 55409 iamrole.go:89] ListRoles: { } I0611 09:20:28.024871 55409 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0611 09:20:28.025157 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.025315 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:20:28.025353 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:20:28.025410 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:28.025650 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.026973 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:28.027101 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.028017 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:28.028171 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.029376 55409 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0611 09:20:28.029547 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.029642 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0611 09:20:28.029725 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:28.029868 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.030110 55409 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0611 09:20:28.030053 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.030228 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:28.030291 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0611 09:20:28.030457 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:28.030527 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:28.030625 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0611 09:20:28.030777 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:28.035295 55409 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0611 09:20:28.035534 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:28.035692 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:28.035806 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:28.035906 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:28.036060 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:28.036244 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:28.036410 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:28.036954 55409 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0611 09:20:28.037313 55409 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0611 09:20:28.037571 55409 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0611 09:20:28.040130 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:20:28.040193 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:20:28.040230 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:20:28.040261 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:20:28.040295 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:20:28.040325 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:20:28.040355 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:20:28.040388 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:20:28.040419 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:20:28.040455 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:20:28.040494 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:20:28.040525 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:20:28.040555 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:28.040587 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:20:28.040617 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:28.040647 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:28.040678 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:28.040709 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:20:28.040739 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:20:28.040767 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:20:28.040795 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:28.040829 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:28.040863 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:20:28.040897 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:20:28.042211 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:20:28.042295 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:20:28.042315 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:20:28.042368 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.042416 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0611 09:20:28.042467 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.042523 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.042568 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.042621 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.042661 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.042698 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0611 09:20:28.042747 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.042796 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:20:28.042832 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0611 09:20:28.042876 55409 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0611 09:20:28.042911 55409 api.go:53] PageSize not implemented I0611 09:20:28.042932 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:28.042961 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:28.042981 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:20:28.043011 55409 targetgroups.go:35] PageSize not implemented I0611 09:20:28.043031 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0611 09:20:28.043083 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:20:28.043126 55409 iamrole.go:89] ListRoles: { } I0611 09:20:28.043167 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:28.043196 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:28.043236 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:20:28.043286 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:20:28.043321 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:28.043862 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-group:nodes.minimal.example.com ok I0611 09:20:28.043975 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } autoscaling-group:master-us-test-1a.masters.minimal.example.com ok volume:vol-2 ok I0611 09:20:28.043991 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0611 09:20:28.044067 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } autoscaling-config:lt-2 ok I0611 09:20:28.044131 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0611 09:20:28.043955 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.minimal.example.com. ok I0611 09:20:28.044201 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0611 09:20:28.044284 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0611 09:20:28.044146 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0611 09:20:28.044449 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:28.044494 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:20:28.044538 55409 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0611 09:20:28.044601 55409 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-1 ok I0611 09:20:28.044653 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:28.044705 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0611 09:20:28.044818 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:28.044836 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:20:28.044918 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0611 09:20:28.045055 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } I0611 09:20:28.045066 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } subnet:subnet-1 ok I0611 09:20:28.045151 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0611 09:20:28.045176 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0611 09:20:28.045230 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0611 09:20:28.045283 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0611 09:20:28.045327 55409 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0611 09:20:28.045341 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0611 09:20:28.045368 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0611 09:20:28.045428 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0611 09:20:28.045509 55409 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0611 09:20:28.045587 55409 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleMinimalAWS (3.20s) === RUN TestLifecycleMinimalOpenstack I0611 09:20:28.046124 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster minimal-openstack.k8s.local I0611 09:20:28.054276 55409 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:20:29.503397 55409 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0611 09:20:29.503441 55409 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0611 09:20:29.521030 55409 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2024/06/11 09:20:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0611 09:20:29.526531 55409 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0611 09:20:29.539397 55409 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0611 09:20:29.543563 55409 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2024/06/11 09:20:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0611 09:20:29.546759 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0611 09:20:29.546783 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0611 09:20:29.547239 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0611 09:20:30.558118 55409 executor.go:111] Tasks: 92 done / 92 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:20:32.090299 55409 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0611 09:20:32.090350 55409 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0611 09:20:32.110930 55409 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2024/06/11 09:20:32 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:32 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0611 09:20:32.121893 55409 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0611 09:20:32.129645 55409 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0611 09:20:32.131424 55409 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2024/06/11 09:20:32 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:32 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:32 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0611 09:20:32.134420 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0611 09:20:32.134820 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0611 09:20:32.135418 55409 executor.go:111] Tasks: 92 done / 92 total; 0 can run I0611 09:20:32.136903 55409 delete_cluster.go:128] Looking for cloud resources to delete 2024/06/11 09:20:32 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) Instance:7f657478-6697-455f-95c9-8cb379a7529f ok Network:f823e72a-205e-4524-a100-188bff91b58d ok ServerGroup:30155291-1f6b-44ba-87c2-18ed92b33b35 ok SecurityGroup:00d4d517-a58e-473d-a7b5-337276612523 ok ServerGroup:f773fac8-7037-4000-9b7a-b51be0d09db7 ok Subnet:6f7bb142-d3da-4ba5-9adf-675420113e3e ok SecurityGroup:b52205a9-3dac-42ab-8052-a88c8484daee ok SecurityGroup:ff7d8ef7-5e8f-40ec-a86f-9ff210fcd84c ok SSHKey:kubernetes-minimal-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Port:4ace4b96-2ef0-4aa4-a87b-cee3817f1b48 ok Instance:19f7504a-4716-45d0-8e61-ded68043e124 ok Port:b48fce55-9761-441a-ac56-53585f94889b ok Port:30a20afb-f4d7-4d4e-bbcb-9d076f136d95 ok Instance:463e2b16-2209-4254-a698-e8a87827efe0 ok --- PASS: TestLifecycleMinimalOpenstack (5.20s) === RUN TestLifecycleMinimalGCE I0611 09:20:33.247110 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:479: running lifecycle test for cluster minimal-gce.example.com I0611 09:20:33.248874 55409 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:20:34.952830 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:20:34.952940 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:20:34.953062 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0611 09:20:34.953095 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0611 09:20:34.953119 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0611 09:20:34.953196 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0611 09:20:34.954712 55409 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0611 09:20:34.958957 55409 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0611 09:20:34.964580 55409 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0611 09:20:34.965410 55409 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0611 09:20:34.965623 55409 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0611 09:20:34.965721 55409 dns.go:235] Pre-creating DNS records ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:20:36.644865 55409 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0611 09:20:36.644979 55409 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0611 09:20:36.645088 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0611 09:20:36.645114 55409 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0611 09:20:36.645139 55409 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0611 09:20:36.645233 55409 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0611 09:20:36.646656 55409 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0611 09:20:36.650601 55409 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0611 09:20:36.656484 55409 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0611 09:20:36.657375 55409 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0611 09:20:36.657560 55409 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0611 09:20:36.659188 55409 delete_cluster.go:128] Looking for cloud resources to delete I0611 09:20:36.659298 55409 gce.go:99] Scanning zones: [us-test1-a] I0611 09:20:36.659685 55409 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" I0611 09:20:36.659714 55409 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" FirewallRule:ssh-external-to-master-minimal-gce-example-com ok FirewallRule:master-to-node-minimal-gce-example-com ok Disk:a-etcd-main-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/control-plane-minimal-g-fu1mg6@testproject.iam.gserviceaccount.com ok FirewallRule:ssh-external-to-master-ipv6-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-minimal-gce-example-com ok FirewallRule:node-to-master-minimal-gce-example-com ok FirewallRule:master-to-master-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-ipv6-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-ipv6-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/node-minimal-gce-example-com@testproject.iam.gserviceaccount.com ok FirewallRule:node-to-node-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-minimal-gce-example-com ok Disk:a-etcd-events-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-ipv6-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-master-us-test1-a-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-nodes-minimal-gce-example-com ok InstanceTemplate:master-us-test1-a-minimal-do16cp-1718097634 ok InstanceTemplate:nodes-minimal-gce-example-com-1718097634 ok Subnet:us-test1-minimal-gce-example-com ok Network:minimal-gce-example-com ok --- PASS: TestLifecycleMinimalGCE (3.41s) === RUN TestLifecycleFloatingIPOpenstack I0611 09:20:36.661257 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster floatingip-openstack.k8s.local I0611 09:20:36.669022 55409 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:20:38.103006 55409 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0611 09:20:38.103053 55409 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0611 09:20:38.118285 55409 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2024/06/11 09:20:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0611 09:20:38.129798 55409 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0611 09:20:38.137122 55409 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0611 09:20:38.140474 55409 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2024/06/11 09:20:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0611 09:20:38.143015 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0611 09:20:38.143325 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0611 09:20:38.143441 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0611 09:20:39.152700 55409 executor.go:111] Tasks: 94 done / 94 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0611 09:20:40.568490 55409 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0611 09:20:40.568544 55409 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0611 09:20:40.589642 55409 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2024/06/11 09:20:40 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:40 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0611 09:20:40.599566 55409 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0611 09:20:40.608165 55409 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0611 09:20:40.609935 55409 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2024/06/11 09:20:40 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:40 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/06/11 09:20:40 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0611 09:20:40.612656 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0611 09:20:40.613395 55409 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0611 09:20:40.613854 55409 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0611 09:20:40.615465 55409 delete_cluster.go:128] Looking for cloud resources to delete 2024/06/11 09:20:40 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) Router-IF:6d00af67-c3a6-41ad-b50c-c90913bd6723 ok Subnet:6d00af67-c3a6-41ad-b50c-c90913bd6723 ok Router:ba9e4445-d8bd-466c-8645-5891d16db3c5 ok Instance:3b5f7771-96db-4abe-988f-a07dd6d3e0f2 ok Instance:978a7b13-8638-4726-a754-e55f1a01c029 ok Instance:38fc1a41-f132-44df-8704-184c1a458cad ok ServerGroup:17751bf2-6e4b-464e-ad8a-ddb49e2f4e94 ok SecurityGroup:8b481cc9-d998-48da-8389-7f781e230293 ok Network:dabdb429-2e91-4e11-ae13-897ff8b3f945 ok SSHKey:kubernetes-floatingip-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Port:847fa82c-6df1-499e-8856-d940fa16bfc1 ok SecurityGroup:3e43d84c-2dd4-4f23-a2d5-64daab280456 ok Port:41fc444f-4558-4cb2-b8d3-9e1512af1830 ok ServerGroup:a978d0b8-3e0f-44be-a066-e10a18e57053 ok SecurityGroup:ee05e0dc-6396-42c6-bbd0-106564318a8c ok Port:966b9596-5961-415f-90d6-62cfd6f7b7ef ok Port:3a3a58e4-d8aa-4ad6-9717-a9ec660c4a78 ok --- PASS: TestLifecycleFloatingIPOpenstack (5.07s) === RUN TestLifecyclePrivateCalico I0611 09:20:41.727992 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:41.728263 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:41.728336 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:41.728429 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:41.728535 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:41.728664 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:41.728749 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:41.728821 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:41.728895 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:41.728958 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatecalico.example.com I0611 09:20:41.760477 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:20:41.764226 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:41.764319 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:41.764378 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:43.049382 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:43.477925 55409 iamrole.go:89] ListRoles: { } I0611 09:20:43.479686 55409 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0611 09:20:43.479874 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:43.480069 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:43.480219 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:43.480335 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } I0611 09:20:43.480335 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:43.480423 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0611 09:20:43.480416 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:43.480605 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } I0611 09:20:43.480616 55409 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.480715 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:20:43.480688 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0611 09:20:43.480771 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:43.480929 55409 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.480961 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:43.481024 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" }] }] } I0611 09:20:43.481175 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:43.481201 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } I0611 09:20:43.481303 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.privatecalico.example.com" }] } I0611 09:20:43.481310 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:43.481440 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:43.481522 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0611 09:20:43.481580 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0611 09:20:43.481609 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:20:43.481642 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:43.482737 55409 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0611 09:20:43.482934 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0611 09:20:43.482868 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0611 09:20:43.483022 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0611 09:20:43.483100 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0611 09:20:43.483019 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0611 09:20:43.483165 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0611 09:20:43.483214 55409 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0611 09:20:43.483180 55409 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatecalico-exa-hocohm", Port: 22, Protocol: "TCP", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-privatecalico-exa-hocohm" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0611 09:20:43.483285 55409 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0611 09:20:43.483265 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:43.483365 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:43.483304 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0611 09:20:43.483415 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:43.483451 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:43.483584 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0611 09:20:43.483471 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0611 09:20:43.483737 55409 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0611 09:20:43.483734 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:43.483783 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0611 09:20:43.483844 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:43.483904 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0611 09:20:43.484008 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:43.484180 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:43.485012 55409 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0611 09:20:43.485071 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0611 09:20:43.485190 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:43.485281 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:43.485379 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:43.485459 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:43.485550 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0611 09:20:43.485648 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:43.485754 55409 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0611 09:20:43.485830 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:43.485978 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:20:43.485897 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0611 09:20:43.486074 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:43.485959 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0611 09:20:43.486170 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:43.486264 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:43.486319 55409 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.486458 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:20:43.486548 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0611 09:20:43.486732 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0611 09:20:43.486844 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:20:43.486908 55409 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0611 09:20:43.486643 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatecalico.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0611 09:20:43.486997 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }], VpcId: "vpc-1" } I0611 09:20:43.487112 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0611 09:20:43.487209 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:20:43.487282 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:43.487390 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:43.487442 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:20:43.487535 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:43.488277 55409 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0611 09:20:43.488687 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0611 09:20:43.488539 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-4-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } W0611 09:20:43.488822 55409 api.go:53] PageSize not implemented W0611 09:20:43.488778 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:43.488899 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-1to2379-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.488987 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:43.489910 55409 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatecalico-exa-hocohm", SubnetMappings: [{ SubnetId: "subnet-1" }], Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }], Type: "network" } I0611 09:20:43.489865 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.490029 55409 tags.go:74] AddTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"], Tags: [{ Key: "Name", Value: "api.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0611 09:20:43.490112 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:43.490124 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:43.490152 55409 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0611 09:20:43.490211 55409 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0611 09:20:43.490299 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0611 09:20:43.490479 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.490682 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0611 09:20:43.490865 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.491004 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:43.491090 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-udp-1to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.491270 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0611 09:20:43.491407 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:43.491496 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:43.491591 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.491692 55409 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.491731 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:43.491822 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:43.491884 55409 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1", Port: 22, Protocol: "TCP" } I0611 09:20:43.491865 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } W0611 09:20:43.491986 55409 api.go:53] PageSize not implemented I0611 09:20:43.492010 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:43.492005 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0611 09:20:43.492110 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0611 09:20:43.492160 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0611 09:20:43.492201 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.492332 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:43.492442 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:43.492527 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0611 09:20:43.492624 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0611 09:20:43.492726 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0611 09:20:43.492851 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0611 09:20:43.492949 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.493079 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-4003to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.493200 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.493362 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.493512 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0611 09:20:43.493670 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0611 09:20:43.493817 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-2382to4000-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0611 09:20:43.494035 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.494239 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.494473 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0611 09:20:43.494560 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0611 09:20:43.494615 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.494744 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.494873 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.495001 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0611 09:20:43.495041 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.495190 55409 executor.go:111] Tasks: 120 done / 142 total; 6 can run I0611 09:20:43.495283 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0611 09:20:43.495345 55409 api.go:53] PageSize not implemented I0611 09:20:43.495319 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:43.495410 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:43.495419 55409 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-1"] }] } W0611 09:20:43.495485 55409 api.go:53] PageSize not implemented I0611 09:20:43.495560 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:43.495399 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:43.495633 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:43.495598 55409 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-1", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0611 09:20:43.495726 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0611 09:20:43.495774 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:43.495734 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:43.495859 55409 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0611 09:20:43.501491 55409 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0611 09:20:43.501655 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:43.501822 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0611 09:20:43.501883 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:43.502007 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:43.502148 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:43.502288 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:43.502775 55409 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0611 09:20:43.503056 55409 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0611 09:20:43.503342 55409 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0611 09:20:43.503399 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:43.503439 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:43.503507 55409 dns.go:235] Pre-creating DNS records I0611 09:20:43.503535 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:43.510148 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:20:43.513780 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:43.513862 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:43.513922 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:44.799153 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:45.224770 55409 iamrole.go:89] ListRoles: { } I0611 09:20:45.226961 55409 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0611 09:20:45.227404 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:45.228295 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.228479 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.228587 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:20:45.228619 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:20:45.228685 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:45.228739 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:45.228736 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.229060 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.231052 55409 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0611 09:20:45.231268 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.231406 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0611 09:20:45.231559 55409 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0611 09:20:45.231591 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:45.231624 55409 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0611 09:20:45.231577 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0611 09:20:45.231714 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0611 09:20:45.231724 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0611 09:20:45.231639 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0611 09:20:45.231800 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0611 09:20:45.231891 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:45.231988 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:45.232137 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.232318 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:45.232388 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.232535 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:45.232654 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.232809 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.232967 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:45.233025 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0611 09:20:45.233158 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0611 09:20:45.233328 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:45.233379 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:20:45.233608 55409 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0611 09:20:45.233734 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:45.233895 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0611 09:20:45.234010 55409 api.go:53] PageSize not implemented I0611 09:20:45.233964 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:45.234076 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:45.234037 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:45.234114 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0611 09:20:45.234126 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:45.234166 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0611 09:20:45.234171 55409 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatecalico-example-0uch4k" } I0611 09:20:45.234063 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:45.234208 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0611 09:20:45.234282 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:45.234347 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0611 09:20:45.234395 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:45.234408 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0611 09:20:45.234520 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } W0611 09:20:45.234551 55409 api.go:53] PageSize not implemented I0611 09:20:45.234578 55409 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0611 09:20:45.234578 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:45.234621 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0611 09:20:45.234805 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:45.235160 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:45.235506 55409 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0611 09:20:45.235566 55409 api.go:53] PageSize not implemented I0611 09:20:45.235601 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:45.235619 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0611 09:20:45.235673 55409 api.go:53] PageSize not implemented I0611 09:20:45.235691 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:45.235722 55409 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0611 09:20:45.235724 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:45.235673 55409 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0611 09:20:45.235777 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:45.235800 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:45.235874 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0611 09:20:45.235964 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:45.241191 55409 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0611 09:20:45.241307 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:45.241448 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:45.241619 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:45.241753 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:45.241904 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:45.242454 55409 executor.go:111] Tasks: 134 done / 142 total; 2 can run W0611 09:20:45.242571 55409 api.go:53] PageSize not implemented I0611 09:20:45.242597 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:45.242795 55409 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0611 09:20:45.243038 55409 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0611 09:20:45.246466 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:20:45.246529 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:20:45.246570 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:20:45.246603 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0611 09:20:45.246641 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:20:45.246674 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:20:45.246705 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:20:45.246733 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:20:45.246769 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:20:45.246803 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:20:45.246837 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:20:45.246872 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0611 09:20:45.246912 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0611 09:20:45.246947 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:20:45.246976 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:20:45.247005 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:45.247038 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:20:45.247067 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:20:45.247100 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:45.247133 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:45.247168 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:20:45.247200 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0611 09:20:45.247234 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:45.247268 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:20:45.247299 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:20:45.247334 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:20:45.247364 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:20:45.247398 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:45.247432 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:45.247470 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:20:45.247503 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:20:45.249050 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:20:45.249121 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:20:45.249142 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:20:45.249183 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.249239 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0611 09:20:45.249311 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.249377 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.249424 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.249474 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.249514 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.249557 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0611 09:20:45.249615 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.249665 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:20:45.249696 55409 natgateway.go:117] DescribeNatGateways: { } I0611 09:20:45.249731 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0611 09:20:45.249770 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } W0611 09:20:45.249821 55409 api.go:53] PageSize not implemented I0611 09:20:45.249839 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0611 09:20:45.249877 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:45.249903 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:45.249919 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0611 09:20:45.249956 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:20:45.249981 55409 targetgroups.go:35] PageSize not implemented I0611 09:20:45.249999 55409 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" ] } I0611 09:20:45.250056 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:20:45.250095 55409 iamrole.go:89] ListRoles: { } I0611 09:20:45.250142 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:45.250173 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:45.250219 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:20:45.250267 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:20:45.250308 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0611 09:20:45.250345 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0611 09:20:45.250385 55409 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0611 09:20:45.251010 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-group:nodes.privatecalico.example.com ok autoscaling-group:master-us-test-1a.masters.privatecalico.example.com ok I0611 09:20:45.251051 55409 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4 ok autoscaling-config:lt-1 ok I0611 09:20:45.251167 55409 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1 ok I0611 09:20:45.251188 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:45.251208 55409 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatecalico-example-0uch4k" } load-balancer:api-privatecalico-example-0uch4k ok I0611 09:20:45.251242 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } W0611 09:20:45.251366 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions autoscaling-group:bastion.privatecalico.example.com ok I0611 09:20:45.251164 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0611 09:20:45.251384 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0611 09:20:45.251401 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } iam-instance-profile:nodes.privatecalico.example.com ok I0611 09:20:45.251422 55409 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0611 09:20:45.251474 55409 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-2 ok I0611 09:20:45.251450 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0611 09:20:45.251285 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.privatecalico.example.com. ok I0611 09:20:45.251523 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } iam-instance-profile:bastions.privatecalico.example.com ok I0611 09:20:45.251529 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-3 ok I0611 09:20:45.251553 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0611 09:20:45.251599 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } iam-instance-profile:masters.privatecalico.example.com ok I0611 09:20:45.251603 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:20:45.251679 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0611 09:20:45.251915 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:45.251939 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0611 09:20:45.251976 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:45.252032 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 } ] } W0611 09:20:45.252204 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:45.252227 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:20:45.252264 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0611 09:20:45.252340 55409 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0611 09:20:45.252470 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:45.252497 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatecalico.example.com" } I0611 09:20:45.252572 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatecalico.example.com" } I0611 09:20:45.252649 55409 iamrole.go:180] ListAttachedRolePolicies: masters.privatecalico.example.com I0611 09:20:45.252670 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0611 09:20:45.252708 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.privatecalico.example.com" } I0611 09:20:45.252521 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 } ] } iam-role:masters.privatecalico.example.com ok I0611 09:20:45.252744 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.privatecalico.example.com W0611 09:20:45.252746 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:45.252760 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0611 09:20:45.252765 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:20:45.252788 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatecalico.example.com" } iam-role:nodes.privatecalico.example.com ok I0611 09:20:45.252816 55409 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } I0611 09:20:45.252832 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatecalico.example.com" } elastic-ip:eipalloc-1 ok I0611 09:20:45.252875 55409 iamrole.go:180] ListAttachedRolePolicies: bastions.privatecalico.example.com I0611 09:20:45.252889 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0611 09:20:45.252892 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } I0611 09:20:45.252917 55409 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatecalico.example.com" } subnet:subnet-1 ok iam-role:bastions.privatecalico.example.com ok I0611 09:20:45.252952 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0611 09:20:45.253053 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0611 09:20:45.253109 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0611 09:20:45.253189 55409 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0611 09:20:45.253266 55409 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateCalico (3.53s) === RUN TestLifecyclePrivateKopeio I0611 09:20:45.253769 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:45.253920 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:45.253960 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:45.254000 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:45.254038 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:45.254086 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:45.254127 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:45.254156 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:45.254196 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:45.254223 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatekopeio.example.com I0611 09:20:45.282513 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:45.286017 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:45.286096 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:45.286157 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:46.587348 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:46.776081 55409 iamrole.go:89] ListRoles: { } I0611 09:20:46.778138 55409 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0611 09:20:46.778380 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } I0611 09:20:46.778471 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0611 09:20:46.778445 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.778698 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:46.778913 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:46.779012 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.779175 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.779262 55409 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.779396 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0611 09:20:46.779460 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0611 09:20:46.779520 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:20:46.779491 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:46.779589 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:46.779652 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:46.779745 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } I0611 09:20:46.779863 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0611 09:20:46.779907 55409 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.780041 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:20:46.780037 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } I0611 09:20:46.780086 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.780109 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "bastions.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0611 09:20:46.780225 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:46.780323 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:46.780356 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0611 09:20:46.781711 55409 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0611 09:20:46.781836 55409 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0611 09:20:46.781890 55409 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0611 09:20:46.781987 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0611 09:20:46.782046 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0611 09:20:46.782158 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0611 09:20:46.782074 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.782264 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0611 09:20:46.782258 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0611 09:20:46.782267 55409 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatekopeio-exa-d8ef8e", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatekopeio-exa-d8ef8e" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0611 09:20:46.782361 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0611 09:20:46.782394 55409 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0611 09:20:46.782411 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.782444 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:46.782492 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0611 09:20:46.782567 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:46.782617 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" } ] } I0611 09:20:46.782636 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.8.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0611 09:20:46.782726 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.782786 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0611 09:20:46.782908 55409 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.782999 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:20:46.783045 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.783130 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0611 09:20:46.783212 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.783240 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0611 09:20:46.783417 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:20:46.783419 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0611 09:20:46.783464 55409 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0611 09:20:46.783560 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0611 09:20:46.783709 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0611 09:20:46.783834 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:46.783916 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.784008 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:46.784103 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:46.784114 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1b.privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:46.784178 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] }] } I0611 09:20:46.784269 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0611 09:20:46.784057 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatekopeio.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0611 09:20:46.784366 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:46.784366 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0611 09:20:46.784538 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:20:46.784598 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:46.784665 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:46.784766 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:46.784816 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:46.784861 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:46.784902 55409 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0611 09:20:46.784943 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0611 09:20:46.785114 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0611 09:20:46.785086 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:46.785171 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:20:46.785221 55409 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0611 09:20:46.785275 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:46.785367 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:46.785446 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0611 09:20:46.785521 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:46.785614 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:20:46.785658 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:46.785703 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:46.785811 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0611 09:20:46.785873 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:20:46.785915 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:46.785956 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0611 09:20:46.785999 55409 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0611 09:20:46.786074 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:46.786119 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0611 09:20:46.786200 55409 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0611 09:20:46.786434 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } W0611 09:20:46.786503 55409 api.go:53] PageSize not implemented I0611 09:20:46.786604 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0611 09:20:46.786702 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:46.786741 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0611 09:20:46.786791 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } W0611 09:20:46.786865 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:46.786882 55409 tags.go:74] AddTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"], Tags: [{ Key: "Name", Value: "api.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0611 09:20:46.786954 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:46.786804 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:20:46.786990 55409 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0611 09:20:46.787017 55409 tags.go:42] CreateTags { Resources: ["nat-a2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0611 09:20:46.787048 55409 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0611 09:20:46.787025 55409 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatekopeio-exa-d8ef8e", SubnetMappings: [{ SubnetId: "subnet-4" },{ SubnetId: "subnet-1" }], Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], Type: "network" } I0611 09:20:46.787105 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0611 09:20:46.787181 55409 tags.go:42] CreateTags { Resources: ["subnet-4"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0611 09:20:46.787222 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:46.787262 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0611 09:20:46.787346 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.787620 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.787782 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.8.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.787931 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.788063 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-2382to4000-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.788191 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:46.788269 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:20:46.788314 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.788436 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:46.788526 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-udp-1to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.788678 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:46.788750 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:46.788824 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0611 09:20:46.788967 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:46.789048 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:46.789116 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0611 09:20:46.789160 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }] } I0611 09:20:46.789269 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0611 09:20:46.789308 55409 tags.go:42] CreateTags { Resources: ["nat-b2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0611 09:20:46.789354 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:46.789400 55409 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0611 09:20:46.789440 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:46.789520 55409 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1", Port: 22, Protocol: "TCP" } W0611 09:20:46.789614 55409 api.go:53] PageSize not implemented I0611 09:20:46.789584 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0611 09:20:46.789636 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:46.789676 55409 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0611 09:20:46.789728 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0611 09:20:46.789856 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0611 09:20:46.789898 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0611 09:20:46.789939 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" }] }] } I0611 09:20:46.790079 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:46.790194 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0611 09:20:46.790334 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0611 09:20:46.790380 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-4" } I0611 09:20:46.790420 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0611 09:20:46.790473 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-1to2379-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0611 09:20:46.790613 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0611 09:20:46.790714 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.790854 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0611 09:20:46.790953 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.791086 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-::/0" }] }] } I0611 09:20:46.791242 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.791373 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.791501 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.791626 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0611 09:20:46.791671 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-3" } I0611 09:20:46.791706 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0611 09:20:46.791748 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.791877 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0611 09:20:46.791926 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-4003to65535-masters.privatekopeio.example.com" }] }] } I0611 09:20:46.792060 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0611 09:20:46.792190 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0611 09:20:46.792283 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatekopeio.example.com" }] }] } I0611 09:20:46.792440 55409 executor.go:111] Tasks: 122 done / 144 total; 7 can run I0611 09:20:46.792532 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0611 09:20:46.792552 55409 api.go:53] PageSize not implemented I0611 09:20:46.792609 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:46.792649 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } W0611 09:20:46.792763 55409 api.go:53] PageSize not implemented I0611 09:20:46.792774 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:46.792732 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:46.792831 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:46.792860 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:46.792925 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-b2345678", RouteTableId: "rtb-3" } I0611 09:20:46.792986 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:46.793114 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-a2345678", RouteTableId: "rtb-1" } I0611 09:20:46.799712 55409 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0611 09:20:46.800176 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:46.800413 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:46.800871 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:46.801225 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:46.802512 55409 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0611 09:20:46.803906 55409 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0611 09:20:46.804366 55409 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0611 09:20:46.804429 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:46.804494 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:46.804571 55409 dns.go:235] Pre-creating DNS records I0611 09:20:46.804599 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:46.811870 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:46.815955 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:46.816044 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:46.816103 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:48.142371 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:48.328804 55409 iamrole.go:89] ListRoles: { } I0611 09:20:48.331096 55409 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0611 09:20:48.332087 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:48.332674 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.332853 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:20:48.332912 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:20:48.333005 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:48.333617 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.333852 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.334046 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.334689 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:48.336604 55409 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0611 09:20:48.336823 55409 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0611 09:20:48.336775 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0611 09:20:48.337032 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:48.337094 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.337260 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0611 09:20:48.337333 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.337345 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0611 09:20:48.337456 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:48.337548 55409 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0611 09:20:48.337503 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.337627 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:20:48.337669 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.337453 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0611 09:20:48.337832 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0611 09:20:48.337809 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.337966 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:48.338033 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0611 09:20:48.338027 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:48.338123 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0611 09:20:48.338290 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:48.338341 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.338438 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0611 09:20:48.338559 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:48.338637 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.338732 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.338860 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0611 09:20:48.338998 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:48.339051 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:20:48.339192 55409 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0611 09:20:48.339382 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:48.339469 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:48.339491 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0611 09:20:48.339541 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0611 09:20:48.339576 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0611 09:20:48.339615 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0611 09:20:48.339393 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0611 09:20:48.339649 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } W0611 09:20:48.339673 55409 api.go:53] PageSize not implemented I0611 09:20:48.339734 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:48.339717 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:48.339838 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:48.339885 55409 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } W0611 09:20:48.339973 55409 api.go:53] PageSize not implemented I0611 09:20:48.340003 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:48.339962 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:48.340073 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:48.340192 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:48.340432 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0611 09:20:48.340530 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:48.340688 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:48.340889 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:48.341006 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:48.341201 55409 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0611 09:20:48.341293 55409 api.go:53] PageSize not implemented I0611 09:20:48.341286 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:48.341339 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:48.341368 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:48.341354 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:48.341434 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:48.341415 55409 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0611 09:20:48.341483 55409 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0611 09:20:48.341516 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:48.341668 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } W0611 09:20:48.341757 55409 api.go:53] PageSize not implemented I0611 09:20:48.341793 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:48.347094 55409 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0611 09:20:48.347295 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:48.347456 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:48.347665 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:48.347852 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:48.348428 55409 executor.go:111] Tasks: 136 done / 144 total; 2 can run W0611 09:20:48.348559 55409 api.go:53] PageSize not implemented I0611 09:20:48.348594 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:48.348810 55409 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0611 09:20:48.349110 55409 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0611 09:20:48.352467 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:20:48.352533 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:20:48.352574 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:20:48.352605 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:20:48.352636 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:20:48.352669 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:20:48.352701 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:20:48.352736 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:20:48.352770 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:20:48.352811 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:20:48.352847 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0611 09:20:48.352886 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:20:48.352919 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:20:48.352952 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:48.352990 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:20:48.353019 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:20:48.353053 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0611 09:20:48.353087 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:48.353120 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:48.353154 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:20:48.353186 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0611 09:20:48.353220 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:48.353258 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:20:48.353290 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:20:48.353322 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0611 09:20:48.353356 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0611 09:20:48.353393 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:20:48.353423 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:20:48.353454 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:48.353491 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:48.353525 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:20:48.353558 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:20:48.355141 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:20:48.355211 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:20:48.355233 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:20:48.355275 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.355335 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0611 09:20:48.355404 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.355470 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.355518 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.355569 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.355611 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.355663 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0611 09:20:48.355731 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.355794 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:20:48.355831 55409 natgateway.go:117] DescribeNatGateways: { } I0611 09:20:48.355871 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0611 09:20:48.355911 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } W0611 09:20:48.355967 55409 api.go:53] PageSize not implemented I0611 09:20:48.355985 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0611 09:20:48.356027 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:48.356054 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:48.356069 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0611 09:20:48.356106 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:20:48.356131 55409 targetgroups.go:35] PageSize not implemented I0611 09:20:48.356149 55409 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" ] } I0611 09:20:48.356211 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:20:48.356255 55409 iamrole.go:89] ListRoles: { } I0611 09:20:48.356300 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:48.356330 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:48.356373 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:20:48.356422 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:20:48.356473 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1","rtb-3"] } I0611 09:20:48.356516 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0611 09:20:48.356547 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } autoscaling-group:nodes.privatekopeio.example.com ok I0611 09:20:48.357220 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0611 09:20:48.357231 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0611 09:20:48.357311 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } iam-instance-profile:masters.privatekopeio.example.com ok I0611 09:20:48.357295 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0611 09:20:48.357354 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } autoscaling-group:master-us-test-1a.masters.privatekopeio.example.com ok I0611 09:20:48.357341 55409 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4 ok I0611 09:20:48.357405 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } iam-instance-profile:nodes.privatekopeio.example.com ok I0611 09:20:48.357384 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:48.357417 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.privatekopeio.example.com. ok I0611 09:20:48.357587 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0611 09:20:48.357513 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0611 09:20:48.357665 55409 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } W0611 09:20:48.357724 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1 ok I0611 09:20:48.357709 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } iam-instance-profile:bastions.privatekopeio.example.com ok autoscaling-config:lt-3 ok I0611 09:20:48.357754 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } autoscaling-group:bastion.privatekopeio.example.com ok I0611 09:20:48.357833 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:20:48.357851 55409 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } load-balancer:api-privatekopeio-example-tl2bv8 ok security-group:sg-1 ok autoscaling-config:lt-2 ok I0611 09:20:48.357905 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0611 09:20:48.358157 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:48.358186 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0611 09:20:48.358234 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:48.358313 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0611 09:20:48.358525 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:48.358547 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:20:48.358583 55409 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0611 09:20:48.358648 55409 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0611 09:20:48.358692 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-1 ok I0611 09:20:48.358847 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatekopeio.example.com" } I0611 09:20:48.358930 55409 iamrole.go:180] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0611 09:20:48.358949 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0611 09:20:48.358857 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0611 09:20:48.358986 55409 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatekopeio.example.com" } iam-role:bastions.privatekopeio.example.com ok I0611 09:20:48.359035 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatekopeio.example.com" } I0611 09:20:48.359082 55409 iamrole.go:180] ListAttachedRolePolicies: masters.privatekopeio.example.com I0611 09:20:48.359097 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0611 09:20:48.359125 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.privatekopeio.example.com" } iam-role:masters.privatekopeio.example.com ok I0611 09:20:48.359036 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0611 09:20:48.359154 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatekopeio.example.com" } I0611 09:20:48.359195 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0611 09:20:48.359188 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } I0611 09:20:48.359209 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } subnet:subnet-4 ok I0611 09:20:48.359235 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatekopeio.example.com" } iam-role:nodes.privatekopeio.example.com ok I0611 09:20:48.359252 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0611 09:20:48.359303 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:48.359350 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } W0611 09:20:48.359451 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:48.359466 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0611 09:20:48.359547 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0611 09:20:48.359612 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0611 09:20:48.359667 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0611 09:20:48.359750 55409 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0611 09:20:48.359840 55409 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateKopeio (3.11s) === RUN TestLifecycleIPv6 I0611 09:20:48.360366 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:48.360513 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:48.360553 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:48.360595 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:48.360634 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:48.360690 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:48.360732 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:48.360762 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:48.360800 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:48.360827 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal-ipv6.example.com I0611 09:20:48.389559 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:20:48.393286 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:48.393372 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:49.655191 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:49.839599 55409 iamrole.go:89] ListRoles: { } I0611 09:20:49.841631 55409 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0611 09:20:49.841996 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:49.842071 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } I0611 09:20:49.842169 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.842196 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", Tags: [{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] } I0611 09:20:49.842312 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.842463 55409 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.842496 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.842607 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } I0611 09:20:49.842665 55409 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.842706 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] } I0611 09:20:49.842770 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:20:49.842843 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.842962 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:49.843077 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:49.843259 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:49.843328 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.843450 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-main.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:49.843547 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:49.843584 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0611 09:20:49.843611 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0611 09:20:49.843628 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:20:49.843657 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:49.844872 55409 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0611 09:20:49.845045 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.845133 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0611 09:20:49.845196 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0611 09:20:49.845249 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0611 09:20:49.845238 55409 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0611 09:20:49.845334 55409 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-minimal-ipv6-example--bne5ih", Port: 443, Protocol: "TCP", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "tcp-minimal-ipv6-example--bne5ih" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0611 09:20:49.845463 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0611 09:20:49.845466 55409 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0611 09:20:49.845469 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.845552 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0611 09:20:49.845567 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0611 09:20:49.845645 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:49.845721 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:49.845757 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] } I0611 09:20:49.845813 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0611 09:20:49.845817 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.845896 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0611 09:20:49.845955 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0611 09:20:49.845986 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0611 09:20:49.845983 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.846179 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0611 09:20:49.846305 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0611 09:20:49.846347 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:49.846549 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0611 09:20:49.846713 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.minimal-ipv6.example.com" }] }], VpcId: "vpc-1" } I0611 09:20:49.846788 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.846863 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }], VpcId: "vpc-1" } I0611 09:20:49.846927 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:49.846995 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:49.847060 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:20:49.847094 55409 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0611 09:20:49.846898 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal-ipv6.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0611 09:20:49.847168 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:20:49.847233 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:49.847283 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0611 09:20:49.847327 55409 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" } ] } I0611 09:20:49.847402 55409 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0611 09:20:49.847452 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:49.847495 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:49.847531 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:49.847582 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:49.847620 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:20:49.847703 55409 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0611 09:20:49.847821 55409 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.847912 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:20:49.848003 55409 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0611 09:20:49.848245 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-2382to4000-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.848394 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:49.848581 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:49.848767 55409 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.848875 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.849094 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.849308 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0611 09:20:49.849446 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-masters.minimal-ipv6.example.com" }] }] } I0611 09:20:49.849585 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.849675 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] }] } I0611 09:20:49.849767 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] }] } I0611 09:20:49.849781 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", Ipv6CidrBlock: "2001:db8:0:111::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0611 09:20:49.849849 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:49.849928 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.4.0/22", Ipv6CidrBlock: "2001:db8:0:116::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" } ] }], VpcId: "vpc-1" } I0611 09:20:49.849976 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:49.849987 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", Ipv6CidrBlock: "2001:db8:0:113::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "dualstack-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0611 09:20:49.850102 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:49.850130 55409 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.850232 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.850406 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:49.850530 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.850554 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", Ipv6CidrBlock: "2001:db8:0:114::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "dualstack-us-test-1b.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:49.850706 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:49.850785 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.0.0/22", Ipv6CidrBlock: "2001:db8:0:115::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0611 09:20:49.850856 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0611 09:20:49.851002 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:20:49.850945 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", Ipv6CidrBlock: "2001:db8:0:112::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:49.851051 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.851256 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" }] }] } I0611 09:20:49.851395 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" }] }] } I0611 09:20:49.851539 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0611 09:20:49.851673 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.851857 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-1to2379-masters.minimal-ipv6.example.com" }] }] } I0611 09:20:49.852015 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-3" } I0611 09:20:49.852063 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:20:49.852128 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" }] }] } I0611 09:20:49.852288 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0611 09:20:49.852414 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-2" } I0611 09:20:49.852466 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.852634 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-4003to65535-masters.minimal-ipv6.example.com" }] }] } I0611 09:20:49.852799 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-::/0" }] }] } I0611 09:20:49.852960 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.853112 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0611 09:20:49.853229 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-udp-1to65535-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.853411 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0611 09:20:49.853483 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0611 09:20:49.853529 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0611 09:20:49.853577 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0611 09:20:49.853614 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:49.853654 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:49.853692 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:20:49.853736 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:49.853772 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0611 09:20:49.853820 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:20:49.853860 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0611 09:20:49.853902 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0611 09:20:49.853969 55409 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0611 09:20:49.854062 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:49.854179 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:49.854179 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0611 09:20:49.854303 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0611 09:20:49.854370 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:49.854540 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0611 09:20:49.854597 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0611 09:20:49.854644 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:49.854620 55409 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "dualstack", Name: "api-minimal-ipv6-example--jhj9te", SubnetMappings: [{ SubnetId: "subnet-5" },{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "api.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], Type: "network" } I0611 09:20:49.854724 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0611 09:20:49.854761 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:49.854812 55409 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1", Port: 443, Protocol: "TCP" } I0611 09:20:49.854890 55409 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "false" },{ Key: "access_logs.s3.enabled", Value: "false" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0611 09:20:49.854894 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-6"] }] } W0611 09:20:49.854959 55409 api.go:53] PageSize not implemented I0611 09:20:49.854977 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-6" } I0611 09:20:49.855029 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-5"] }] } I0611 09:20:49.855074 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-5" } I0611 09:20:49.855116 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:49.855205 55409 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:20:49.855282 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:49.855338 55409 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-2", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.855428 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0611 09:20:49.855483 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:20:49.855525 55409 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0611 09:20:49.855590 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0611 09:20:49.855672 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-1" } I0611 09:20:49.855722 55409 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-5"] }] } I0611 09:20:49.855865 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:49.855875 55409 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-5", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0611 09:20:49.855969 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0611 09:20:49.856017 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0611 09:20:49.856063 55409 tags.go:42] CreateTags { Resources: ["subnet-5"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-2" }] } I0611 09:20:49.856121 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0611 09:20:49.856167 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-4" } I0611 09:20:49.856208 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:49.856343 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0611 09:20:49.856381 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-3" } I0611 09:20:49.856464 55409 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0611 09:20:49.856582 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:49.856543 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:49.856623 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:49.856700 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:49.856733 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-2", RouteTableId: "rtb-3" } I0611 09:20:49.856725 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0611 09:20:49.856726 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:49.856789 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:49.856847 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:49.856923 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:49.856962 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0611 09:20:49.856958 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0611 09:20:49.856880 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:49.857023 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:49.857152 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-2", RouteTableId: "rtb-3" } I0611 09:20:49.857133 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:49.857204 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:49.857311 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0611 09:20:49.864353 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:20:49.865070 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:49.865307 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:49.865503 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:49.865982 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:49.867644 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:20:49.868071 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:20:49.868459 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:20:49.868520 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:49.868572 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:49.868670 55409 dns.go:235] Pre-creating DNS records I0611 09:20:49.868706 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:49.877149 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0611 09:20:49.880917 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:49.881005 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:51.164281 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:51.339701 55409 iamrole.go:89] ListRoles: { } I0611 09:20:51.341328 55409 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0611 09:20:51.341824 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.342050 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:20:51.342115 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:20:51.341993 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:51.342216 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:51.342303 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.342486 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.342593 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:51.342880 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.344287 55409 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0611 09:20:51.344509 55409 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0611 09:20:51.344514 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.344641 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.344789 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0611 09:20:51.344763 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0611 09:20:51.344768 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.344853 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0611 09:20:51.344892 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0611 09:20:51.344928 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0611 09:20:51.345099 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:51.345155 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.345307 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:51.345401 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:51.345488 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.345615 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0611 09:20:51.345764 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:51.345824 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0611 09:20:51.345970 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:51.346130 55409 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0611 09:20:51.346274 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:51.346364 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.346505 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.346694 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:51.346768 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.346906 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:51.346957 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.347165 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0611 09:20:51.347330 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] }] } I0611 09:20:51.347480 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0611 09:20:51.347522 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:51.347643 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.347826 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:20:51.347892 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:51.347982 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:51.348049 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:51.348123 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0611 09:20:51.348159 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:51.348247 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0611 09:20:51.348292 55409 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0611 09:20:51.348330 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0611 09:20:51.348404 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0611 09:20:51.348443 55409 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0611 09:20:51.348475 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0611 09:20:51.348572 55409 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0611 09:20:51.348655 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:51.348737 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:51.348763 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:51.348856 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:51.348878 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0611 09:20:51.348864 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:51.348926 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0611 09:20:51.348965 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0611 09:20:51.348956 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:51.349005 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0611 09:20:51.349042 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0611 09:20:51.349035 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0611 09:20:51.349136 55409 api.go:53] PageSize not implemented I0611 09:20:51.349105 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:51.349182 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0611 09:20:51.349249 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:51.349322 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0611 09:20:51.349378 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:51.349478 55409 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0611 09:20:51.349559 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:51.349606 55409 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0611 09:20:51.349634 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:51.349600 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:51.349666 55409 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0611 09:20:51.349634 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:51.349716 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:51.349696 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:51.349743 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0611 09:20:51.349836 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:20:51.349817 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:51.349877 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0611 09:20:51.349897 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0611 09:20:51.349965 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:20:51.350032 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0611 09:20:51.350114 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:51.350162 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:51.350178 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0611 09:20:51.358244 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:20:51.359038 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:51.359221 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:51.359379 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:51.359642 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:51.360827 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:20:51.361123 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:20:51.361529 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:20:51.364923 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:20:51.364993 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:20:51.365035 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:20:51.365066 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-2"] }] } I0611 09:20:51.365103 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0611 09:20:51.365137 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:20:51.365172 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0611 09:20:51.365207 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:20:51.365238 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:20:51.365271 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:20:51.365305 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:20:51.365340 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:20:51.365383 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:20:51.365420 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0611 09:20:51.365453 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0611 09:20:51.365488 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:20:51.365520 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:20:51.365550 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:51.365586 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:20:51.365617 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:20:51.365652 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0611 09:20:51.365686 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:51.365723 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:51.365757 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:20:51.365791 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:51.365827 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:20:51.365859 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:20:51.365899 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0611 09:20:51.365938 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0611 09:20:51.365973 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0611 09:20:51.366008 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0611 09:20:51.366042 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:20:51.366074 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:20:51.366104 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:51.366143 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:51.366178 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:20:51.366214 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:20:51.368664 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:20:51.368731 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:20:51.368754 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:20:51.368800 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.368854 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0611 09:20:51.368921 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.368985 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.369041 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.369096 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.369145 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.369198 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0611 09:20:51.369270 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.369346 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:20:51.369382 55409 natgateway.go:117] DescribeNatGateways: { } I0611 09:20:51.369428 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0611 09:20:51.369469 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } W0611 09:20:51.369525 55409 api.go:53] PageSize not implemented I0611 09:20:51.369546 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:51.369573 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:51.369590 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0611 09:20:51.369634 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:20:51.369676 55409 targetgroups.go:35] PageSize not implemented I0611 09:20:51.369718 55409 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" ] } I0611 09:20:51.369830 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:20:51.369903 55409 iamrole.go:89] ListRoles: { } I0611 09:20:51.369989 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:51.370039 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:51.370111 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:20:51.370194 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:20:51.370277 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1","rtb-3"] } I0611 09:20:51.370364 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0611 09:20:51.370428 55409 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0611 09:20:51.370491 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0611 09:20:51.370548 55409 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } autoscaling-group:master-us-test-1a.masters.minimal-ipv6.example.com ok I0611 09:20:51.371350 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-5" } subnet:subnet-5 ok I0611 09:20:51.371408 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0611 09:20:51.371493 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } autoscaling-group:nodes.minimal-ipv6.example.com ok iam-instance-profile:masters.minimal-ipv6.example.com ok I0611 09:20:51.371436 55409 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0611 09:20:51.371497 55409 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4 ok I0611 09:20:51.371526 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0611 09:20:51.371660 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } iam-instance-profile:nodes.minimal-ipv6.example.com ok I0611 09:20:51.371585 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok autoscaling-config:lt-2 ok I0611 09:20:51.371598 55409 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1 ok I0611 09:20:51.371503 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.minimal-ipv6.example.com ok I0611 09:20:51.371744 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0611 09:20:51.371832 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0611 09:20:51.371992 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:51.372140 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:20:51.372223 55409 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-2" } nat-gateway:nat-2 ok I0611 09:20:51.372309 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0611 09:20:51.372358 55409 egressonlyinternetgateways.go:171] DeleteEgressOnlyInternetGateway: { EgressOnlyInternetGatewayId: "eigw-2" } egress-only-internet-gateway:eigw-2 ok I0611 09:20:51.372418 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:51.372479 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0611 09:20:51.372802 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions autoscaling-config:lt-1 ok I0611 09:20:51.372839 55409 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0611 09:20:51.372948 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0611 09:20:51.373021 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:51.373103 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:20:51.373183 55409 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0611 09:20:51.373225 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0611 09:20:51.373375 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:51.373391 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0611 09:20:51.373509 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal-ipv6.example.com" } I0611 09:20:51.373594 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0611 09:20:51.373620 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0611 09:20:51.373667 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal-ipv6.example.com" } iam-role:nodes.minimal-ipv6.example.com ok I0611 09:20:51.373543 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } I0611 09:20:51.373715 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal-ipv6.example.com" } subnet:subnet-1 ok I0611 09:20:51.373779 55409 iamrole.go:180] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0611 09:20:51.373804 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0611 09:20:51.373844 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal-ipv6.example.com" } I0611 09:20:51.373821 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-6" } iam-role:masters.minimal-ipv6.example.com ok subnet:subnet-6 ok I0611 09:20:51.373920 55409 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0611 09:20:51.373994 55409 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-2" } elastic-ip:eipalloc-2 ok I0611 09:20:51.374047 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0611 09:20:51.374098 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0611 09:20:51.374185 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0611 09:20:51.374248 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0611 09:20:51.374391 55409 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0611 09:20:51.374504 55409 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleIPv6 (3.01s) === RUN TestLifecycleSharedVPC I0611 09:20:51.375022 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:51.375174 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:51.375213 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:51.375255 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:51.375291 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:51.375358 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:51.375399 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:51.375427 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:51.375464 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:51.375491 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedvpc.example.com I0611 09:20:51.398759 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:51.401837 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:51.401920 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:52.708889 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:52.876811 55409 iamrole.go:89] ListRoles: { } I0611 09:20:52.877854 55409 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0611 09:20:52.878296 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:52.878584 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:52.878553 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:52.878762 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:52.878867 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:52.879062 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:52.879213 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:52.879674 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:20:52.879747 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0611 09:20:52.879768 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0611 09:20:52.880154 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } I0611 09:20:52.880254 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0611 09:20:52.881147 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } I0611 09:20:52.882210 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:52.881268 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedvpc.example.com" }] } I0611 09:20:52.882889 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.886129 55409 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0611 09:20:52.886301 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0611 09:20:52.886930 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:52.887141 55409 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0611 09:20:52.887087 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0611 09:20:52.887140 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] }], VpcId: "vpc-12345678" } I0611 09:20:52.887238 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:52.887323 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:20:52.887378 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0611 09:20:52.887450 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0611 09:20:52.887439 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0611 09:20:52.887619 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0611 09:20:52.887665 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0611 09:20:52.887701 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0611 09:20:52.887759 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:52.887870 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:52.887939 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:52.887987 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:52.888026 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] },{ Name: "tag:Name", Values: ["sharedvpc.example.com"] }] } I0611 09:20:52.888119 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0611 09:20:52.888235 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" } ] }], VpcId: "vpc-12345678" } I0611 09:20:52.888269 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:52.888357 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:52.888413 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0611 09:20:52.888981 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedvpc.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0611 09:20:52.892848 55409 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0611 09:20:52.893179 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-1to2379-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.893540 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:52.893824 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:52.893971 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0611 09:20:52.894033 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0611 09:20:52.894098 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0611 09:20:52.894142 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.894498 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-2382to4000-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.894714 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:52.894791 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.894980 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.895145 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0611 09:20:52.895349 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0611 09:20:52.895506 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:52.895624 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-4003to65535-masters.sharedvpc.example.com" }] }] } I0611 09:20:52.895792 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:52.895906 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:52.895986 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-udp-1to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.896240 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0611 09:20:52.896337 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.896565 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0611 09:20:52.896714 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0611 09:20:52.896858 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.897017 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0611 09:20:52.897169 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:52.898010 55409 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0611 09:20:52.898346 55409 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0611 09:20:52.898747 55409 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0611 09:20:52.898806 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:52.898862 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:52.898937 55409 dns.go:235] Pre-creating DNS records I0611 09:20:52.898971 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:52.904810 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:20:52.907984 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:52.908078 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:54.210905 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:54.377799 55409 iamrole.go:89] ListRoles: { } I0611 09:20:54.380517 55409 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0611 09:20:54.381245 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.381392 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:54.381464 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] }] } I0611 09:20:54.381690 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:20:54.381838 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0611 09:20:54.381898 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0611 09:20:54.381985 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:20:54.384029 55409 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0611 09:20:54.384146 55409 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0611 09:20:54.384277 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.384473 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:54.384484 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0611 09:20:54.384535 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:20:54.384683 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0611 09:20:54.384863 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:54.384910 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0611 09:20:54.385100 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:54.385194 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.389664 55409 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0611 09:20:54.389817 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:54.389927 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:54.390122 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:54.390280 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:54.390483 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:54.390588 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:54.390886 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:54.391423 55409 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0611 09:20:54.391676 55409 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0611 09:20:54.391910 55409 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0611 09:20:54.394511 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:20:54.394578 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:20:54.394613 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:20:54.394645 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:20:54.394676 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:20:54.394711 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:20:54.394750 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:20:54.394793 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:20:54.394827 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:20:54.394863 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:20:54.394890 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:54.394924 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:20:54.394951 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:54.394983 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:54.395014 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:54.395047 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:20:54.395077 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:20:54.395106 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:20:54.395135 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:54.395169 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:54.395201 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:20:54.396515 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:20:54.396583 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:20:54.396604 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:20:54.396642 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.396689 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0611 09:20:54.396744 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.396805 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.396847 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.396888 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.396931 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.396970 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0611 09:20:54.397018 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.397075 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0611 09:20:54.397108 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } W0611 09:20:54.397156 55409 api.go:53] PageSize not implemented I0611 09:20:54.397179 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:54.397206 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:54.397228 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:20:54.397254 55409 targetgroups.go:35] PageSize not implemented I0611 09:20:54.397275 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0611 09:20:54.397326 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:20:54.397363 55409 iamrole.go:89] ListRoles: { } I0611 09:20:54.397408 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:54.397440 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:54.397489 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:20:54.397532 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:20:54.397563 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:54.397979 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } autoscaling-group:nodes.sharedvpc.example.com ok I0611 09:20:54.398047 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com ok I0611 09:20:54.398082 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0611 09:20:54.398129 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } iam-instance-profile:nodes.sharedvpc.example.com ok I0611 09:20:54.398075 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } iam-instance-profile:masters.sharedvpc.example.com ok I0611 09:20:54.398121 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.sharedvpc.example.com. ok I0611 09:20:54.398197 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0611 09:20:54.398397 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:54.398439 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:20:54.398514 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0611 09:20:54.398617 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-2 ok autoscaling-config:lt-1 ok I0611 09:20:54.398730 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0611 09:20:54.398819 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:54.398887 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0611 09:20:54.399110 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:20:54.399135 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:20:54.399249 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0611 09:20:54.399305 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedvpc.example.com" } I0611 09:20:54.399392 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0611 09:20:54.399412 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0611 09:20:54.399449 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedvpc.example.com" } iam-role:nodes.sharedvpc.example.com ok I0611 09:20:54.399487 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedvpc.example.com" } I0611 09:20:54.399531 55409 iamrole.go:180] ListAttachedRolePolicies: masters.sharedvpc.example.com I0611 09:20:54.399546 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0611 09:20:54.399574 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedvpc.example.com" } iam-role:masters.sharedvpc.example.com ok I0611 09:20:54.399644 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok --- PASS: TestLifecycleSharedVPC (3.03s) === RUN TestLifecycleComplex I0611 09:20:54.400180 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:20:54.400325 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:20:54.400364 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:20:54.400408 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:20:54.400448 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:20:54.400505 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:20:54.400549 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:20:54.400580 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:20:54.400618 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:20:54.400645 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster complex.example.com I0611 09:20:54.435122 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:20:54.439328 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:54.439423 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:55.721204 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:55.914907 55409 iamrole.go:89] ListRoles: { } I0611 09:20:55.916731 55409 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0611 09:20:55.917092 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:55.917250 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0611 09:20:55.917374 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:55.917502 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0611 09:20:55.917749 55409 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0611 09:20:55.917806 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:55.917812 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/events", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-events.complex.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:55.918033 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:20:55.918102 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } W0611 09:20:55.918198 55409 api.go:53] PageSize not implemented I0611 09:20:55.918243 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:55.918379 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:20:55.918367 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } I0611 09:20:55.918467 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-main.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:20:55.918522 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", Tags: [ { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" } ] } I0611 09:20:55.918633 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0611 09:20:55.918671 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0611 09:20:55.918707 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:20:55.918758 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:55.918808 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:20:55.918773 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } I0611 09:20:55.918903 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] } I0611 09:20:55.918897 55409 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" } ] }] } I0611 09:20:55.919019 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:20:55.919079 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0611 09:20:55.922151 55409 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0611 09:20:55.922551 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0611 09:20:55.922560 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:55.922665 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:20:55.922757 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:55.923176 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0611 09:20:55.923370 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:20:55.923393 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:55.923676 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:55.924158 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0611 09:20:55.924311 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0611 09:20:55.924204 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:20:55.924373 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:20:55.924400 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0611 09:20:55.923588 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0611 09:20:55.924455 55409 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-complex-example-com-vpjolq", Port: 443, Protocol: "TCP", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "tcp-complex-example-com-vpjolq" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0611 09:20:55.924492 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0611 09:20:55.924580 55409 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:20:55.924478 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:20:55.924646 55409 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tls-complex-example-com-5nursn", Port: 443, Protocol: "TLS", Tags: [ { Key: "Name", Value: "tls-complex-example-com-5nursn" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0611 09:20:55.924755 55409 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:20:55.925319 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:55.925515 55409 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0611 09:20:55.925615 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:55.925810 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:55.925830 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.96.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-utility.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0611 09:20:55.925985 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:20:55.926058 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:55.926113 55409 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0611 09:20:55.926211 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:20:55.926260 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:20:55.926464 55409 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0611 09:20:55.926531 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:20:55.926733 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0611 09:20:55.926857 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:55.926592 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/complex.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0611 09:20:55.926949 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "api-elb.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:55.927099 55409 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.2.0.0/16", VpcId: "vpc-1" } I0611 09:20:55.927156 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:55.927252 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }], VpcId: "vpc-1" } I0611 09:20:55.927355 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:20:55.927408 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:55.927461 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:20:55.927521 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:55.927380 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0611 09:20:55.927560 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:20:55.927632 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0611 09:20:55.927733 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:20:55.927831 55409 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] } I0611 09:20:55.927950 55409 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.1.0.0/16", VpcId: "vpc-1" } I0611 09:20:55.928000 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:20:55.928056 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:55.928117 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:20:55.928168 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:55.928257 55409 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0611 09:20:55.928498 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0611 09:20:55.928673 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.0/24-ingress-tcp-443to443-masters.complex.example.com" } ] }] } I0611 09:20:55.928817 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }] } I0611 09:20:55.928911 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0611 09:20:55.929137 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0611 09:20:55.929360 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0611 09:20:55.929577 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0611 09:20:55.929732 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:55.929807 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:55.929876 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:55.929955 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }] } I0611 09:20:55.930178 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0611 09:20:55.930420 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:55.930573 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:55.930680 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:55.930773 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.1.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-east-1a-private.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0611 09:20:55.930857 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:55.931081 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.complex.example.com" } ] }] } I0611 09:20:55.931387 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:20:55.931434 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:20:55.931472 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-0.0.0.0/0" } ] }] } I0611 09:20:55.931655 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", RouteTableId: "rtb-2", TransitGatewayId: "tgw-123456" } I0611 09:20:55.931746 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0611 09:20:55.931913 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-4003to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0611 09:20:55.932088 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }] } I0611 09:20:55.932195 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0611 09:20:55.932288 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-2382to4000-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0611 09:20:55.932433 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0611 09:20:55.932477 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-1to2379-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0611 09:20:55.932799 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0611 09:20:55.933178 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0611 09:20:55.933298 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }] } I0611 09:20:55.933546 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0611 09:20:55.933684 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0611 09:20:55.933812 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0611 09:20:55.933989 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0611 09:20:55.934109 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "192.168.1.10/32", RouteTableId: "rtb-2", TransitGatewayId: "tgw-0123456" } I0611 09:20:55.934174 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0611 09:20:55.934345 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-udp-1to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0611 09:20:55.934553 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }] } I0611 09:20:55.934676 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0611 09:20:55.934794 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0611 09:20:55.934858 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0611 09:20:55.934948 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0611 09:20:55.935054 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:20:55.935168 55409 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0611 09:20:55.935304 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:55.935367 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:55.935506 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:55.935549 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0611 09:20:55.935621 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-3" } I0611 09:20:55.935687 55409 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "api-complex-example-com-vd3t5n", SubnetMappings: [{ AllocationId: "eipalloc-012345a678b9cdefa", SubnetId: "subnet-2" }], Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "api.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ], Type: "network" } I0611 09:20:55.935803 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:55.935865 55409 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-test-1:000000000000:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0611 09:20:55.935956 55409 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0611 09:20:55.936024 55409 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "true" },{ Key: "access_logs.s3.enabled", Value: "true" },{ Key: "access_logs.s3.bucket", Value: "access-log-example" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0611 09:20:55.936100 55409 api.go:53] PageSize not implemented I0611 09:20:55.936152 55409 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0611 09:20:55.936204 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:55.936269 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:55.936272 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:55.936307 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:55.936398 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:55.936480 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:55.936408 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:55.936504 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:55.936576 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:55.936674 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:55.942235 55409 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0611 09:20:55.942417 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:55.942537 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:55.942747 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:55.942880 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:55.943777 55409 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0611 09:20:55.944121 55409 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0611 09:20:55.944385 55409 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0611 09:20:55.944457 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:55.944499 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:55.944573 55409 dns.go:235] Pre-creating DNS records I0611 09:20:55.944605 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:55.952931 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:20:55.957043 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:55.957136 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:57.300537 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:57.494787 55409 iamrole.go:89] ListRoles: { } I0611 09:20:57.497049 55409 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0611 09:20:57.497364 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:57.497541 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0611 09:20:57.497729 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0611 09:20:57.498003 55409 api.go:53] PageSize not implemented I0611 09:20:57.497987 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0611 09:20:57.498140 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:57.498309 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:20:57.498350 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:20:57.498430 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:57.498683 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] }] } I0611 09:20:57.499274 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:20:57.499516 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0611 09:20:57.500484 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0611 09:20:57.501967 55409 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0611 09:20:57.502110 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:57.502195 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:20:57.502217 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:57.502284 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:20:57.502331 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:20:57.502404 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:20:57.502456 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:20:57.502417 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:20:57.502531 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:20:57.502581 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:20:57.502356 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:20:57.502686 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:57.502835 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:57.502938 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:57.503005 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:57.503154 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:57.503198 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:57.503285 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:57.503408 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:57.503492 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:20:57.503639 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:57.503707 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:57.503916 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:57.503965 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:20:57.504123 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:57.504267 55409 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0611 09:20:57.504639 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:57.504886 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:57.505111 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:57.505277 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:20:57.505393 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:57.505598 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:57.505753 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:57.505893 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:57.506005 55409 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0611 09:20:57.506103 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:57.506171 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:57.506116 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:57.506190 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:57.506239 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:57.506275 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:20:57.506314 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:20:57.506347 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:20:57.506378 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0611 09:20:57.506467 55409 api.go:53] PageSize not implemented I0611 09:20:57.506514 55409 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0611 09:20:57.506601 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:57.506574 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0611 09:20:57.506676 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0611 09:20:57.506692 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:57.506707 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:20:57.506659 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:20:57.506725 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:57.506936 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:20:57.506989 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:57.507114 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:20:57.507151 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:57.507248 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:57.507327 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:57.507347 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:57.512489 55409 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0611 09:20:57.512696 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:57.512853 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:57.512970 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:57.513145 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:57.513937 55409 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0611 09:20:57.514257 55409 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0611 09:20:57.514641 55409 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.sslCertificate=arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678] I0611 09:20:57.520680 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:57.524204 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:57.536411 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:20:57.540497 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:57.540588 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:58.825457 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:59.016283 55409 iamrole.go:89] ListRoles: { } I0611 09:20:59.017814 55409 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0611 09:20:59.018012 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.018100 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:20:59.018122 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:20:59.018163 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:59.018193 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0611 09:20:59.018270 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.018656 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0611 09:20:59.018725 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.018970 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:20:59.019325 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.019535 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } W0611 09:20:59.019725 55409 api.go:53] PageSize not implemented I0611 09:20:59.019781 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:20:59.023337 55409 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0611 09:20:59.023717 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:20:59.024017 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:20:59.024101 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:20:59.024254 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:20:59.024228 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:59.024526 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:59.024753 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:20:59.025072 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:20:59.025685 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:20:59.025817 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:20:59.025857 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:20:59.025884 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:20:59.025947 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.026029 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:20:59.026118 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:20:59.026158 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:20:59.026137 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:59.026251 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.026855 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.027010 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:20:59.027052 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:20:59.027088 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:20:59.027166 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.027259 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.027405 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:20:59.027964 55409 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0611 09:20:59.028078 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:20:59.028287 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:20:59.028467 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:59.028906 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:59.029083 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:20:59.029188 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:59.029411 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:59.029500 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:20:59.029670 55409 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0611 09:20:59.029763 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0611 09:20:59.029773 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0611 09:20:59.029833 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:59.029898 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:59.029944 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:59.029981 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:20:59.030018 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:20:59.030050 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:20:59.030084 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:20:59.030259 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { Names: ["api-complex-example-com-vd3t5n"] } I0611 09:20:59.030300 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:20:59.030332 55409 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/1" } I0611 09:20:59.030362 55409 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/2" } I0611 09:20:59.030394 55409 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0611 09:20:59.030483 55409 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0611 09:20:59.030548 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:59.030580 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } W0611 09:20:59.030623 55409 api.go:53] PageSize not implemented I0611 09:20:59.030678 55409 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0611 09:20:59.030755 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:59.030796 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:20:59.030823 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:59.030903 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:59.030853 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:20:59.030969 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:20:59.030937 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:59.031121 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:20:59.031176 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:59.031240 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:20:59.031294 55409 loadbalancers.go:35] PageSize not implemented I0611 09:20:59.031337 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:59.031422 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:20:59.031488 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:20:59.036903 55409 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0611 09:20:59.037027 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:59.037185 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:59.037310 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:59.037491 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:59.038278 55409 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0611 09:20:59.038614 55409 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0611 09:20:59.038894 55409 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0611 09:20:59.038941 55409 zones.go:93] ListHostedZonesPages { } I0611 09:20:59.038976 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:20:59.039037 55409 dns.go:235] Pre-creating DNS records I0611 09:20:59.046898 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:20:59.051011 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:20:59.051122 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:00.358831 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:00.549014 55409 iamrole.go:89] ListRoles: { } I0611 09:21:00.551140 55409 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0611 09:21:00.551496 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:21:00.551656 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.551871 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0611 09:21:00.551895 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:00.552006 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0611 09:21:00.552119 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } W0611 09:21:00.552383 55409 api.go:53] PageSize not implemented I0611 09:21:00.552630 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.552887 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0611 09:21:00.552995 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:21:00.553020 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:21:00.553070 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:00.553369 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.555528 55409 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0611 09:21:00.555665 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:21:00.555753 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:00.555675 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.555793 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:21:00.555795 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:21:00.555832 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:21:00.555837 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:00.555938 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:21:00.556038 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:00.555997 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:21:00.556084 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:21:00.556191 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:00.556256 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:21:00.556407 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:00.556488 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.556638 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:00.556681 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.556807 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:00.556894 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:00.556978 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.557102 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:21:00.557158 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:21:00.557380 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:00.557439 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:00.557540 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.557718 55409 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0611 09:21:00.557957 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:00.558189 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:00.558463 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.558614 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:21:00.558731 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:00.558880 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:00.559082 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:00.559214 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:00.559358 55409 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0611 09:21:00.559428 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:00.559514 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:00.559613 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:00.559634 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:00.559680 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:00.559721 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:21:00.559764 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:00.559796 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:00.559830 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0611 09:21:00.559930 55409 api.go:53] PageSize not implemented I0611 09:21:00.560000 55409 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0611 09:21:00.560053 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:00.560100 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:00.560115 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:00.560175 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:00.560253 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:00.560209 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:00.560287 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:00.560284 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:00.560317 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:00.560316 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:00.560484 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:00.560522 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:00.560602 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:00.560643 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:00.566043 55409 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0611 09:21:00.566165 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:00.566320 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:00.566399 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:00.566565 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:00.567317 55409 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0611 09:21:00.567568 55409 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0611 09:21:00.567826 55409 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.additionalSecurityGroups=sg-123456] I0611 09:21:00.571284 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:00.575207 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:00.587406 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:21:00.591505 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:00.591599 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:01.899629 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:02.088324 55409 iamrole.go:89] ListRoles: { } I0611 09:21:02.090560 55409 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0611 09:21:02.090835 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0611 09:21:02.091073 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0611 09:21:02.091262 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:02.091409 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0611 09:21:02.091512 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0611 09:21:02.091606 55409 api.go:53] PageSize not implemented I0611 09:21:02.091609 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:21:02.091640 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:21:02.091700 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:02.091824 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:02.092021 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:21:02.092109 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:02.092380 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:02.092596 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0611 09:21:02.094101 55409 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0611 09:21:02.094243 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:02.094365 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:21:02.094353 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:21:02.094483 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:02.094527 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:21:02.094519 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:02.094604 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:21:02.094604 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:21:02.094663 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:21:02.094665 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:02.094625 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:21:02.094738 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:21:02.094829 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:02.094898 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:02.094951 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:02.095100 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:02.095151 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:02.095273 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:02.095433 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:21:02.095483 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:02.095629 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:02.095721 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:02.095844 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:02.095974 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:21:02.096127 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:02.096284 55409 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0611 09:21:02.096463 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:02.096566 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:02.096948 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:02.097181 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:02.097311 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:02.097403 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:02.097545 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:21:02.097721 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:02.098149 55409 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0611 09:21:02.098231 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:02.098312 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:02.098393 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:02.098415 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:02.098456 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:02.098488 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:21:02.098528 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:02.098601 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:02.098633 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0611 09:21:02.098719 55409 api.go:53] PageSize not implemented I0611 09:21:02.098782 55409 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0611 09:21:02.098832 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:02.098879 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:02.098898 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:02.098900 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:02.098989 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:02.099019 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:02.099049 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:02.099047 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:02.099087 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0611 09:21:02.099133 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" W0611 09:21:02.099141 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:02.099162 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:02.099319 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:02.099369 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:02.104967 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:21:02.105091 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:02.105245 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:02.105355 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:02.105519 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:02.106273 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:02.106339 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:02.106497 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:21:02.106799 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:21:02.107041 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:21:02.107095 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:02.107135 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:02.107202 55409 dns.go:235] Pre-creating DNS records I0611 09:21:02.115061 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:21:02.119259 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:02.119351 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:03.441183 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:03.634451 55409 iamrole.go:89] ListRoles: { } I0611 09:21:03.636220 55409 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0611 09:21:03.636518 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] }] } I0611 09:21:03.636722 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0611 09:21:03.636841 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0611 09:21:03.637463 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:03.637659 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:21:03.637718 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:21:03.637860 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:03.637938 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:21:03.638132 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:03.638265 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0611 09:21:03.638376 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0611 09:21:03.638899 55409 api.go:53] PageSize not implemented I0611 09:21:03.639029 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0611 09:21:03.639293 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:03.640467 55409 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0611 09:21:03.640609 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:03.640725 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:21:03.640696 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:21:03.640787 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:03.640759 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:21:03.640843 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:21:03.640760 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:21:03.640896 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:21:03.641008 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:03.641033 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:03.641066 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:21:03.641173 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:03.641351 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:03.641474 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:03.641652 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:03.641727 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:03.641882 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:03.642003 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:03.642167 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:21:03.642238 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:03.642340 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:21:03.642483 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:21:03.642625 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:03.642752 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:03.642855 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:03.642945 55409 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0611 09:21:03.643093 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:03.643209 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:03.643400 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:03.643544 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:03.643702 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:21:03.643867 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:03.644546 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:03.644681 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:03.644963 55409 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0611 09:21:03.645072 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:03.645105 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:03.645191 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:03.645215 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:03.645256 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:03.645290 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:21:03.645336 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:03.645374 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:03.645407 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0611 09:21:03.645509 55409 api.go:53] PageSize not implemented I0611 09:21:03.645576 55409 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0611 09:21:03.645633 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:03.645681 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:03.645682 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:03.645697 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:03.645755 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:03.645795 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:03.645848 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:03.645779 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:03.645988 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:03.645987 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:03.646061 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:03.646097 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:03.646247 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:03.646284 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:03.652011 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:21:03.652159 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:03.652342 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:03.652515 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:03.652674 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:03.653194 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:21:03.653440 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:21:03.653734 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t3.large] I0611 09:21:03.656819 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:03.659564 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:03.659642 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:03.671773 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:21:03.676321 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:03.676413 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:03.676468 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:04.982849 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:05.171199 55409 iamrole.go:89] ListRoles: { } I0611 09:21:05.172712 55409 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0611 09:21:05.172992 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.173117 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:21:05.173349 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0611 09:21:05.173545 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } W0611 09:21:05.173643 55409 api.go:53] PageSize not implemented I0611 09:21:05.173783 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:05.173979 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0611 09:21:05.174939 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0611 09:21:05.175124 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.175255 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:21:05.175316 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:21:05.175430 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:05.175496 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.175698 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.176058 55409 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0611 09:21:05.176184 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.176292 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.176411 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:21:05.176438 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:21:05.176386 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:21:05.176481 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:05.176402 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:05.176550 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:21:05.176603 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:21:05.176688 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:05.176728 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:21:05.176653 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.176864 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:05.176923 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:05.177020 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.177195 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:21:05.177235 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:05.177323 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:21:05.177513 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:05.177557 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:05.177633 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:21:05.177751 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:21:05.178575 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.178730 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:05.178809 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:05.179347 55409 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0611 09:21:05.179921 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:05.180369 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:05.180861 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:05.181332 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:05.181561 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:05.181993 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:05.182104 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:05.182262 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:21:05.182494 55409 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0611 09:21:05.182600 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:05.182730 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:05.183424 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:05.183459 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:05.183524 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:05.183567 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:21:05.183615 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:05.183649 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:05.183685 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0611 09:21:05.183787 55409 api.go:53] PageSize not implemented I0611 09:21:05.183842 55409 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0611 09:21:05.183945 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:05.184001 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:05.183977 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:05.184054 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:05.184083 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:05.184176 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:05.184086 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:05.184305 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:05.184346 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:05.184476 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:05.184598 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:05.184640 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:05.184782 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:05.184833 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:05.191212 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:21:05.191366 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:05.191562 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:05.191689 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:05.191862 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:05.192696 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:21:05.193073 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:21:05.193392 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:21:05.193442 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:05.193478 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:05.193545 55409 dns.go:235] Pre-creating DNS records I0611 09:21:05.201910 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:21:05.206062 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:05.206157 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:05.206217 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.518528 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:06.703356 55409 iamrole.go:89] ListRoles: { } I0611 09:21:06.704828 55409 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0611 09:21:06.705117 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0611 09:21:06.706807 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0611 09:21:06.706867 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:06.707095 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:06.707433 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:06.707612 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:21:06.707675 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:21:06.707845 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:06.707948 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } W0611 09:21:06.708112 55409 api.go:53] PageSize not implemented I0611 09:21:06.708127 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:21:06.708262 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:06.709184 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:06.709414 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0611 09:21:06.713305 55409 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0611 09:21:06.713452 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:21:06.713697 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:06.713646 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:21:06.713778 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:06.713773 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:06.713848 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:21:06.713924 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:21:06.713885 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] }] } I0611 09:21:06.714030 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:21:06.713988 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:21:06.714090 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:06.714132 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:21:06.714144 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:21:06.714202 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:06.714302 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:06.714397 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:06.714570 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:06.714708 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:06.714750 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:21:06.714905 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:06.714965 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0611 09:21:06.715174 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:06.715313 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:21:06.715484 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:06.715546 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:06.715715 55409 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0611 09:21:06.715895 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:06.716015 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:06.716230 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:06.716672 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:06.716977 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:06.717140 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:21:06.717250 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:06.717384 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:06.717586 55409 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0611 09:21:06.717678 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:06.717743 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:06.717698 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:06.717788 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:06.717834 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:06.717872 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:21:06.717915 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:06.717951 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:06.717984 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0611 09:21:06.718083 55409 api.go:53] PageSize not implemented I0611 09:21:06.718133 55409 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0611 09:21:06.718184 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:06.718231 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:06.718250 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:06.718259 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:06.718365 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:06.718330 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:06.718403 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:06.718397 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:06.718434 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:06.718511 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:06.718545 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:06.718581 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:06.718721 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:06.718773 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:06.724344 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:21:06.724497 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.724654 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.724794 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.724972 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.725802 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:21:06.726122 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:21:06.726351 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t2.medium] I0611 09:21:06.729362 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:06.732821 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.732908 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.732958 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.742775 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:21:06.746869 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.746957 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.747010 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:06.747057 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:08.032489 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:08.225480 55409 iamrole.go:89] ListRoles: { } I0611 09:21:08.227620 55409 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0611 09:21:08.228045 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:08.228317 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0611 09:21:08.228514 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0611 09:21:08.228705 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:08.228863 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:08.229028 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:21:08.229160 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:08.229270 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:21:08.229300 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:21:08.229362 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:08.229703 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0611 09:21:08.230049 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } W0611 09:21:08.230721 55409 api.go:53] PageSize not implemented I0611 09:21:08.230884 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:08.232592 55409 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0611 09:21:08.232735 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:08.232807 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:21:08.232809 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:21:08.232929 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:08.232909 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:08.232973 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:21:08.232998 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:21:08.233034 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0611 09:21:08.233081 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:21:08.233159 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:08.233183 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:08.233198 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:21:08.233228 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:21:08.233414 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:08.233480 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:08.233601 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:08.233690 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:08.233767 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:08.233839 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:21:08.233974 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:08.234042 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:08.234281 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:21:08.234343 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:08.234472 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:21:08.234639 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:08.234944 55409 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0611 09:21:08.235091 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] }] } I0611 09:21:08.235246 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:08.235370 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:08.235716 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:08.235812 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:21:08.235853 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:08.236008 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:08.236295 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:08.236635 55409 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0611 09:21:08.236707 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:08.236741 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:08.236822 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:08.236843 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:08.236889 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:08.236924 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:21:08.236966 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:08.236999 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:08.237031 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0611 09:21:08.237124 55409 api.go:53] PageSize not implemented I0611 09:21:08.237184 55409 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0611 09:21:08.237255 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:08.237303 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:08.237334 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:08.237409 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:08.237332 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:08.237438 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:08.237456 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:08.237554 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:08.237610 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:08.237642 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:08.237750 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:08.237822 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:08.237969 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:08.237999 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:08.243143 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:21:08.243356 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:08.243517 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:08.243635 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:08.243798 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:08.244355 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:21:08.244719 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:21:08.244955 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:21:08.245008 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:08.245046 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:08.245115 55409 dns.go:235] Pre-creating DNS records I0611 09:21:08.253189 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0611 09:21:08.257383 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:08.257480 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:08.257535 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:08.257586 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:09.541461 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:09.734378 55409 iamrole.go:89] ListRoles: { } I0611 09:21:09.735944 55409 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0611 09:21:09.736207 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.736254 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:09.736328 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } W0611 09:21:09.736348 55409 api.go:53] PageSize not implemented I0611 09:21:09.736352 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:21:09.736481 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:09.736546 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0611 09:21:09.736666 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.736871 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.737019 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0611 09:21:09.737102 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.737291 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0611 09:21:09.737425 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0611 09:21:09.737525 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0611 09:21:09.739042 55409 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0611 09:21:09.739198 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.739274 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0611 09:21:09.739358 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:09.739367 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:21:09.739399 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0611 09:21:09.739431 55409 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0611 09:21:09.739420 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.739444 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0611 09:21:09.739562 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:09.739517 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:21:09.739613 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0611 09:21:09.739571 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.739728 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.739889 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0611 09:21:09.740717 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:09.740812 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:09.740887 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0611 09:21:09.740962 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0611 09:21:09.741090 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:09.741197 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:09.741257 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:09.741305 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0611 09:21:09.741429 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:09.741517 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:09.741719 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:09.742205 55409 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0611 09:21:09.743522 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:09.744413 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:09.744576 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:09.744697 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:09.744781 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:09.744961 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:09.745967 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.746143 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0611 09:21:09.746218 55409 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0611 09:21:09.746305 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:09.746379 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:09.746399 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:09.746446 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:09.746483 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:21:09.746344 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:09.746522 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0611 09:21:09.746556 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0611 09:21:09.746589 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0611 09:21:09.746682 55409 api.go:53] PageSize not implemented I0611 09:21:09.746728 55409 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0611 09:21:09.746776 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:09.746824 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:09.746826 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:09.746842 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:09.746907 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:09.746940 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:09.746984 55409 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0611 09:21:09.746956 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:09.747063 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:09.747100 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:09.747254 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:09.747310 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:09.747459 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0611 09:21:09.747519 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:09.752534 55409 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0611 09:21:09.752773 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:09.752945 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:09.753145 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:09.753318 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:09.754178 55409 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0611 09:21:09.754574 55409 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0611 09:21:09.754856 55409 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0611 09:21:09.755044 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:21:09.755105 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:21:09.755144 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:21:09.755177 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:21:09.755209 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:21:09.755240 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:21:09.755271 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:21:09.755307 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:21:09.755352 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:21:09.755394 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:21:09.755425 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:21:09.755456 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:21:09.755493 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:21:09.755524 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:21:09.755558 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:09.755593 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:09.755626 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:21:09.755660 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:21:09.755698 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:21:09.755730 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:21:09.755766 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0611 09:21:09.755801 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:21:09.755832 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:21:09.755862 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:09.755898 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:09.755936 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:21:09.755974 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:21:09.758661 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:21:09.758736 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:21:09.758762 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:21:09.758798 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.758859 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0611 09:21:09.758929 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.758991 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.759041 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.759100 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.759145 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.759189 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0611 09:21:09.759247 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.759320 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0611 09:21:09.759361 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } W0611 09:21:09.759415 55409 api.go:53] PageSize not implemented I0611 09:21:09.759436 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:09.759463 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:09.759479 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0611 09:21:09.759521 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:21:09.759546 55409 targetgroups.go:35] PageSize not implemented I0611 09:21:09.759566 55409 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" ] } I0611 09:21:09.759651 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:21:09.759688 55409 iamrole.go:89] ListRoles: { } I0611 09:21:09.759733 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:09.759764 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:09.759810 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:21:09.759863 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:21:09.759911 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0611 09:21:09.760458 55409 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } autoscaling-group:master-us-test-1a.masters.complex.example.com ok I0611 09:21:09.760527 55409 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0611 09:21:09.760577 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok autoscaling-group:nodes.complex.example.com ok I0611 09:21:09.760612 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0611 09:21:09.760655 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0611 09:21:09.760635 55409 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0611 09:21:09.760706 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } iam-instance-profile:nodes.complex.example.com ok I0611 09:21:09.760708 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1 ok I0611 09:21:09.760764 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0611 09:21:09.760773 55409 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4 ok I0611 09:21:09.760846 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } iam-instance-profile:masters.complex.example.com ok I0611 09:21:09.760879 55409 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5 ok I0611 09:21:09.760786 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 } ] } W0611 09:21:09.761000 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:09.761018 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0611 09:21:09.760586 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.complex.example.com ok I0611 09:21:09.761065 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0611 09:21:09.761141 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:09.761191 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:21:09.761220 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:09.761262 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 } ] } W0611 09:21:09.761582 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:09.761603 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:21:09.761643 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-2 ok I0611 09:21:09.761763 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0611 09:21:09.761821 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0611 09:21:09.761821 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.complex.example.com" } I0611 09:21:09.761916 55409 iamrole.go:180] ListAttachedRolePolicies: masters.complex.example.com I0611 09:21:09.761944 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0611 09:21:09.761992 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.complex.example.com" } iam-role:masters.complex.example.com ok I0611 09:21:09.762035 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.complex.example.com" } I0611 09:21:09.762094 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.complex.example.com I0611 09:21:09.762116 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0611 09:21:09.762150 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.complex.example.com" } iam-role:nodes.complex.example.com ok I0611 09:21:09.762233 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0611 09:21:09.762339 55409 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0611 09:21:09.762451 55409 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleComplex (15.36s) === RUN TestLifecycleExternalLB I0611 09:21:09.763024 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:21:09.763195 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:21:09.763240 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:21:09.763292 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:21:09.763343 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:21:09.763412 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:21:09.763472 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:21:09.763517 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:21:09.763562 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:21:09.763609 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster externallb.example.com I0611 09:21:09.788198 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:09.791467 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:09.791561 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:11.076216 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:11.240968 55409 iamrole.go:89] ListRoles: { } I0611 09:21:11.242185 55409 executor.go:111] Tasks: 0 done / 107 total; 51 can run W0611 09:21:11.242458 55409 api.go:53] PageSize not implemented I0611 09:21:11.242604 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:11.242663 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } W0611 09:21:11.242734 55409 api.go:53] PageSize not implemented I0611 09:21:11.242756 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0611 09:21:11.242707 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:11.242603 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0611 09:21:11.242932 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0611 09:21:11.242976 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0611 09:21:11.242942 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } W0611 09:21:11.244327 55409 api.go:53] PageSize not implemented I0611 09:21:11.244316 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:11.244829 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:11.243113 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0611 09:21:11.245177 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } I0611 09:21:11.245353 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0611 09:21:11.245255 55409 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0611 09:21:11.245477 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0611 09:21:11.245565 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0611 09:21:11.245615 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0611 09:21:11.245523 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } I0611 09:21:11.246251 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0611 09:21:11.245216 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:11.246840 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:11.246991 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0611 09:21:11.247064 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:11.247291 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:11.248907 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0611 09:21:11.248980 55409 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.249092 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:11.249226 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:11.249278 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:21:11.249325 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:11.249369 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:21:11.250420 55409 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0611 09:21:11.250561 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:11.250676 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0611 09:21:11.250747 55409 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0611 09:21:11.250759 55409 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0611 09:21:11.250786 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0611 09:21:11.250814 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:11.250915 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0611 09:21:11.250937 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0611 09:21:11.251034 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" } ] }], VpcId: "vpc-1" } I0611 09:21:11.251068 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0611 09:21:11.251331 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:21:11.251439 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:11.251498 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:11.251500 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0611 09:21:11.251542 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:11.251734 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:11.251728 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0611 09:21:11.251851 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:21:11.251901 55409 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0611 09:21:11.251959 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:11.251999 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0611 09:21:11.252194 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:21:11.252295 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:11.252456 55409 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "externallb.example.com" }] }] } I0611 09:21:11.252542 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:21:11.252592 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:11.252645 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:11.252681 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:21:11.252724 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" } ] } I0611 09:21:11.252864 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/externallb.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0611 09:21:11.256451 55409 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0611 09:21:11.256689 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-4003to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.256905 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:11.257001 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-1to2379-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.257281 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.257436 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:21:11.257488 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.257727 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0611 09:21:11.257985 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:11.258116 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:11.258221 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.258403 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0611 09:21:11.258537 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0611 09:21:11.258656 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.258790 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-2382to4000-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.258932 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:11.259039 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:11.259178 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:11.259315 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:11.259467 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-::/0" }] }] } I0611 09:21:11.259610 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-udp-1to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.259749 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0611 09:21:11.259789 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:21:11.259830 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.259962 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0611 09:21:11.260130 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0611 09:21:11.260243 55409 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0611 09:21:11.260591 55409 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0611 09:21:11.260912 55409 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0611 09:21:11.260979 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:11.261023 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:11.261093 55409 dns.go:235] Pre-creating DNS records I0611 09:21:11.261152 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:11.267317 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:11.270518 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:11.270615 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:12.534332 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:12.706891 55409 iamrole.go:89] ListRoles: { } I0611 09:21:12.708614 55409 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0611 09:21:12.708831 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0611 09:21:12.708948 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0611 09:21:12.708901 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.708989 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0611 09:21:12.709019 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:21:12.709056 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:21:12.709109 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } W0611 09:21:12.709193 55409 api.go:53] PageSize not implemented W0611 09:21:12.709306 55409 api.go:53] PageSize not implemented I0611 09:21:12.709224 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.709235 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:12.709378 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0611 09:21:12.709473 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0611 09:21:12.709507 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } W0611 09:21:12.709544 55409 api.go:53] PageSize not implemented I0611 09:21:12.709574 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.709626 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0611 09:21:12.709711 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:12.709767 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0611 09:21:12.709836 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0611 09:21:12.709817 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.712546 55409 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0611 09:21:12.712796 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.712916 55409 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0611 09:21:12.713071 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0611 09:21:12.712971 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0611 09:21:12.713169 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:12.713216 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0611 09:21:12.713435 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:12.713529 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.713738 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:12.713867 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:12.713988 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.714157 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:12.719258 55409 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0611 09:21:12.719405 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:12.719590 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:12.719780 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:12.719973 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:12.720138 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:12.720313 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:12.720463 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:12.720955 55409 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0611 09:21:12.721236 55409 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0611 09:21:12.721533 55409 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0611 09:21:12.724586 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:21:12.724652 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:21:12.724690 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:21:12.724722 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:21:12.724754 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:21:12.724784 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:21:12.724816 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:21:12.724849 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:21:12.724883 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:21:12.724922 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:21:12.724957 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:21:12.724986 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:21:12.725015 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:21:12.725049 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:21:12.725079 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:12.725111 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:12.725143 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:21:12.725176 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:21:12.725206 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:21:12.725236 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:21:12.725266 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:12.725301 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:12.725336 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:21:12.725370 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:21:12.726649 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:21:12.726716 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:21:12.726738 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:21:12.726785 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.726834 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0611 09:21:12.726893 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.726955 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.727005 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.727060 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.727107 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.727147 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0611 09:21:12.727196 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.727249 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0611 09:21:12.727292 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } W0611 09:21:12.727345 55409 api.go:53] PageSize not implemented I0611 09:21:12.727368 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:12.727394 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:12.727413 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:21:12.727438 55409 targetgroups.go:35] PageSize not implemented I0611 09:21:12.727456 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0611 09:21:12.727506 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:21:12.727549 55409 iamrole.go:89] ListRoles: { } I0611 09:21:12.727597 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:12.727628 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:12.727670 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:21:12.727713 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:21:12.727748 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:12.728205 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0611 09:21:12.728268 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } iam-instance-profile:masters.externallb.example.com ok I0611 09:21:12.728253 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } autoscaling-group:nodes.externallb.example.com ok autoscaling-group:master-us-test-1a.masters.externallb.example.com ok I0611 09:21:12.728320 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0611 09:21:12.728344 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0611 09:21:12.728368 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } iam-instance-profile:nodes.externallb.example.com ok I0611 09:21:12.728398 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-config:lt-1 ok I0611 09:21:12.728530 55409 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0611 09:21:12.728618 55409 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok keypair:key-1 ok I0611 09:21:12.728658 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0611 09:21:12.728788 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:12.728807 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:21:12.728598 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.externallb.example.com. ok I0611 09:21:12.728856 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-2 ok I0611 09:21:12.728930 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:12.729021 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0611 09:21:12.729234 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:12.729252 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:21:12.729339 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0611 09:21:12.729389 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.externallb.example.com" } I0611 09:21:12.729474 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.externallb.example.com I0611 09:21:12.729492 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0611 09:21:12.729527 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.externallb.example.com" } iam-role:nodes.externallb.example.com ok I0611 09:21:12.729569 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.externallb.example.com" } I0611 09:21:12.729612 55409 iamrole.go:180] ListAttachedRolePolicies: masters.externallb.example.com I0611 09:21:12.729627 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0611 09:21:12.729657 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.externallb.example.com" } iam-role:masters.externallb.example.com ok I0611 09:21:12.729725 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0611 09:21:12.729811 55409 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0611 09:21:12.729887 55409 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleExternalLB (2.97s) === RUN TestLifecycleSharedSubnet I0611 09:21:12.730369 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:21:12.730517 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:21:12.730556 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:21:12.730600 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:21:12.730641 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:21:12.730693 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:21:12.730734 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:21:12.730764 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:21:12.730804 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:21:12.730835 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedsubnet.example.com I0611 09:21:12.754836 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:12.758061 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:12.758147 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:14.046793 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:14.221219 55409 iamrole.go:89] ListRoles: { } I0611 09:21:14.222396 55409 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0611 09:21:14.222646 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:14.222890 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } I0611 09:21:14.223023 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0611 09:21:14.223251 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } I0611 09:21:14.223329 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0611 09:21:14.223705 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:14.223926 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:14.224172 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:14.224241 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:14.224414 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:21:14.224545 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0611 09:21:14.224574 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0611 09:21:14.224618 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:14.224865 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:14.225012 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:14.225066 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.225728 55409 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0611 09:21:14.226002 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:21:14.226202 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0611 09:21:14.226162 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0611 09:21:14.226258 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0611 09:21:14.226336 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0611 09:21:14.226519 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0611 09:21:14.226589 55409 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0611 09:21:14.226564 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0611 09:21:14.226670 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0611 09:21:14.226841 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0611 09:21:14.226943 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:14.226993 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:14.227049 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }], VpcId: "vpc-12345678" } I0611 09:21:14.227220 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:14.227318 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:14.227398 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:21:14.227472 55409 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "shared" }, { Key: "SubnetType", Value: "Public" } ] } I0611 09:21:14.228155 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedsubnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0611 09:21:14.235333 55409 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0611 09:21:14.235599 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.236014 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:14.236979 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:14.237129 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-1to2379-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.237421 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-2382to4000-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.237580 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0611 09:21:14.237710 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0611 09:21:14.237927 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.238060 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.238203 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0611 09:21:14.238328 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-4003to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.238459 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0611 09:21:14.238582 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:14.238700 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:14.238856 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-udp-1to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.239184 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0611 09:21:14.239419 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.239642 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0611 09:21:14.239860 55409 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0611 09:21:14.240219 55409 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0611 09:21:14.240578 55409 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0611 09:21:14.240633 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:14.240673 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:14.240747 55409 dns.go:235] Pre-creating DNS records I0611 09:21:14.240777 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:14.246997 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:14.250145 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:14.250229 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:15.537911 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:15.711474 55409 iamrole.go:89] ListRoles: { } I0611 09:21:15.712711 55409 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0611 09:21:15.713079 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:15.713229 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:15.713705 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] }] } I0611 09:21:15.713843 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:15.714676 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:21:15.714806 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0611 09:21:15.714857 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0611 09:21:15.716762 55409 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0611 09:21:15.716915 55409 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0611 09:21:15.717063 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0611 09:21:15.716934 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0611 09:21:15.717144 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0611 09:21:15.717354 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:21:15.717472 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0611 09:21:15.717615 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:15.717680 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:15.722444 55409 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0611 09:21:15.722598 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:15.722766 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:15.723094 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:15.723261 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:15.723927 55409 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0611 09:21:15.724145 55409 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0611 09:21:15.724317 55409 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0611 09:21:15.726430 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:21:15.726482 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:21:15.726509 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:21:15.726533 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:21:15.726557 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:21:15.726582 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:21:15.726608 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:21:15.726638 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:21:15.726670 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:21:15.726695 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:21:15.726718 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:21:15.726742 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:15.726769 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:15.726796 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:21:15.726822 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:21:15.726845 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:21:15.726868 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:15.726895 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:15.726923 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:21:15.728010 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:21:15.728069 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:21:15.728083 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:21:15.728114 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:15.728161 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0611 09:21:15.728209 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:15.728256 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:15.728292 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:15.728327 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:15.728364 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:15.728391 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0611 09:21:15.728422 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:15.728462 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0611 09:21:15.728490 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } W0611 09:21:15.728528 55409 api.go:53] PageSize not implemented I0611 09:21:15.728548 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:15.728571 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:15.728588 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:21:15.728608 55409 targetgroups.go:35] PageSize not implemented I0611 09:21:15.728624 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0611 09:21:15.728665 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:21:15.728696 55409 iamrole.go:89] ListRoles: { } I0611 09:21:15.728736 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:15.728762 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:15.728803 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:21:15.728838 55409 routetable.go:53] DescribeRouteTables: { } autoscaling-group:master-us-test-1a.masters.sharedsubnet.example.com ok autoscaling-config:lt-1 ok autoscaling-group:nodes.sharedsubnet.example.com ok I0611 09:21:15.729136 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.sharedsubnet.example.com. ok I0611 09:21:15.729259 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:15.729300 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0611 09:21:15.729388 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } iam-instance-profile:masters.sharedsubnet.example.com ok I0611 09:21:15.729436 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0611 09:21:15.729538 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } iam-instance-profile:nodes.sharedsubnet.example.com ok I0611 09:21:15.729335 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 } ] } W0611 09:21:15.729591 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:15.729625 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0611 09:21:15.729698 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0611 09:21:15.729762 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0611 09:21:15.729823 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0611 09:21:15.729875 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:15.729921 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0611 09:21:15.730032 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:15.730046 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:21:15.730120 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedsubnet.example.com" } I0611 09:21:15.730170 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0611 09:21:15.730192 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedsubnet.example.com" } I0611 09:21:15.730275 55409 iamrole.go:180] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0611 09:21:15.730294 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0611 09:21:15.730330 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedsubnet.example.com" } iam-role:masters.sharedsubnet.example.com ok I0611 09:21:15.730364 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0611 09:21:15.730397 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedsubnet.example.com" } iam-role:nodes.sharedsubnet.example.com ok --- PASS: TestLifecycleSharedSubnet (3.00s) === RUN TestLifecyclePrivateSharedSubnet I0611 09:21:15.730880 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:21:15.731031 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:21:15.731071 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:21:15.731136 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:21:15.731181 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:21:15.731233 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:21:15.731274 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:21:15.731303 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:21:15.731342 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:21:15.731369 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-subnet.example.com I0611 09:21:15.762908 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:15.766776 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:15.766866 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:15.766923 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:17.049938 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:17.215137 55409 iamrole.go:89] ListRoles: { } I0611 09:21:17.216875 55409 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0611 09:21:17.217151 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:17.217562 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:17.217813 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.218032 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:21:17.218056 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } I0611 09:21:17.218122 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0611 09:21:17.218272 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0611 09:21:17.218186 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0611 09:21:17.218418 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } I0611 09:21:17.218402 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:17.218492 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0611 09:21:17.218637 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:17.218741 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } I0611 09:21:17.218792 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:17.218843 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-subnet.example.com" }] } I0611 09:21:17.219145 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:17.219351 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:17.219500 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:17.220771 55409 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0611 09:21:17.220918 55409 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0611 09:21:17.221034 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0611 09:21:17.220971 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0611 09:21:17.221173 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0611 09:21:17.221140 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0611 09:21:17.221213 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0611 09:21:17.221261 55409 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0611 09:21:17.221322 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0611 09:21:17.221431 55409 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-su-5ol32q", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-private-shared-su-5ol32q" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0611 09:21:17.221468 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0611 09:21:17.221557 55409 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0611 09:21:17.221567 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0611 09:21:17.221546 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0611 09:21:17.221672 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0611 09:21:17.221697 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:17.221753 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:17.221805 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:21:17.221923 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0611 09:21:17.222019 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:17.222070 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:17.222106 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0611 09:21:17.222109 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0611 09:21:17.222298 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0611 09:21:17.222390 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0611 09:21:17.222462 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0611 09:21:17.222541 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0611 09:21:17.222606 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:21:17.222655 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:17.222696 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:21:17.222739 55409 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Private" },{ Key: "kubernetes.io/role/internal-elb", Value: "1" }] } I0611 09:21:17.222814 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:21:17.222860 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0611 09:21:17.222947 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:21:17.222997 55409 tags.go:42] CreateTags { Resources: ["subnet-abcdef"], Tags: [{ Key: "SubnetType", Value: "Utility" },{ Key: "kubernetes.io/role/elb", Value: "1" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" }] } I0611 09:21:17.223094 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-subnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0611 09:21:17.223482 55409 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0611 09:21:17.223734 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0611 09:21:17.223819 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:17.223910 55409 loadbalancers.go:35] PageSize not implemented W0611 09:21:17.223859 55409 api.go:53] PageSize not implemented I0611 09:21:17.223914 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.224019 55409 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-su-5ol32q", SubnetMappings: [{ SubnetId: "subnet-abcdef" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], Type: "network" } I0611 09:21:17.224072 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:17.224101 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0611 09:21:17.224178 55409 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"], Tags: [{ Key: "Name", Value: "api.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0611 09:21:17.224335 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:17.224407 55409 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0611 09:21:17.224331 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.224491 55409 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0611 09:21:17.224646 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-4003to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.224933 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.225188 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0611 09:21:17.225258 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.225452 55409 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1", Port: 22, Protocol: "TCP" } W0611 09:21:17.225575 55409 api.go:53] PageSize not implemented I0611 09:21:17.225470 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0611 09:21:17.225598 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:17.225645 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0611 09:21:17.225745 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0611 09:21:17.225925 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0611 09:21:17.226021 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" }] }] } I0611 09:21:17.226152 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-1to2379-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.226287 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-subnet.example.com" }] }] } I0611 09:21:17.226416 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-2382to4000-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.226588 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.226714 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-::/0" }] }] } I0611 09:21:17.226836 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.226971 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" }] }] } I0611 09:21:17.227097 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.227220 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0611 09:21:17.227321 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-udp-1to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0611 09:21:17.227450 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:17.227561 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:17.227646 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0611 09:21:17.227808 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0611 09:21:17.227999 55409 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0611 09:21:17.228131 55409 api.go:53] PageSize not implemented I0611 09:21:17.228188 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:17.228223 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0611 09:21:17.228265 55409 api.go:53] PageSize not implemented I0611 09:21:17.228319 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:17.228350 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:17.228497 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:17.228585 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:17.233670 55409 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0611 09:21:17.233918 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:17.234042 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:17.234123 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:17.234239 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:17.236150 55409 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0611 09:21:17.236597 55409 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0611 09:21:17.237361 55409 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0611 09:21:17.237475 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:17.237582 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:17.237838 55409 dns.go:235] Pre-creating DNS records I0611 09:21:17.238406 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:17.246507 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:17.250090 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:17.250183 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:17.250240 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:18.517130 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:18.692318 55409 iamrole.go:89] ListRoles: { } I0611 09:21:18.694092 55409 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0611 09:21:18.694380 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:21:18.694505 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0611 09:21:18.694537 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0611 09:21:18.694620 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.694638 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:18.694748 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:18.694861 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.697240 55409 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0611 09:21:18.697394 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0611 09:21:18.697506 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0611 09:21:18.697609 55409 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0611 09:21:18.697507 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0611 09:21:18.697645 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0611 09:21:18.697741 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0611 09:21:18.697713 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0611 09:21:18.697822 55409 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0611 09:21:18.697812 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0611 09:21:18.697929 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0611 09:21:18.698109 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:18.698174 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0611 09:21:18.698313 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:21:18.698365 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0611 09:21:18.698521 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:18.698591 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:18.698660 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:21:18.699374 55409 executor.go:111] Tasks: 72 done / 123 total; 31 can run W0611 09:21:18.699762 55409 api.go:53] PageSize not implemented I0611 09:21:18.699705 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:18.699798 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:18.699931 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:18.699819 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0611 09:21:18.699987 55409 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0611 09:21:18.699905 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0611 09:21:18.700010 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:18.700128 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0611 09:21:18.700169 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0611 09:21:18.700216 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0611 09:21:18.700259 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0611 09:21:18.700309 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } W0611 09:21:18.700402 55409 api.go:53] PageSize not implemented I0611 09:21:18.700424 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:18.700497 55409 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0611 09:21:18.700593 55409 api.go:53] PageSize not implemented I0611 09:21:18.700582 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:18.700643 55409 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0611 09:21:18.700647 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:18.700671 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:18.700699 55409 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" W0611 09:21:18.700718 55409 api.go:53] PageSize not implemented I0611 09:21:18.700786 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:18.700873 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:18.700979 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:18.706314 55409 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0611 09:21:18.706504 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:18.706681 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:18.706825 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:18.706993 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:18.707739 55409 executor.go:111] Tasks: 115 done / 123 total; 2 can run W0611 09:21:18.707900 55409 api.go:53] PageSize not implemented I0611 09:21:18.707941 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:18.708172 55409 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0611 09:21:18.708401 55409 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0611 09:21:18.711695 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:21:18.711755 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:21:18.711789 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:21:18.711832 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:21:18.711880 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:21:18.711916 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:21:18.711972 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:21:18.712007 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:21:18.712064 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0611 09:21:18.712111 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:21:18.712163 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:21:18.712213 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:21:18.712244 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:18.712293 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:18.712332 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:21:18.712383 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0611 09:21:18.712419 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:21:18.712467 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:21:18.712505 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:21:18.712553 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:18.712601 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:18.712640 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:21:18.714140 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:21:18.714225 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:21:18.714248 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:21:18.714298 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.714362 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0611 09:21:18.714479 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.714564 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.714625 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.714678 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.714732 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.714772 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0611 09:21:18.714830 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.714880 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0611 09:21:18.714929 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } W0611 09:21:18.714988 55409 api.go:53] PageSize not implemented I0611 09:21:18.715008 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0611 09:21:18.715071 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:18.715103 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:18.715119 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0611 09:21:18.715175 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:21:18.715204 55409 targetgroups.go:35] PageSize not implemented I0611 09:21:18.715222 55409 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" ] } I0611 09:21:18.715310 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:21:18.715365 55409 iamrole.go:89] ListRoles: { } I0611 09:21:18.715423 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:18.715458 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:18.715527 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:21:18.715577 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:21:18.716121 55409 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1 ok autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com ok I0611 09:21:18.716164 55409 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } load-balancer:api-private-shared-subnet-n2f8ak ok autoscaling-group:bastion.private-shared-subnet.example.com ok autoscaling-config:lt-1 ok I0611 09:21:18.716241 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:18.716275 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0611 09:21:18.716301 55409 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } autoscaling-group:nodes.private-shared-subnet.example.com ok target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4 ok I0611 09:21:18.716373 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } iam-instance-profile:nodes.private-shared-subnet.example.com ok I0611 09:21:18.716315 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 } ] } W0611 09:21:18.716496 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:18.716532 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:21:18.716358 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:18.716507 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.private-shared-subnet.example.com. ok I0611 09:21:18.716595 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0611 09:21:18.716637 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } iam-instance-profile:masters.private-shared-subnet.example.com ok I0611 09:21:18.716675 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:18.716703 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0611 09:21:18.716795 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } iam-instance-profile:bastions.private-shared-subnet.example.com ok I0611 09:21:18.716742 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } W0611 09:21:18.716892 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:18.716922 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0611 09:21:18.716957 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:18.717035 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0611 09:21:18.717250 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:18.717280 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:21:18.717319 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-2 ok autoscaling-config:lt-3 ok I0611 09:21:18.717437 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0611 09:21:18.717547 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-subnet.example.com" } I0611 09:21:18.717621 55409 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0611 09:21:18.717585 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:21:18.717646 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0611 09:21:18.717683 55409 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-subnet.example.com" } iam-role:bastions.private-shared-subnet.example.com ok I0611 09:21:18.717722 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-subnet.example.com" } I0611 09:21:18.717836 55409 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0611 09:21:18.717673 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0611 09:21:18.717854 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } W0611 09:21:18.717879 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:18.717899 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-subnet.example.com" } iam-role:masters.private-shared-subnet.example.com ok I0611 09:21:18.717906 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0611 09:21:18.717933 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-subnet.example.com" } I0611 09:21:18.717976 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0611 09:21:18.717990 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0611 09:21:18.718020 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-subnet.example.com" } iam-role:nodes.private-shared-subnet.example.com ok --- PASS: TestLifecyclePrivateSharedSubnet (2.99s) === RUN TestLifecyclePrivateSharedIP I0611 09:21:18.718506 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:21:18.718651 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:21:18.718689 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:21:18.718731 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:21:18.718770 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:21:18.718819 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:21:18.718859 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:21:18.718886 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:21:18.718922 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:21:18.718947 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-ip.example.com I0611 09:21:18.751995 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:18.755401 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:18.755489 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:18.755546 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:20.045888 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:20.217005 55409 iamrole.go:89] ListRoles: { } I0611 09:21:20.218688 55409 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0611 09:21:20.219006 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:20.219235 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:20.219296 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } I0611 09:21:20.219442 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.private-shared-ip.example.com" }] } I0611 09:21:20.219446 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:20.219652 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:20.219761 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } I0611 09:21:20.219819 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:20.219843 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] } I0611 09:21:20.219875 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:20.219991 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:20.220028 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } I0611 09:21:20.220129 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0611 09:21:20.220281 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:21:20.220389 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0611 09:21:20.220435 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0611 09:21:20.220762 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:20.220956 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.223846 55409 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0611 09:21:20.224073 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0611 09:21:20.224327 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0611 09:21:20.224625 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0611 09:21:20.224722 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0611 09:21:20.224986 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0611 09:21:20.225074 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0611 09:21:20.225094 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0611 09:21:20.225069 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }], VpcId: "vpc-12345678" } I0611 09:21:20.225356 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:20.225390 55409 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-ip-eepmph", Port: 22, Protocol: "TCP", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-private-shared-ip-eepmph" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0611 09:21:20.225472 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0611 09:21:20.225580 55409 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0611 09:21:20.225667 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0611 09:21:20.225960 55409 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0611 09:21:20.226074 55409 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0611 09:21:20.225991 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:20.226210 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0611 09:21:20.226233 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0611 09:21:20.226394 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:20.226534 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0611 09:21:20.227094 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0611 09:21:20.226620 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0611 09:21:20.226408 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" } ] }], VpcId: "vpc-12345678" } I0611 09:21:20.227191 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:20.227224 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:20.227256 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:21:20.227316 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] }] } I0611 09:21:20.227317 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], VpcId: "vpc-12345678" } I0611 09:21:20.227377 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0611 09:21:20.228059 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:20.228163 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:21:20.228232 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:21:20.228284 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:20.228323 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:20.228366 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:20.228294 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0611 09:21:20.228421 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0611 09:21:20.228614 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:21:20.228597 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-12345678" } I0611 09:21:20.228692 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0611 09:21:20.228771 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:21:20.228832 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:21:20.228545 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-ip.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0611 09:21:20.228880 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:21:20.228962 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:21:20.229018 55409 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" } ] } I0611 09:21:20.229104 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0611 09:21:20.229228 55409 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0611 09:21:20.229423 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-nodes.private-shared-ip.example.com" }] }] } W0611 09:21:20.229564 55409 api.go:53] PageSize not implemented I0611 09:21:20.229604 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0611 09:21:20.229716 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:20.229740 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0611 09:21:20.229813 55409 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"], Tags: [{ Key: "Name", Value: "api.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0611 09:21:20.229883 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:20.229836 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-2382to4000-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.229921 55409 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0611 09:21:20.229979 55409 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0611 09:21:20.230047 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.230193 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-::/0" }] }] } I0611 09:21:20.230268 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:20.230336 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:20.230365 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:20.230435 55409 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-ip-eepmph", SubnetMappings: [{ SubnetId: "subnet-1" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }], Type: "network" } I0611 09:21:20.230522 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:20.230578 55409 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1", Port: 22, Protocol: "TCP" } W0611 09:21:20.230658 55409 api.go:53] PageSize not implemented I0611 09:21:20.230676 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:20.230576 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.230787 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.230969 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:20.231136 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0611 09:21:20.231186 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0611 09:21:20.231255 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0611 09:21:20.231413 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0611 09:21:20.231574 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0611 09:21:20.231732 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:20.231851 55409 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0611 09:21:20.232008 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0611 09:21:20.232219 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:20.232372 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-ip.example.com" }] }] } I0611 09:21:20.232574 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-udp-1to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.232713 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.232843 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-1to2379-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0611 09:21:20.232975 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0611 09:21:20.233022 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:21:20.233159 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:21:20.233203 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.233349 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.233471 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-4003to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.233605 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:20.233715 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.233848 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.233981 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0611 09:21:20.234019 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.234145 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0611 09:21:20.234235 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0611 09:21:20.234333 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.234487 55409 tags.go:42] CreateTags { Resources: ["eipalloc-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "shared" }] } I0611 09:21:20.234535 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:20.234653 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0611 09:21:20.234725 55409 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0611 09:21:20.234806 55409 api.go:53] PageSize not implemented I0611 09:21:20.234813 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:20.234857 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:20.234874 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0611 09:21:20.235016 55409 api.go:53] PageSize not implemented I0611 09:21:20.234987 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:20.235085 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:20.235095 55409 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:21:20.235006 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:20.235231 55409 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-12345678", SubnetId: "subnet-1", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0611 09:21:20.235248 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:20.235331 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0611 09:21:20.235373 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:21:20.235415 55409 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0611 09:21:20.240727 55409 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0611 09:21:20.241044 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:20.241205 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:20.241479 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:20.241612 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0611 09:21:20.241730 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:20.241845 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:20.242625 55409 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0611 09:21:20.242915 55409 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0611 09:21:20.243245 55409 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0611 09:21:20.243293 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:20.243330 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:20.243394 55409 dns.go:235] Pre-creating DNS records I0611 09:21:20.243421 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:20.249873 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:20.253334 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:20.253418 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:20.253477 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:21.550711 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:21.729261 55409 iamrole.go:89] ListRoles: { } I0611 09:21:21.731193 55409 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0611 09:21:21.731885 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:21.732038 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.732055 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:21.732725 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.733149 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0611 09:21:21.733327 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0611 09:21:21.733385 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0611 09:21:21.734054 55409 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0611 09:21:21.734209 55409 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0611 09:21:21.734204 55409 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0611 09:21:21.734284 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0611 09:21:21.734317 55409 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0611 09:21:21.734320 55409 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0611 09:21:21.734284 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.734421 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.734569 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0611 09:21:21.734602 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0611 09:21:21.734660 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] }] } I0611 09:21:21.734852 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:21.734904 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0611 09:21:21.735116 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:21.735185 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.735327 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0611 09:21:21.735436 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0611 09:21:21.735576 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:21.735622 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0611 09:21:21.735757 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:21.735821 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0611 09:21:21.736021 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:21:21.736171 55409 executor.go:111] Tasks: 74 done / 132 total; 36 can run W0611 09:21:21.736288 55409 api.go:53] PageSize not implemented I0611 09:21:21.736322 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:21.736325 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:21.736483 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:21.736540 55409 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0611 09:21:21.736517 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:21.736545 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0611 09:21:21.736612 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0611 09:21:21.736653 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:21.736683 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0611 09:21:21.736735 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0611 09:21:21.736771 55409 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0611 09:21:21.736811 55409 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0611 09:21:21.736802 55409 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0611 09:21:21.736849 55409 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0611 09:21:21.736894 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } W0611 09:21:21.736935 55409 api.go:53] PageSize not implemented I0611 09:21:21.736956 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:21.737135 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:21.737249 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:21.737381 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:21.737628 55409 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0611 09:21:21.737691 55409 api.go:53] PageSize not implemented I0611 09:21:21.737720 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:21.737793 55409 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0611 09:21:21.737729 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } W0611 09:21:21.737865 55409 api.go:53] PageSize not implemented I0611 09:21:21.737829 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:21.737930 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0611 09:21:21.737939 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:21.737959 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0611 09:21:21.738020 55409 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0611 09:21:21.738047 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:21.738156 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:21.743632 55409 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0611 09:21:21.743739 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0611 09:21:21.743911 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:21.744078 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:21.744281 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:21.744465 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:21.744947 55409 executor.go:111] Tasks: 124 done / 132 total; 2 can run W0611 09:21:21.745090 55409 api.go:53] PageSize not implemented I0611 09:21:21.745120 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:21.745336 55409 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0611 09:21:21.745613 55409 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0611 09:21:21.748827 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:21:21.748893 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:21:21.748929 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:21:21.748966 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:21:21.749000 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:21:21.749031 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:21:21.749066 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:21:21.749103 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:21:21.749145 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0611 09:21:21.749182 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0611 09:21:21.749219 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:21:21.749247 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:21:21.749277 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:21:21.749310 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:21:21.749340 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0611 09:21:21.749372 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:21.749405 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:21.749438 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0611 09:21:21.749471 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0611 09:21:21.749506 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:21:21.749541 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:21:21.749571 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0611 09:21:21.749604 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:21:21.749638 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:21:21.749668 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:21.749702 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:21.749734 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:21:21.751151 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:21:21.751221 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:21:21.751242 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:21:21.751280 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.751339 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0611 09:21:21.751406 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.751469 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.751513 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.751558 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.751600 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.751643 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0611 09:21:21.751695 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.751748 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:21:21.751776 55409 natgateway.go:117] DescribeNatGateways: { } I0611 09:21:21.751818 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0611 09:21:21.751854 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } W0611 09:21:21.751900 55409 api.go:53] PageSize not implemented I0611 09:21:21.751919 55409 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0611 09:21:21.751960 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:21.751988 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:21.752004 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0611 09:21:21.752041 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:21:21.752065 55409 targetgroups.go:35] PageSize not implemented I0611 09:21:21.752082 55409 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" ] } I0611 09:21:21.752140 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:21:21.752178 55409 iamrole.go:89] ListRoles: { } I0611 09:21:21.752221 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:21.752248 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:21.752296 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:21:21.752345 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:21:21.752380 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0611 09:21:21.752417 55409 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0611 09:21:21.752451 55409 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0611 09:21:21.753027 55409 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1 ok I0611 09:21:21.753118 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-group:nodes.private-shared-ip.example.com ok I0611 09:21:21.753139 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } autoscaling-group:bastion.private-shared-ip.example.com ok I0611 09:21:21.753249 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } iam-instance-profile:masters.private-shared-ip.example.com ok I0611 09:21:21.753077 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } autoscaling-group:master-us-test-1a.masters.private-shared-ip.example.com ok autoscaling-config:lt-3 ok I0611 09:21:21.753249 55409 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok autoscaling-config:lt-2 ok I0611 09:21:21.753316 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0611 09:21:21.753402 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } iam-instance-profile:nodes.private-shared-ip.example.com ok I0611 09:21:21.753374 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:21.753440 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0611 09:21:21.753520 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } iam-instance-profile:bastions.private-shared-ip.example.com ok I0611 09:21:21.753444 55409 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.private-shared-ip.example.com. ok I0611 09:21:21.753463 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4 ok W0611 09:21:21.753597 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:21.753618 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:21:21.753538 55409 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } autoscaling-config:lt-1 ok load-balancer:api-private-shared-ip-exa-ohatqj ok I0611 09:21:21.753664 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0611 09:21:21.753716 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 } ] } W0611 09:21:21.753847 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:21.753870 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0611 09:21:21.753902 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0611 09:21:21.753952 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0611 09:21:21.754136 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:21.754157 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0611 09:21:21.754199 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0611 09:21:21.754261 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0611 09:21:21.754363 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-ip.example.com" } I0611 09:21:21.754411 55409 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0611 09:21:21.754389 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0611 09:21:21.754453 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0611 09:21:21.754503 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:21.754574 55409 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-ip.example.com" } iam-role:bastions.private-shared-ip.example.com ok I0611 09:21:21.754643 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-ip.example.com" } I0611 09:21:21.754722 55409 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0611 09:21:21.754589 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } W0611 09:21:21.754772 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:21.754753 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0611 09:21:21.754805 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:21:21.754811 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-ip.example.com" } iam-role:masters.private-shared-ip.example.com ok I0611 09:21:21.754864 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0611 09:21:21.754913 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-ip.example.com" } I0611 09:21:21.754982 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0611 09:21:21.754998 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0611 09:21:21.755028 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-ip.example.com" } iam-role:nodes.private-shared-ip.example.com ok I0611 09:21:21.755108 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0611 09:21:21.755199 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok --- PASS: TestLifecyclePrivateSharedIP (3.04s) === RUN TestLifecycleManyAddons I0611 09:21:21.755762 55409 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:21:21.755917 55409 internetgateways.go:66] CreateInternetGateway: { } I0611 09:21:21.755956 55409 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:21:21.755997 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:21:21.756034 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:21:21.756084 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:21:21.756125 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:21:21.756154 55409 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:21:21.756200 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:21:21.756231 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0611 09:21:21.787408 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:21.791459 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:21.791550 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:23.071698 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:23.861783 55409 iamrole.go:89] ListRoles: { } I0611 09:21:23.862782 55409 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0611 09:21:23.863322 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0611 09:21:23.863387 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal.example.com" }] } I0611 09:21:23.863533 55409 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0611 09:21:23.864842 55409 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal.example.com" }] } I0611 09:21:23.865315 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:23.865577 55409 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:21:23.865698 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0611 09:21:23.865657 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:23.865739 55409 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0611 09:21:23.865793 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:21:23.865843 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:23.866466 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] }] } I0611 09:21:23.866619 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:23.866746 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:23.866812 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:23.866968 55409 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:21:23.867190 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:21:23.867251 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:23.867406 55409 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0611 09:21:23.867640 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:23.868160 55409 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0611 09:21:23.868577 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:23.871961 55409 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0611 09:21:23.872116 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:23.872295 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:23.872334 55409 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0611 09:21:23.872360 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0611 09:21:23.872512 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0611 09:21:23.872454 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:23.872570 55409 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0611 09:21:23.872696 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:23.872842 55409 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0611 09:21:23.872924 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeTags\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0611 09:21:23.872994 55409 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:21:23.873136 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:21:23.873214 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:23.873330 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0611 09:21:23.873424 55409 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0611 09:21:23.873496 55409 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0611 09:21:23.873517 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0611 09:21:23.873800 55409 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0611 09:21:23.873884 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:21:23.873955 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:23.874010 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0611 09:21:23.874147 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:21:23.874225 55409 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] } I0611 09:21:23.874357 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0611 09:21:23.874487 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:23.874547 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:23.874584 55409 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal.example.com" }] }], VpcId: "vpc-1" } I0611 09:21:23.874658 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:23.874697 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:23.874537 55409 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"acm:DescribeCertificate\",\n \"acm:ListCertificates\",\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"cognito-idp:DescribeUserPoolClient\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:CreateSnapshot\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcPeeringConnections\",\n \"ec2:DescribeVpcs\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"elasticloadbalancing:DescribeListenerCertificates\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeRules\",\n \"elasticloadbalancing:DescribeTags\",\n \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteSnapshot\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddListenerCertificates\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteRule\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyRule\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:RemoveListenerCertificates\",\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:SetIpAddressType\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\",\n \"elasticloadbalancing:SetSecurityGroups\",\n \"elasticloadbalancing:SetSubnets\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateRule\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0611 09:21:23.877887 55409 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0611 09:21:23.878048 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:23.878207 55409 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:21:23.878281 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" }] }] } I0611 09:21:23.878517 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:23.878675 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0611 09:21:23.878721 55409 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0611 09:21:23.878769 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:23.878920 55409 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0611 09:21:23.879053 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:21:23.879300 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:23.879443 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0611 09:21:23.879603 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" }] }] } I0611 09:21:23.879757 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:23.879828 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:23.880010 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:21:23.880239 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0611 09:21:23.880378 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:23.880545 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0611 09:21:23.880788 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:21:23.880937 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" }] }] } I0611 09:21:23.881074 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0611 09:21:23.881245 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:21:23.881379 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" }] }] } I0611 09:21:23.881514 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:21:23.881640 55409 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0611 09:21:23.881765 55409 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0611 09:21:23.882005 55409 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0611 09:21:23.882367 55409 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0611 09:21:23.882701 55409 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0611 09:21:23.882769 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:23.882813 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:23.882884 55409 dns.go:235] Pre-creating DNS records I0611 09:21:23.882916 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:23.888986 55409 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0611 09:21:23.892507 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:23.892590 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:25.203795 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:26.001115 55409 iamrole.go:89] ListRoles: { } I0611 09:21:26.002132 55409 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0611 09:21:26.002459 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.002540 55409 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0611 09:21:26.002703 55409 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0611 09:21:26.002855 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.002994 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.003082 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:21:26.003110 55409 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:21:26.003171 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:26.003227 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.004843 55409 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0611 09:21:26.004985 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.005261 55409 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0611 09:21:26.005165 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0611 09:21:26.005354 55409 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0611 09:21:26.005382 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:26.005458 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0611 09:21:26.005618 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:26.005706 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.005830 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:26.005920 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.006055 55409 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:21:26.006094 55409 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:21:26.008878 55409 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0611 09:21:26.009103 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:26.009222 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:26.009416 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:26.009601 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:26.009799 55409 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0611 09:21:26.010078 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:26.010305 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0611 09:21:26.010511 55409 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0611 09:21:26.010828 55409 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0611 09:21:26.011009 55409 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0611 09:21:26.013936 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0611 09:21:26.014000 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0611 09:21:26.014037 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0611 09:21:26.014066 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0611 09:21:26.014096 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0611 09:21:26.014127 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0611 09:21:26.014158 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0611 09:21:26.014190 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0611 09:21:26.014222 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0611 09:21:26.014263 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0611 09:21:26.014297 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0611 09:21:26.014325 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0611 09:21:26.014353 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0611 09:21:26.014390 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0611 09:21:26.014419 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:21:26.014493 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0611 09:21:26.014525 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:21:26.014558 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0611 09:21:26.014588 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0611 09:21:26.014617 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0611 09:21:26.014643 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0611 09:21:26.014676 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0611 09:21:26.014709 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:21:26.014741 55409 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0611 09:21:26.016398 55409 delete_cluster.go:128] Looking for cloud resources to delete W0611 09:21:26.016461 55409 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0611 09:21:26.016483 55409 keypairs.go:95] DescribeKeyPairs: { } I0611 09:21:26.016530 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.016582 55409 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0611 09:21:26.016663 55409 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.016728 55409 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.016777 55409 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.016832 55409 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.016874 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.016912 55409 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0611 09:21:26.016965 55409 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.017017 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0611 09:21:26.017058 55409 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0611 09:21:26.017102 55409 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0611 09:21:26.017136 55409 api.go:53] PageSize not implemented I0611 09:21:26.017158 55409 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0611 09:21:26.017185 55409 loadbalancers.go:35] PageSize not implemented I0611 09:21:26.017206 55409 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0611 09:21:26.017230 55409 targetgroups.go:35] PageSize not implemented I0611 09:21:26.017249 55409 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0611 09:21:26.017302 55409 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0611 09:21:26.017342 55409 iamrole.go:89] ListRoles: { } I0611 09:21:26.017383 55409 zones.go:93] ListHostedZonesPages { } I0611 09:21:26.017413 55409 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0611 09:21:26.017454 55409 internetgateways.go:101] DescribeInternetGateways: { } I0611 09:21:26.017502 55409 routetable.go:53] DescribeRouteTables: { } I0611 09:21:26.017536 55409 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-config:lt-1 ok I0611 09:21:26.017995 55409 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0611 09:21:26.018063 55409 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0611 09:21:26.018088 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-group:nodes.minimal.example.com ok I0611 09:21:26.018091 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0611 09:21:26.018121 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0611 09:21:26.018177 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0611 09:21:26.018094 55409 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.minimal.example.com. ok I0611 09:21:26.018222 55409 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0611 09:21:26.018267 55409 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0611 09:21:26.018205 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0611 09:21:26.018481 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:26.018505 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0611 09:21:26.018543 55409 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0611 09:21:26.018609 55409 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0611 09:21:26.018748 55409 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0611 09:21:26.018763 55409 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0611 09:21:26.018809 55409 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0611 09:21:26.018887 55409 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-2 ok I0611 09:21:26.019000 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0611 09:21:26.019047 55409 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0611 09:21:26.019075 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0611 09:21:26.019040 55409 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0611 09:21:26.019111 55409 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0611 09:21:26.019150 55409 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0611 09:21:26.019201 55409 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0611 09:21:26.019216 55409 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0611 09:21:26.019247 55409 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0611 09:21:26.019321 55409 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0611 09:21:26.019402 55409 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0611 09:21:26.019475 55409 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleManyAddons (4.26s) === RUN TestGetFilters --- PASS: TestGetFilters (0.00s) === RUN TestGetInstanceSelectorOpts --- PASS: TestGetInstanceSelectorOpts (0.00s) === RUN TestValidateAllPrivateOrPublicSubnets --- PASS: TestValidateAllPrivateOrPublicSubnets (0.00s) === RUN TestValidateUserSubnetsWithClusterSubnets --- PASS: TestValidateUserSubnetsWithClusterSubnets (0.00s) === RUN TestCreateInstanceGroup --- PASS: TestCreateInstanceGroup (0.00s) === RUN TestDecorateWithInstanceGroupSpecs --- PASS: TestDecorateWithInstanceGroupSpecs (0.00s) === RUN TestDecorateWithMixedInstancesPolicy --- PASS: TestDecorateWithMixedInstancesPolicy (0.00s) === RUN TestDecorateWithClusterAutoscalerLabels --- PASS: TestDecorateWithClusterAutoscalerLabels (0.00s) === RUN TestNewTemplateContext --- PASS: TestNewTemplateContext (0.00s) PASS ok k8s.io/kops/cmd/kops 211.636s === RUN TestBuildProxyRequest === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/livez === RUN TestBuildProxyRequest/http://127.0.0.1:3990/healthz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ready === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz? === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude --- PASS: TestBuildProxyRequest (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/livez (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/healthz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ready (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz? (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude (0.00s) PASS ok k8s.io/kops/cmd/kube-apiserver-healthcheck 0.006s === RUN TestAliasForNodesInRole --- PASS: TestAliasForNodesInRole (0.00s) === RUN TestEnsureDotSuffix --- PASS: TestEnsureDotSuffix (0.00s) === RUN TestParseZoneSpec --- PASS: TestParseZoneSpec (0.00s) === RUN TestParseZoneRules I0611 09:17:54.406438 55415 zonespec.go:75] No rules specified, will permit management of all zones --- PASS: TestParseZoneRules (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/dns 0.005s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/util 0.004s === RUN TestPodController I0611 09:17:54.435202 55414 pod.go:59] starting pod controller I0611 09:17:54.435505 55414 stoppable.go:62] shutting down controller I0611 09:17:54.435564 55414 pod.go:107] Got stop signal --- PASS: TestPodController (0.00s) PASS I0611 09:17:54.435645 55414 pod.go:65] shutting down pod controller ok k8s.io/kops/dns-controller/pkg/watchers 0.036s === RUN TestEquivalent --- PASS: TestEquivalent (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider 0.005s Parsing flags. Getting new test interface. Running tests... === RUN TestZonesList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000354b0} route53_test.go:93: Got zone list: [0xc0000354e0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c0f0} --- PASS: TestZonesList (0.00s) === RUN TestZonesID route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035610} route53_test.go:93: Got zone list: [0xc000035640] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c108} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess route53_test.go:79: Got zones {0xc000035740} route53_test.go:170: Successfully added managed DNS zone: &{0xc0003ed230 0xc00009c128} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035900} route53_test.go:93: Got zone list: [0xc000035930] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c148} route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035a90} route53_test.go:93: Got zone list: [0xc000035ac0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c170} route53_test.go:187: Successfully added resource record set: {0xc00040a000 0xc00009c190} --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035da0} route53_test.go:93: Got zone list: [0xc000035dd0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c220} route53_test.go:199: Successfully added resource record set: {0xc00040a1b0 0xc00009c240} route53_test.go:118: Got 1 recordsets: [0xc000035f70] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040e180} route53_test.go:93: Got zone list: [0xc00040e1b0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c2e0} route53_test.go:221: Successfully added resource record set: {0xc00040a360 0xc00009c300} route53_test.go:228: Correctly failed to add duplicate resource record {0xc00040a360 0xc00009c300}: attempt to create duplicate rrset www11.example.com::A --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040e570} route53_test.go:93: Got zone list: [0xc00040e5a0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c3c0} route53_test.go:246: Successfully removed resource set {0xc00040a5a0 0xc00009c3e0} after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040e880} route53_test.go:93: Got zone list: [0xc00040e8b0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c470} route53_test.go:264: Successfully removed resource set {0xc00040a750 0xc00009c490} after adding route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040ebc0} route53_test.go:93: Got zone list: [0xc00040ebf0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c528} commontests.go:192: Successfully added resource record set: {0xc00040a900 0xc00009c548} commontests.go:45: Correctly replaced resource record {0xc00040a900 0xc00009c548} -> {0xc00040aa20 0xc00009c598} commontests.go:142: Got 1 recordsets: [0xc00040ef00] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040f130} route53_test.go:93: Got zone list: [0xc00040f160] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c650} commontests.go:192: Successfully added resource record set: {0xc00040acf0 0xc00009c670} commontests.go:70: Correctly replaced resource record {0xc00040acf0 0xc00009c670} -> {0xc00040ae10 0xc00009c6c0} commontests.go:142: Got 1 recordsets: [0xc00040f470] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040f6f0} route53_test.go:93: Got zone list: [0xc00040f720] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c788} commontests.go:192: Successfully added resource record set: {0xc00040b0e0 0xc00009c7a8} commontests.go:142: Got 2 recordsets: [0xc00040f990 0xc00040f9b0] commontests.go:142: Got 2 recordsets: [0xc00040fa20 0xc00040fa40] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040fc40} route53_test.go:93: Got zone list: [0xc00040fc70] route53_test.go:98: Got at least 1 zone in list:&{0xc0003ecff0 0xc00009c8b0} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53 0.016s === RUN TestZonesList --- PASS: TestZonesList (0.00s) === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestRemove --- PASS: TestRemove (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/do 0.007s === RUN TestZonesList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032c120} clouddns_test.go:71: Got zone list: [0xc0005bc1b0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bc180} --- PASS: TestZonesList (0.00s) === RUN TestZonesID clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032c220} clouddns_test.go:71: Got zone list: [0xc0005bc270] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bc240} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess clouddns_test.go:131: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032c320} clouddns_test.go:133: Got zones, making new Zone clouddns_test.go:149: Successfully added managed DNS zone: &{0xc0003329c0 0xc0005bc330} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032c3e0} clouddns_test.go:71: Got zone list: [0xc0005bc3f0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bc3c0} clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032c500} clouddns_test.go:71: Got zone list: [0xc0005bc528] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bc4f8} clouddns_test.go:165: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032c640} clouddns_test.go:71: Got zone list: [0xc0005bc690] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bc660} clouddns_test.go:176: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:96: Got 1 recordsets: [<(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032c7a0} clouddns_test.go:71: Got zone list: [0xc0005bc8a0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bc870} clouddns_test.go:198: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:205: Correctly failed to add duplicate resource record <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>: attempt to insert duplicate rrset {www11.example.com [10.10.10.10 169.20.20.20] 180 A} --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032c900} clouddns_test.go:71: Got zone list: [0xc0005bca38] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bca08} clouddns_test.go:223: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032ca40} clouddns_test.go:71: Got zone list: [0xc0005bcba0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bcb70} clouddns_test.go:241: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032cba0} clouddns_test.go:71: Got zone list: [0xc0005bcd68] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bcd38} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:45: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032cd00} clouddns_test.go:71: Got zone list: [0xc0005bd038] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bd008} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:70: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032ce80} clouddns_test.go:71: Got zone list: [0xc0005bd368] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bd338} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00084e010 0xc00032d060} clouddns_test.go:71: Got zone list: [0xc0005bd740] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000332840 0xc0005bd710} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns 0.058s === RUN TestContract --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/openstack/designate 0.027s === RUN TestZonesListValid --- PASS: TestZonesListValid (0.00s) === RUN TestZonesListShouldFail --- PASS: TestZonesListShouldFail (0.00s) === RUN TestAddValid --- PASS: TestAddValid (0.00s) === RUN TestAddShouldFail --- PASS: TestAddShouldFail (0.00s) === RUN TestRemoveValid --- PASS: TestRemoveValid (0.00s) === RUN TestRemoveShouldFail --- PASS: TestRemoveShouldFail (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/scaleway 0.007s === RUN TestBootstarapBuilder_Simple --- PASS: TestBootstarapBuilder_Simple (0.00s) PASS ok k8s.io/kops/nodeup/pkg/bootstrap 0.092s === RUN TestBuildAzure --- PASS: TestBuildAzure (0.00s) === RUN TestBuildAWSCustomNodeIPFamilies --- PASS: TestBuildAWSCustomNodeIPFamilies (0.00s) === RUN TestContainerdBuilder_Docker_19_03_13 I0611 09:18:00.385165 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.385402 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.385456 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.385531 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.385582 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.385680 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.385747 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.385782 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.385831 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.385890 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.400076 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_13 (0.02s) === RUN TestContainerdBuilder_Docker_19_03_14 I0611 09:18:00.406194 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.406339 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.406381 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.406422 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.406477 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.406527 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.406568 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.406595 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.406631 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.406659 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.408349 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_14 (0.01s) === RUN TestContainerdBuilder_Simple I0611 09:18:00.414073 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.414203 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.414247 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.414294 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.414338 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.414395 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.414438 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.414487 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.414530 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.414562 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.416291 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:00.419029 56241 assetstore.go:108] Matching assets for "^bin/(containerd|ctr)": I0611 09:18:00.419379 56241 assetstore.go:111] bin/containerd I0611 09:18:00.419406 56241 assetstore.go:111] bin/containerd-shim I0611 09:18:00.419418 56241 assetstore.go:111] bin/containerd-shim-runc-v1 I0611 09:18:00.419429 56241 assetstore.go:111] bin/containerd-shim-runc-v2 I0611 09:18:00.419441 56241 assetstore.go:111] bin/containerd-stress I0611 09:18:00.419452 56241 assetstore.go:111] bin/ctr I0611 09:18:00.419568 56241 assetstore.go:108] Matching assets for "/runc\\.(amd64|arm64)$": I0611 09:18:00.419593 56241 assetstore.go:111] https://github.com/opencontainers/runc/releases/download/v1.1.0/runc.amd64 --- PASS: TestContainerdBuilder_Simple (0.01s) === RUN TestContainerdBuilder_Flatcar I0611 09:18:00.424391 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.424543 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.424590 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.424640 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.424684 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.424737 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.424782 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.424816 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.424860 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.424892 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.426556 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:00.429075 56241 containerd.go:60] Detected Flatcar; won't install containerd --- PASS: TestContainerdBuilder_Flatcar (0.01s) === RUN TestContainerdBuilder_SkipInstall I0611 09:18:00.430644 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.430781 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.430821 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.430864 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.430902 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.430949 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.430991 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.431022 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.431063 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.431097 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.432738 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:00.435285 56241 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestContainerdBuilder_SkipInstall (0.00s) === RUN TestContainerdBuilder_BuildFlags --- PASS: TestContainerdBuilder_BuildFlags (0.00s) === RUN TestContainerdConfig --- PASS: TestContainerdConfig (0.00s) === RUN TestAppendGPURuntimeContainerdConfig --- PASS: TestAppendGPURuntimeContainerdConfig (0.00s) === RUN TestDockerBuilder_19_03_11 I0611 09:18:00.436213 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.436320 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.436353 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.436391 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.436430 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.436497 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.436554 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.436588 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.436625 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.436652 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.438250 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:00.440759 56241 assetstore.go:108] Matching assets for "^docker/": I0611 09:18:00.440779 56241 assetstore.go:111] docker/containerd I0611 09:18:00.440788 56241 assetstore.go:111] docker/containerd-shim I0611 09:18:00.440794 56241 assetstore.go:111] docker/ctr I0611 09:18:00.440800 56241 assetstore.go:111] docker/docker I0611 09:18:00.440807 56241 assetstore.go:111] docker/docker-init I0611 09:18:00.440813 56241 assetstore.go:111] docker/docker-proxy I0611 09:18:00.440818 56241 assetstore.go:111] docker/dockerd I0611 09:18:00.440824 56241 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_19_03_11 (0.01s) === RUN TestDockerBuilder_LogFlags I0611 09:18:00.443512 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.443588 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.443615 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.443994 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.444032 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.444072 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.444110 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.444135 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.444166 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.444189 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.445317 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:00.447004 56241 assetstore.go:108] Matching assets for "^docker/": I0611 09:18:00.447023 56241 assetstore.go:111] docker/containerd I0611 09:18:00.447034 56241 assetstore.go:111] docker/containerd-shim I0611 09:18:00.447044 56241 assetstore.go:111] docker/ctr I0611 09:18:00.447051 56241 assetstore.go:111] docker/docker I0611 09:18:00.447057 56241 assetstore.go:111] docker/docker-init I0611 09:18:00.447064 56241 assetstore.go:111] docker/docker-proxy I0611 09:18:00.447070 56241 assetstore.go:111] docker/dockerd I0611 09:18:00.447076 56241 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_LogFlags (0.01s) === RUN TestDockerBuilder_SkipInstall I0611 09:18:00.449881 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.449953 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.449977 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.450002 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.450026 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.450058 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.450080 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.450100 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.450123 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.450139 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.451048 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:00.452620 56241 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestDockerBuilder_SkipInstall (0.00s) === RUN TestDockerBuilder_HealthCheck I0611 09:18:00.452752 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.452819 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.452842 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.452866 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.452893 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.452920 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.452943 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.452961 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.452983 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.453002 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.453962 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:00.455470 56241 assetstore.go:108] Matching assets for "^docker/": I0611 09:18:00.455489 56241 assetstore.go:111] docker/docker I0611 09:18:00.455497 56241 assetstore.go:111] docker/docker-containerd I0611 09:18:00.455504 56241 assetstore.go:111] docker/docker-containerd-ctr I0611 09:18:00.455510 56241 assetstore.go:111] docker/docker-containerd-shim I0611 09:18:00.455516 56241 assetstore.go:111] docker/docker-init I0611 09:18:00.455521 56241 assetstore.go:111] docker/docker-proxy I0611 09:18:00.455527 56241 assetstore.go:111] docker/docker-runc I0611 09:18:00.455533 56241 assetstore.go:111] docker/dockerd --- PASS: TestDockerBuilder_HealthCheck (0.01s) === RUN TestDockerBuilder_BuildFlags --- PASS: TestDockerBuilder_BuildFlags (0.00s) === RUN TestContainerdHooksBuilder I0611 09:18:00.459328 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.459399 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.459422 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.459448 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.459473 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.459499 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.459520 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.459538 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.459559 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.459575 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.461763 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdHooksBuilder (0.01s) === RUN TestDockerHooksBuilder I0611 09:18:00.465722 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.465809 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.465837 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.465870 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.465893 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.465924 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.465948 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.465964 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.465988 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.466006 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.467682 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestDockerHooksBuilder (0.00s) === RUN TestKopsControllerBuilder I0611 09:18:00.469857 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.469921 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.469942 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.469963 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.469984 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.470007 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.470027 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.470042 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.470061 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.470076 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.471552 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKopsControllerBuilder (0.00s) === RUN Test_KubeAPIServer_BuildFlags --- PASS: Test_KubeAPIServer_BuildFlags (0.00s) === RUN TestKubeAPIServerBuilder I0611 09:18:00.476945 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.477024 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.477050 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.477074 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.477096 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.477124 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.477146 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.477164 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.477188 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.477204 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.478795 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilder (0.01s) === RUN TestAuditConfigAPIServerBuilder I0611 09:18:00.487103 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.487176 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.487200 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.487227 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.487250 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.487278 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.487301 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.487317 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.487341 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.487359 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.489300 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestAuditConfigAPIServerBuilder (0.01s) === RUN TestOIDCConfigAPIServerBuilder I0611 09:18:00.496678 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.496853 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.496903 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.496959 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.497016 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.497989 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.498040 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.498060 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.498085 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.498105 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.500246 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestOIDCConfigAPIServerBuilder (0.01s) === RUN TestDeddicatedAPIServerBuilder I0611 09:18:00.506708 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.506793 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.506821 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.506849 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.506873 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.506901 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.506925 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.506942 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.506963 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.506979 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.508509 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestDeddicatedAPIServerBuilder (0.01s) === RUN TestWithoutEtcdEventsAPIServerBuilder I0611 09:18:00.514790 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.514873 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.514901 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.514926 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.514950 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.514977 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.515000 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.515020 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.515045 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.515062 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.516588 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestWithoutEtcdEventsAPIServerBuilder (0.01s) === RUN TestAwsIamAuthenticator I0611 09:18:00.522700 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.522794 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.522822 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.522849 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.522871 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.522900 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.522927 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.522946 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.522968 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.522985 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.524573 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestAwsIamAuthenticator (0.01s) === RUN TestKubeAPIServerBuilderAMD64 I0611 09:18:00.534060 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:00.534156 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:00.534185 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:00.534217 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:00.534241 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:00.534275 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:00.534301 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:00.534319 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:00.534343 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:00.534360 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:00.536040 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderAMD64 (1.93s) === RUN TestKubeAPIServerBuilderARM64 I0611 09:18:02.462607 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:02.462708 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:02.462738 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:02.462772 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:02.462796 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:02.462829 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:02.462855 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:02.462872 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:02.462896 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:02.462912 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:02.464738 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderARM64 (1.23s) === RUN TestKubeControllerManagerBuilder I0611 09:18:03.692520 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:03.692662 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:03.692708 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:03.692755 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:03.692796 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:03.692846 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:03.692887 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:03.692920 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:03.692965 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:03.692996 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:03.696099 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilder (0.02s) === RUN TestKubeControllerManagerBuilderAMD64 I0611 09:18:03.708633 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:03.708775 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:03.708820 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:03.708899 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:03.708945 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:03.708998 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:03.709039 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:03.709069 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:03.709109 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:03.709138 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:03.712278 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderAMD64 (1.22s) === RUN TestKubeControllerManagerBuilderARM64 I0611 09:18:04.925977 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:04.926110 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:04.926156 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:04.926205 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:04.926265 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:04.926325 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:04.926369 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:04.926398 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:04.926440 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:04.926471 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:04.929315 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderARM64 (1.22s) === RUN TestKubeProxyBuilder_buildPod === RUN TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 --- PASS: TestKubeProxyBuilder_buildPod (0.00s) --- PASS: TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 (0.00s) === RUN TestKubeProxyBuilder I0611 09:18:06.143616 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:06.143748 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:06.143788 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:06.143836 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:06.143878 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:06.143926 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:06.143978 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:06.144011 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:06.144056 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:06.144084 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:06.146845 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilder (0.01s) === RUN TestKubeProxyBuilderAMD64 I0611 09:18:06.154097 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:06.154201 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:06.154235 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:06.154269 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:06.154294 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:06.154334 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:06.154363 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:06.154381 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:06.154405 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:06.154423 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:06.156276 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderAMD64 (1.23s) === RUN TestKubeProxyBuilderARM64 I0611 09:18:07.380790 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:07.380906 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:07.380944 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:07.380985 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:07.381020 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:07.381061 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:07.381098 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:07.381140 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:07.381176 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:07.381200 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:07.383400 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderARM64 (1.23s) === RUN TestParseDefault --- PASS: TestParseDefault (0.00s) === RUN TestParse --- PASS: TestParse (0.00s) === RUN TestKubeSchedulerBuilder I0611 09:18:08.606669 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:08.606795 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:08.606833 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:08.606874 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:08.606915 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:08.606963 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:08.606998 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:08.607023 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:08.607059 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:08.607085 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:08.609714 56241 zones.go:93] ListHostedZonesPages { } W0611 09:18:08.613660 56241 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilder (0.01s) === RUN TestKubeSchedulerBuilderAMD64 I0611 09:18:08.616589 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:08.616721 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:08.616760 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:08.616809 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:08.616843 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:08.616887 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:08.616924 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:08.616949 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:08.616984 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:08.617008 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:08.619755 56241 zones.go:93] ListHostedZonesPages { } W0611 09:18:09.833806 56241 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderAMD64 (1.22s) === RUN TestKubeSchedulerBuilderARM64 I0611 09:18:09.835535 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:09.835623 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:09.835652 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:09.835679 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:09.835702 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:09.835736 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:09.835761 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:09.835780 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:09.835802 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:09.835819 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:09.837397 56241 zones.go:93] ListHostedZonesPages { } W0611 09:18:11.055966 56241 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderARM64 (1.22s) === RUN TestKubectlBuilder I0611 09:18:11.057756 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:11.057888 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:11.057926 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:11.057965 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:11.058000 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:11.058045 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:11.058082 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:11.058107 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:11.058143 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:11.058167 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:11.060219 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:11.062011 56241 assetstore.go:159] Resolved asset kubectl: to /path/to/kubectl/asset --- PASS: TestKubectlBuilder (0.01s) === RUN TestTaintsApplied --- PASS: TestTaintsApplied (0.00s) === RUN Test_RunKubeletBuilder I0611 09:18:11.063867 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:11.063938 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:11.063982 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:11.064026 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:11.064058 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:11.064102 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:11.064134 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:11.064165 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:11.064204 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:11.064230 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:11.065403 56241 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilder (0.00s) === RUN Test_RunKubeletBuilderWarmPool I0611 09:18:11.068723 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:11.069107 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:11.069147 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:11.069186 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:11.069224 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:11.069268 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:11.069297 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:11.069326 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:11.069363 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:11.069389 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:11.070513 56241 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilderWarmPool (0.00s) === RUN Test_BuildComponentConfigFile --- PASS: Test_BuildComponentConfigFile (0.00s) === RUN TestProtokubeBuilder I0611 09:18:11.073741 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:11.073824 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:11.073852 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:11.073890 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:11.073924 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:11.073970 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:11.073999 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:11.074029 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:11.074067 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:11.074093 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:11.075565 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:11.077166 56241 assetstore.go:108] Matching assets for "protokube$": I0611 09:18:11.077186 56241 assetstore.go:111] /opt/kops/bin/protokube I0611 09:18:11.077201 56241 assetstore.go:129] Found single matching asset for expr "protokube$": "protokube" I0611 09:18:11.077233 56241 assetstore.go:108] Matching assets for "channels$": I0611 09:18:11.077248 56241 assetstore.go:111] /opt/kops/bin/channels I0611 09:18:11.077261 56241 assetstore.go:129] Found single matching asset for expr "channels$": "channels" --- PASS: TestProtokubeBuilder (0.00s) === RUN TestSecretBuilder I0611 09:18:11.078501 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:11.078585 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:11.078611 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:11.078649 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:11.078687 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:11.078729 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:11.078761 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:11.078791 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:11.078829 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:11.078854 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:11.080263 56241 zones.go:93] ListHostedZonesPages { } --- PASS: TestSecretBuilder (0.00s) === RUN TestUpdateServiceBuilderAutomaticUpgrade I0611 09:18:11.082317 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:11.082398 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:11.082425 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:11.082463 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:11.082501 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:11.082543 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:11.082577 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:11.082606 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:11.082643 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:11.082667 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:11.084033 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:11.085673 56241 update_service.go:91] Detected OS {deb ubuntu focal 20.04}; installing unattended-upgrades package --- PASS: TestUpdateServiceBuilderAutomaticUpgrade (0.00s) === RUN TestUpdateServiceBuilderExternal I0611 09:18:11.086030 56241 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:11.086110 56241 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:11.086136 56241 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:11.086177 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:11.086212 56241 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:11.086255 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:11.086286 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:11.086317 56241 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:11.086355 56241 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:11.086379 56241 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:11.087761 56241 zones.go:93] ListHostedZonesPages { } I0611 09:18:11.089332 56241 update_service.go:86] UpdatePolicy requests automatic updates; skipping installation of package "unattended-upgrades" --- PASS: TestUpdateServiceBuilderExternal (0.00s) PASS ok k8s.io/kops/nodeup/pkg/model 10.778s === RUN TestWarmPoolSpec_IsEnabled === RUN TestWarmPoolSpec_IsEnabled/nil === RUN TestWarmPoolSpec_IsEnabled/empty === RUN TestWarmPoolSpec_IsEnabled/1 === RUN TestWarmPoolSpec_IsEnabled/0 --- PASS: TestWarmPoolSpec_IsEnabled (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/nil (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/empty (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/1 (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/0 (0.00s) === RUN TestWarmPoolSpec_ResolveDefaults === RUN TestWarmPoolSpec_ResolveDefaults/MinSize === RUN TestWarmPoolSpec_ResolveDefaults/MaxSize === RUN TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook --- PASS: TestWarmPoolSpec_ResolveDefaults (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MinSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MaxSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook (0.00s) === RUN Test_ParseInstanceGroupRole --- PASS: Test_ParseInstanceGroupRole (0.00s) === RUN TestParseConfigYAML === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{}" --- PASS: TestParseConfigYAML (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{}" (0.00s) === RUN Test_SemverOrdering --- PASS: Test_SemverOrdering (0.00s) PASS ok k8s.io/kops/pkg/apis/kops 0.036s === RUN TestRoundTripTypes --- PASS: TestRoundTripTypes (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/install 0.024s === RUN TestUseCiliumEtcd --- PASS: TestUseCiliumEtcd (0.00s) === RUN Test_FindSubnet --- PASS: Test_FindSubnet (0.00s) === RUN Test_FindZonesForInstanceGroup --- PASS: Test_FindZonesForInstanceGroup (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/model 0.024s === RUN TestGetNodeRole === RUN TestGetNodeRole/RoleNone === RUN TestGetNodeRole/RoleNewerLabel === RUN TestGetNodeRole/RoleOlderLabel --- PASS: TestGetNodeRole (0.00s) --- PASS: TestGetNodeRole/RoleNone (0.00s) --- PASS: TestGetNodeRole/RoleNewerLabel (0.00s) --- PASS: TestGetNodeRole/RoleOlderLabel (0.00s) === RUN Test_ParseKubernetesVersion === RUN Test_ParseKubernetesVersion/1.3.7 === RUN Test_ParseKubernetesVersion/v1.4.0-beta.8 === RUN Test_ParseKubernetesVersion/1.5.0 === RUN Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ === RUN Test_ParseKubernetesVersion/#00 E0611 09:18:00.324639 56245 versions.go:96] unable to parse Kubernetes version "" === RUN Test_ParseKubernetesVersion/abc E0611 09:18:00.324764 56245 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: Test_ParseKubernetesVersion (0.00s) --- PASS: Test_ParseKubernetesVersion/1.3.7 (0.00s) --- PASS: Test_ParseKubernetesVersion/v1.4.0-beta.8 (0.00s) --- PASS: Test_ParseKubernetesVersion/1.5.0 (0.00s) --- PASS: Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ (0.00s) --- PASS: Test_ParseKubernetesVersion/#00 (0.00s) --- PASS: Test_ParseKubernetesVersion/abc (0.00s) === RUN Test_IsKubernetesGTEWithPatch --- PASS: Test_IsKubernetesGTEWithPatch (0.00s) === RUN Test_IsKubernetesGTEWithoutPatch --- PASS: Test_IsKubernetesGTEWithoutPatch (0.00s) === RUN Test_IsKubernetesGTEWithPre --- PASS: Test_IsKubernetesGTEWithPre (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/util 0.008s === RUN TestAWSValidateExternalCloudConfig --- PASS: TestAWSValidateExternalCloudConfig (0.00s) === RUN TestValidateInstanceGroupSpec I0611 09:18:01.993358 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.993473 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.993517 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.993559 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.993600 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestValidateInstanceGroupSpec (0.00s) === RUN TestMixedInstancePolicies I0611 09:18:01.993875 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.993916 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.993944 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.993973 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.994010 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.994041 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.994078 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.994107 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.994144 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.994176 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.996981 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.997434 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.997491 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.997527 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.997556 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.997615 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.997649 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.997676 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0611 09:18:01.997709 56492 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestMixedInstancePolicies (0.00s) === RUN TestInstanceMetadataOptions I0611 09:18:01.997967 56492 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } I0611 09:18:01.998052 56492 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } --- PASS: TestInstanceMetadataOptions (0.00s) === RUN TestLoadBalancerSubnets --- PASS: TestLoadBalancerSubnets (0.00s) === RUN TestAWSAuthentication --- PASS: TestAWSAuthentication (0.00s) === RUN TestAWSAdditionalRoutes === RUN TestAWSAdditionalRoutes/valid_pcx === RUN TestAWSAdditionalRoutes/valid_instance === RUN TestAWSAdditionalRoutes/valid_nat === RUN TestAWSAdditionalRoutes/valid_transit_gateway === RUN TestAWSAdditionalRoutes/valid_internet_gateway === RUN TestAWSAdditionalRoutes/valid_egress_only_internet_gateway === RUN TestAWSAdditionalRoutes/bad_cluster_cidr === RUN TestAWSAdditionalRoutes/bad_cidr === RUN TestAWSAdditionalRoutes/bad_target === RUN TestAWSAdditionalRoutes/target_more_specific === RUN TestAWSAdditionalRoutes/target_more_specific_additionalCIDR === RUN TestAWSAdditionalRoutes/duplicates_cidr === RUN TestAWSAdditionalRoutes/shared_subnet === RUN TestAWSAdditionalRoutes/not_a_private_subnet --- PASS: TestAWSAdditionalRoutes (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_pcx (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_instance (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_nat (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_transit_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_egress_only_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cluster_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_target (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific_additionalCIDR (0.00s) --- PASS: TestAWSAdditionalRoutes/duplicates_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/shared_subnet (0.00s) --- PASS: TestAWSAdditionalRoutes/not_a_private_subnet (0.00s) === RUN TestValidEtcdChanges --- PASS: TestValidEtcdChanges (0.00s) === RUN TestValidateInstanceProfile --- PASS: TestValidateInstanceProfile (0.00s) === RUN TestValidMasterInstanceGroup --- PASS: TestValidMasterInstanceGroup (0.00s) === RUN TestValidBootDevice --- PASS: TestValidBootDevice (0.00s) === RUN TestValidNodeLabels --- PASS: TestValidNodeLabels (0.00s) === RUN TestValidateIGCloudLabels --- PASS: TestValidateIGCloudLabels (0.00s) === RUN TestIGCloudLabelIsIGName --- PASS: TestIGCloudLabelIsIGName (0.00s) === RUN TestValidTaints --- PASS: TestValidTaints (0.00s) === RUN TestIGUpdatePolicy === RUN TestIGUpdatePolicy/missing === RUN TestIGUpdatePolicy/automatic === RUN TestIGUpdatePolicy/external === RUN TestIGUpdatePolicy/empty === RUN TestIGUpdatePolicy/unknown --- PASS: TestIGUpdatePolicy (0.00s) --- PASS: TestIGUpdatePolicy/missing (0.00s) --- PASS: TestIGUpdatePolicy/automatic (0.00s) --- PASS: TestIGUpdatePolicy/external (0.00s) --- PASS: TestIGUpdatePolicy/empty (0.00s) --- PASS: TestIGUpdatePolicy/unknown (0.00s) === RUN TestValidInstanceGroup --- PASS: TestValidInstanceGroup (0.00s) === RUN Test_Validate_DNS --- PASS: Test_Validate_DNS (0.00s) === RUN TestValidateCIDR --- PASS: TestValidateCIDR (0.00s) === RUN TestValidateSubnets --- PASS: TestValidateSubnets (0.00s) === RUN TestValidateKubeAPIServer --- PASS: TestValidateKubeAPIServer (0.00s) === RUN Test_Validate_DockerConfig_Storage --- PASS: Test_Validate_DockerConfig_Storage (0.00s) === RUN Test_Validate_Networking_Flannel --- PASS: Test_Validate_Networking_Flannel (0.00s) === RUN Test_Validate_AdditionalPolicies --- PASS: Test_Validate_AdditionalPolicies (0.00s) === RUN Test_Validate_Calico === RUN Test_Validate_Calico/empty_specs === RUN Test_Validate_Calico/positive_Typha_replica_count === RUN Test_Validate_Calico/negative_Typha_replica_count === RUN Test_Validate_Calico/with_etcd_version === RUN Test_Validate_Calico/IPv4_autodetection_method === RUN Test_Validate_Calico/IPv6_autodetection_method === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name === RUN Test_Validate_Calico/AWS_source/destination_checks_off === RUN Test_Validate_Calico/AWS_source/destination_checks_enabled === RUN Test_Validate_Calico/AWS_source/destination_checks_disabled === RUN Test_Validate_Calico/AWS_source/destination_checks_left_as_is === RUN Test_Validate_Calico/encapsulation_none_with_IPv4 === RUN Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 === RUN Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 === RUN Test_Validate_Calico/unknown_Calico_IPIP_mode === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPv6_without_encapsulation --- PASS: Test_Validate_Calico (0.00s) --- PASS: Test_Validate_Calico/empty_specs (0.00s) --- PASS: Test_Validate_Calico/positive_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/negative_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/with_etcd_version (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_off (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_enabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_disabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_left_as_is (0.00s) --- PASS: Test_Validate_Calico/encapsulation_none_with_IPv4 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/unknown_Calico_IPIP_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPv6_without_encapsulation (0.00s) === RUN Test_Validate_Cilium --- PASS: Test_Validate_Cilium (0.00s) === RUN Test_Validate_RollingUpdate --- PASS: Test_Validate_RollingUpdate (0.00s) === RUN Test_Validate_NodeLocalDNS --- PASS: Test_Validate_NodeLocalDNS (0.00s) === RUN Test_Validate_CloudConfiguration === RUN Test_Validate_CloudConfiguration/neither === RUN Test_Validate_CloudConfiguration/all_false === RUN Test_Validate_CloudConfiguration/all_true === RUN Test_Validate_CloudConfiguration/os_false === RUN Test_Validate_CloudConfiguration/os_true === RUN Test_Validate_CloudConfiguration/all_false,_os_false === RUN Test_Validate_CloudConfiguration/all_false,_os_true === RUN Test_Validate_CloudConfiguration/all_true,_os_false === RUN Test_Validate_CloudConfiguration/all_true,_os_true --- PASS: Test_Validate_CloudConfiguration (0.00s) --- PASS: Test_Validate_CloudConfiguration/neither (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_true (0.00s) === RUN TestValidateSAExternalPermissions === RUN TestValidateSAExternalPermissions/Duplicate_SA === RUN TestValidateSAExternalPermissions/Missing_permissions === RUN TestValidateSAExternalPermissions/Setting_both_arn_and_inline === RUN TestValidateSAExternalPermissions/Empty_SA_name === RUN TestValidateSAExternalPermissions/Empty_SA_namespace --- PASS: TestValidateSAExternalPermissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Duplicate_SA (0.00s) --- PASS: TestValidateSAExternalPermissions/Missing_permissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Setting_both_arn_and_inline (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_name (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_namespace (0.00s) === RUN Test_Validate_Nvidia_Cluster --- PASS: Test_Validate_Nvidia_Cluster (0.00s) === RUN Test_Validate_Nvidia_Ig --- PASS: Test_Validate_Nvidia_Ig (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/validation 0.110s === RUN TestManagedFieldsMigrator === RUN TestManagedFieldsMigrator/csa-migration === RUN TestManagedFieldsMigrator/merge-owners === RUN TestManagedFieldsMigrator/ssa-unchanged === RUN TestManagedFieldsMigrator/unknown-unchanged --- PASS: TestManagedFieldsMigrator (0.00s) --- PASS: TestManagedFieldsMigrator/csa-migration (0.00s) --- PASS: TestManagedFieldsMigrator/merge-owners (0.00s) --- PASS: TestManagedFieldsMigrator/ssa-unchanged (0.00s) --- PASS: TestManagedFieldsMigrator/unknown-unchanged (0.00s) PASS ok k8s.io/kops/pkg/applylib/applyset 0.014s === RUN TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub W0611 09:18:01.948157 56494 builder.go:232] failed to digest image "proxy.example.com/weaveworks/weave-kube": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub (0.01s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub W0611 09:18:01.949248 56494 builder.go:232] failed to digest image "proxy.example.com/debian": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL W0611 09:18:01.954836 56494 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL (0.01s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL W0611 09:18:01.956067 56494 builder.go:232] failed to digest image "proxy.example.com/google_containers/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags W0611 09:18:01.958223 56494 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags (0.00s) === RUN TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges W0611 09:18:01.959726 56494 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host W0611 09:18:01.961320 56494 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges (0.00s) === RUN TestRemapEmptySection --- PASS: TestRemapEmptySection (0.00s) === RUN Test_BuildVFSPath E0611 09:18:01.962367 56494 copyfile.go:209] Unable to determine VFS path from supplied URL: https://foo/k8s-for-greeks-kops/kubernetes-release/release/v1.7.2/bin/linux/amd64/kubectl E0611 09:18:01.962382 56494 copyfile.go:210] S3, Google Cloud Storage, and File Paths are supported. E0611 09:18:01.962393 56494 copyfile.go:211] For S3, please make sure that the supplied file repository URL adhere to S3 naming conventions, https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region. E0611 09:18:01.962403 56494 copyfile.go:212] For GCS, please make sure that the supplied file repository URL adheres to https://storage.googleapis.com/ --- PASS: Test_BuildVFSPath (0.00s) PASS ok k8s.io/kops/pkg/assets 0.064s === RUN TestBackoff --- PASS: TestBackoff (0.00s) PASS ok k8s.io/kops/pkg/backoff 0.005s === RUN TestSSHCredentialStoreOnConfigBase --- PASS: TestSSHCredentialStoreOnConfigBase (0.00s) === RUN TestSSHCredentialStoreOnOwnCFS --- PASS: TestSSHCredentialStoreOnOwnCFS (0.00s) PASS ok k8s.io/kops/pkg/client/simple/vfsclientset 0.075s === RUN TestToAzureVMName === RUN TestToAzureVMName/test_case_0 === RUN TestToAzureVMName/test_case_1 --- PASS: TestToAzureVMName (0.00s) --- PASS: TestToAzureVMName/test_case_0 (0.00s) --- PASS: TestToAzureVMName/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/cloudinstances 0.027s === RUN TestSetClusterBadInput --- PASS: TestSetClusterBadInput (0.00s) === RUN TestSetClusterFields --- PASS: TestSetClusterFields (0.00s) === RUN TestSetCiliumFields --- PASS: TestSetCiliumFields (0.00s) === RUN TestSetInstanceGroupsBadInput --- PASS: TestSetInstanceGroupsBadInput (0.00s) === RUN TestSetInstanceGroupsFields --- PASS: TestSetInstanceGroupsFields (0.00s) === RUN TestUnsetClusterBadInput --- PASS: TestUnsetClusterBadInput (0.00s) === RUN TestUnsetClusterFields --- PASS: TestUnsetClusterFields (0.01s) === RUN TestUnsetCiliumFields --- PASS: TestUnsetCiliumFields (0.00s) === RUN TestUnsetInstanceGroupsBadInput --- PASS: TestUnsetInstanceGroupsBadInput (0.00s) === RUN TestUnsetInstanceGroupsFields --- PASS: TestUnsetInstanceGroupsFields (0.00s) PASS ok k8s.io/kops/pkg/commands 0.136s === RUN Test_cacheFilePath --- PASS: Test_cacheFilePath (0.00s) PASS ok k8s.io/kops/pkg/commands/helpers 0.098s === RUN TestGetStructVal --- PASS: TestGetStructVal (0.00s) === RUN TestWrongStructField --- PASS: TestWrongStructField (0.00s) PASS ok k8s.io/kops/pkg/configbuilder 0.029s === RUN Test_Diff_1 --- PASS: Test_Diff_1 (0.00s) === RUN Test_Diff_2 --- PASS: Test_Diff_2 (0.00s) === RUN Test_Diff_3 --- PASS: Test_Diff_3 (0.00s) === RUN Test_Diff_ChangedLine --- PASS: Test_Diff_ChangedLine (0.00s) === RUN Test_Diff_4 --- PASS: Test_Diff_4 (0.00s) PASS ok k8s.io/kops/pkg/diff 0.004s === RUN TestIsGossipHostname --- PASS: TestIsGossipHostname (0.00s) PASS ok k8s.io/kops/pkg/dns 0.004s === RUN TestHasExtraFields === RUN TestHasExtraFields/minimal === RUN TestHasExtraFields/extraFields === RUN TestHasExtraFields/spec2 === RUN TestHasExtraFields/isolateMasters === RUN TestHasExtraFields/instanceGroup --- PASS: TestHasExtraFields (0.01s) --- PASS: TestHasExtraFields/minimal (0.01s) --- PASS: TestHasExtraFields/extraFields (0.00s) --- PASS: TestHasExtraFields/spec2 (0.00s) --- PASS: TestHasExtraFields/isolateMasters (0.00s) --- PASS: TestHasExtraFields/instanceGroup (0.00s) PASS ok k8s.io/kops/pkg/edit 0.042s === RUN TestFlagToFalse I0611 09:18:09.463230 57679 featureflag_test.go:32] Created flag Unittest1 I0611 09:18:09.463285 57679 featureflag.go:164] FeatureFlag "UnitTest1"=false I0611 09:18:09.463295 57679 featureflag.go:164] FeatureFlag "UnitTest1"=true --- PASS: TestFlagToFalse (0.00s) === RUN TestSetenv I0611 09:18:09.463422 57679 featureflag.go:164] FeatureFlag "UnitTest2"=false --- PASS: TestSetenv (0.00s) === RUN TestGetPositive --- PASS: TestGetPositive (0.00s) === RUN TestGetNegative --- PASS: TestGetNegative (0.00s) PASS ok k8s.io/kops/pkg/featureflag 0.004s === RUN TestBuildKCMFlags --- PASS: TestBuildKCMFlags (0.00s) === RUN TestKubeletConfigSpec --- PASS: TestKubeletConfigSpec (0.00s) === RUN TestBuildAPIServerFlags --- PASS: TestBuildAPIServerFlags (0.00s) PASS ok k8s.io/kops/pkg/flagbuilder 0.041s === RUN TestRenderInstanceGroupZones W0611 09:18:09.484072 57681 instancegroup.go:42] error fetching zones for instancegroup: cannot find subnet "badsubnet" (declared in instance group "", not found in cluster) --- PASS: TestRenderInstanceGroupZones (0.00s) === RUN TestRenderInstanceGroupSubnets --- PASS: TestRenderInstanceGroupSubnets (0.00s) PASS ok k8s.io/kops/pkg/formatter 0.026s === RUN TestWarmPoolOnlyRoll I0611 09:18:22.183305 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.183374 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.183394 58189 instancegroups.go:136] deleting warm pool instance "node-1" --- PASS: TestWarmPoolOnlyRoll (0.00s) === RUN TestRollingUpdateDisabledSurgeOS rollingupdate_os_test.go:96: Failing in new release PR when build is not yet published --- SKIP: TestRollingUpdateDisabledSurgeOS (0.00s) === RUN TestRollingUpdateAllNeedUpdate I0611 09:18:22.183800 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.183823 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.184956 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.184978 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.190203 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.190256 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.190275 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.190289 58189 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0611 09:18:22.192415 58189 instancegroups.go:431] Draining the node: "master-1a.local". I0611 09:18:22.193061 58189 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0611 09:18:22.193160 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:22.193195 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.194313 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.194337 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.199530 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.199580 58189 instancegroups.go:431] Draining the node: "master-1b.local". I0611 09:18:22.200533 58189 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0611 09:18:22.200596 58189 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0611 09:18:22.200647 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.201764 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.201786 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.206971 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.207004 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.207019 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.207030 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.207880 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.208499 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.208525 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.209641 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.209658 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.214844 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.214895 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.215646 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.215673 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.216786 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.216807 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.222002 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.222063 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:22.222895 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.222922 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.224044 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.224070 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.229275 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.229308 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.229325 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.229363 58189 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0611 09:18:22.230281 58189 instancegroups.go:431] Draining the node: "node-2a.local". I0611 09:18:22.230974 58189 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0611 09:18:22.231023 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.232147 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.232170 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.237354 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.237402 58189 instancegroups.go:431] Draining the node: "node-2b.local". I0611 09:18:22.238047 58189 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0611 09:18:22.238081 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.239194 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.239216 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.244372 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.244422 58189 instancegroups.go:431] Draining the node: "node-2c.local". I0611 09:18:22.244960 58189 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0611 09:18:22.244982 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.246109 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.246133 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.251337 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.251391 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdate (0.07s) === RUN TestRollingUpdateAllNeedUpdateCloudonly I0611 09:18:22.251805 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.251831 58189 instancegroups.go:469] waiting for 1ms after terminating instance W0611 09:18:22.252957 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.252993 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.253020 58189 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0611 09:18:22.253031 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:22.253054 58189 instancegroups.go:469] waiting for 1ms after terminating instance W0611 09:18:22.254154 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.254177 58189 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0611 09:18:22.254184 58189 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0611 09:18:22.254196 58189 instancegroups.go:469] waiting for 1ms after terminating instance W0611 09:18:22.255294 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.255315 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.255343 58189 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0611 09:18:22.255355 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.255374 58189 instancegroups.go:469] waiting for 1ms after terminating instance W0611 09:18:22.256482 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.256512 58189 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0611 09:18:22.256522 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.256539 58189 instancegroups.go:469] waiting for 1ms after terminating instance W0611 09:18:22.257652 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.257687 58189 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0611 09:18:22.257698 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.257716 58189 instancegroups.go:469] waiting for 1ms after terminating instance W0611 09:18:22.258833 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.258854 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.258924 58189 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0611 09:18:22.258941 58189 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0611 09:18:22.258965 58189 instancegroups.go:469] waiting for 1ms after terminating instance W0611 09:18:22.260126 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.260159 58189 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0611 09:18:22.260169 58189 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0611 09:18:22.260186 58189 instancegroups.go:469] waiting for 1ms after terminating instance W0611 09:18:22.261307 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0611 09:18:22.261344 58189 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0611 09:18:22.261368 58189 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0611 09:18:22.261397 58189 instancegroups.go:469] waiting for 1ms after terminating instance W0611 09:18:22.262543 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0611 09:18:22.262578 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateCloudonly (0.01s) === RUN TestRollingUpdateAllNeedUpdateNoFailOnValidate I0611 09:18:22.262846 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.262869 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.264002 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.264043 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.264073 58189 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.264136 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.264168 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.264195 58189 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.264213 58189 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0611 09:18:22.265098 58189 instancegroups.go:431] Draining the node: "master-1a.local". I0611 09:18:22.265785 58189 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0611 09:18:22.265875 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:22.265903 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.267036 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.267062 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.267081 58189 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.267113 58189 instancegroups.go:431] Draining the node: "master-1b.local". I0611 09:18:22.267808 58189 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0611 09:18:22.267855 58189 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0611 09:18:22.267881 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.269022 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.269080 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.269101 58189 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.269120 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.269135 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.269146 58189 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.269158 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.269916 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.270503 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.270529 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.271652 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.271690 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.271717 58189 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.271762 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.272725 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.272763 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.273911 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.273946 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.273973 58189 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.274021 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:22.275007 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.275046 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.276186 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.276214 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.276236 58189 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.276255 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.276275 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.276297 58189 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.276313 58189 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0611 09:18:22.277256 58189 instancegroups.go:431] Draining the node: "node-2a.local". I0611 09:18:22.278048 58189 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0611 09:18:22.278080 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.279209 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.279238 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.279260 58189 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.279295 58189 instancegroups.go:431] Draining the node: "node-2b.local". I0611 09:18:22.280074 58189 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0611 09:18:22.280101 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.281224 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.281251 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.281270 58189 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.281299 58189 instancegroups.go:431] Draining the node: "node-2c.local". I0611 09:18:22.281987 58189 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0611 09:18:22.282018 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.283145 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.283176 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0611 09:18:22.283198 58189 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0611 09:18:22.283223 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateNoFailOnValidate (0.02s) === RUN TestRollingUpdateNoneNeedUpdate I0611 09:18:22.283534 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdate (0.00s) === RUN TestRollingUpdateNoneNeedUpdateWithForce I0611 09:18:22.283819 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.283849 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.284978 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.285005 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.290220 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.290302 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.290337 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.290354 58189 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0611 09:18:22.291205 58189 instancegroups.go:431] Draining the node: "master-1a.local". I0611 09:18:22.291968 58189 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0611 09:18:22.292043 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:22.292075 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.293231 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.293265 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.298488 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.298561 58189 instancegroups.go:431] Draining the node: "master-1b.local". I0611 09:18:22.299451 58189 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0611 09:18:22.299523 58189 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0611 09:18:22.299554 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.300694 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.300727 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.306639 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.306748 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.306776 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.306792 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.307903 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.308719 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.308761 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.309935 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.309957 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.315161 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.315216 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.315804 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.315829 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.316962 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.316983 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.322163 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.322215 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:22.322941 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.322972 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.324103 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.324129 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.329320 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.329358 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.329377 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.329393 58189 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0611 09:18:22.330433 58189 instancegroups.go:431] Draining the node: "node-2a.local". I0611 09:18:22.331061 58189 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0611 09:18:22.331095 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.332246 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.332266 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.338540 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.338611 58189 instancegroups.go:431] Draining the node: "node-2b.local". I0611 09:18:22.339566 58189 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0611 09:18:22.339603 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.340760 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.340794 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.346030 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.346103 58189 instancegroups.go:431] Draining the node: "node-2c.local". I0611 09:18:22.347067 58189 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0611 09:18:22.347103 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.348241 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.348272 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.353478 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.353520 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdateWithForce (0.07s) === RUN TestRollingUpdateEmptyGroup I0611 09:18:22.353653 58189 rollingupdate.go:111] Cloud Instance Group length is zero. Not doing a rolling-update. --- PASS: TestRollingUpdateEmptyGroup (0.00s) === RUN TestRollingUpdateUnknownRole --- PASS: TestRollingUpdateUnknownRole (0.00s) === RUN TestRollingUpdateAllNeedUpdateFailsValidation I0611 09:18:22.353942 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.353962 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.355095 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.355131 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0611 09:18:22.355155 58189 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateFailsValidation (0.00s) === RUN TestRollingUpdateAllNeedUpdateErrorsValidation I0611 09:18:22.355494 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.355523 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.356656 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.356681 58189 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0611 09:18:22.356701 58189 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateFailsValidation I0611 09:18:22.356923 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.356946 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0611 09:18:22.356962 58189 instancegroups.go:509] Cluster did not validate within 0s E0611 09:18:22.356976 58189 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateFailsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateErrorsValidation I0611 09:18:22.357127 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.357147 58189 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0611 09:18:22.357163 58189 instancegroups.go:509] Cluster did not validate within 0s E0611 09:18:22.357179 58189 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateClusterFailsValidationAfterOneMaster I0611 09:18:22.357384 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.357409 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.358540 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.358565 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.363781 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.363851 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.363873 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.363889 58189 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0611 09:18:22.364745 58189 instancegroups.go:431] Draining the node: "master-1a.local". I0611 09:18:22.365377 58189 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0611 09:18:22.365443 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:22.365471 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.366635 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.366665 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0611 09:18:22.366680 58189 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterFailsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneMaster I0611 09:18:22.366912 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.366931 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.368065 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.368098 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.373292 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.373352 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.373371 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.373381 58189 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0611 09:18:22.373888 58189 instancegroups.go:431] Draining the node: "master-1a.local". I0611 09:18:22.374301 58189 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0611 09:18:22.374384 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:22.374406 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.375528 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.375559 58189 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0611 09:18:22.375588 58189 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateNonRelatedInstanceGroupFailure I0611 09:18:22.375909 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.375931 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.375945 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.376895 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.377617 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.377647 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.378786 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.378806 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.383994 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.384040 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.384968 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.385006 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.386140 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.386168 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.391377 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.391438 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:22.392299 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.392332 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.393462 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.393488 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.398721 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.398759 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNonRelatedInstanceGroupFailure (0.02s) === RUN TestRollingUpdateRelatedInstanceGroupFailure I0611 09:18:22.399023 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.399044 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0611 09:18:22.399058 58189 instancegroups.go:509] Cluster did not validate within 0s E0611 09:18:22.399068 58189 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateRelatedInstanceGroupFailure (0.00s) === RUN TestRollingUpdateMasterGroupFailure I0611 09:18:22.399269 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.399286 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0611 09:18:22.399296 58189 instancegroups.go:509] Cluster did not validate within 0s E0611 09:18:22.399305 58189 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateMasterGroupFailure (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupNil I0611 09:18:22.399453 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.399471 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0611 09:18:22.399482 58189 instancegroups.go:509] Cluster did not validate within 0s E0611 09:18:22.399490 58189 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupNil (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupExitableError I0611 09:18:22.399652 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.399667 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.399675 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.400319 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.400767 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.400790 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.401905 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.401927 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.410647 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.410719 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.411627 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.411663 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.412882 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.412914 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.418165 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.418247 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:22.419218 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.419255 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.420430 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.420468 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.425710 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.425778 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.425807 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0611 09:18:22.425834 58189 instancegroups.go:509] Cluster did not validate within 0s E0611 09:18:22.425851 58189 rollingupdate.go:218] failed to roll InstanceGroup "node-2": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupExitableError (0.03s) === RUN TestRollingUpdateClusterFailsValidationAfterOneNode I0611 09:18:22.426136 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.426168 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.426181 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.426967 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.427455 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.427479 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.428610 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.428654 58189 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0611 09:18:22.428673 58189 instancegroups.go:509] Cluster did not validate within 0s E0611 09:18:22.428685 58189 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterFailsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneNode I0611 09:18:22.428865 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.428881 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.428889 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.429488 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.429905 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.429927 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.431052 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.431083 58189 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0611 09:18:22.431101 58189 instancegroups.go:509] Cluster did not validate within 0s E0611 09:18:22.431126 58189 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateFlappingValidation I0611 09:18:22.431353 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.431372 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.432531 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.432577 58189 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0611 09:18:22.433742 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.438928 58189 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0611 09:18:22.440117 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.445427 58189 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0611 09:18:22.446618 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.451881 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.451981 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.452017 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.452037 58189 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0611 09:18:22.453007 58189 instancegroups.go:431] Draining the node: "master-1a.local". I0611 09:18:22.453857 58189 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0611 09:18:22.453946 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:22.453983 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.455148 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.455205 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.460482 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.460567 58189 instancegroups.go:431] Draining the node: "master-1b.local". I0611 09:18:22.463575 58189 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0611 09:18:22.463669 58189 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0611 09:18:22.463699 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.464862 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.464930 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.470476 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.470530 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.470557 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.470571 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.471603 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.472374 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.472408 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.473549 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.473597 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.479391 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.479468 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.480272 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.480302 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.481448 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.481501 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.486726 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.486803 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:22.487703 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.487738 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.488877 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.488915 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.494130 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.494167 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.494194 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.494212 58189 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0611 09:18:22.495262 58189 instancegroups.go:431] Draining the node: "node-2a.local". I0611 09:18:22.496038 58189 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0611 09:18:22.496073 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.499401 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.499499 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.504727 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.504799 58189 instancegroups.go:431] Draining the node: "node-2b.local". I0611 09:18:22.505452 58189 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0611 09:18:22.505477 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.506606 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.506645 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.511890 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.511964 58189 instancegroups.go:431] Draining the node: "node-2c.local". I0611 09:18:22.512928 58189 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0611 09:18:22.512964 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.514122 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.514155 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.519368 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.519413 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateFlappingValidation (0.09s) === RUN TestRollingUpdateValidatesAfterBastion I0611 09:18:22.519800 58189 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0611 09:18:22.519832 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.520997 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.521047 58189 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0611 09:18:22.524540 58189 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0611 09:18:22.525709 58189 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0611 09:18:22.526978 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.532203 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.532299 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.532318 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.532329 58189 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0611 09:18:22.532938 58189 instancegroups.go:431] Draining the node: "master-1a.local". I0611 09:18:22.533367 58189 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0611 09:18:22.533423 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:22.533447 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.534573 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.534610 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.539814 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.539877 58189 instancegroups.go:431] Draining the node: "master-1b.local". I0611 09:18:22.540757 58189 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0611 09:18:22.540827 58189 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0611 09:18:22.540861 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.541992 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.542015 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.547211 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.547272 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.547293 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.547312 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.548365 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.549150 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.549185 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.550308 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.550329 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.555521 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.555571 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.556450 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.556481 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.557593 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.557613 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.562802 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.562848 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:22.563659 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.563691 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.564811 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.564835 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.570035 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.570069 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.570091 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.570112 58189 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0611 09:18:22.571342 58189 instancegroups.go:431] Draining the node: "node-2a.local". I0611 09:18:22.572113 58189 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0611 09:18:22.572147 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.573264 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.573284 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.578493 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.578553 58189 instancegroups.go:431] Draining the node: "node-2b.local". I0611 09:18:22.579399 58189 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0611 09:18:22.579432 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.580571 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.580594 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.585778 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.585830 58189 instancegroups.go:431] Draining the node: "node-2c.local". I0611 09:18:22.586446 58189 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0611 09:18:22.586472 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.587624 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.587644 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.592827 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.592864 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateValidatesAfterBastion (0.07s) === RUN TestAddAnnotatedNodesToNeedsUpdate --- PASS: TestAddAnnotatedNodesToNeedsUpdate (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateCloudonly --- PASS: TestAddAnnotatedNodesToNeedsUpdateCloudonly (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateNodesMissing --- PASS: TestAddAnnotatedNodesToNeedsUpdateNodesMissing (0.00s) === RUN TestRollingUpdateTaintAllButOneNeedUpdate I0611 09:18:22.593355 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.593371 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.593379 58189 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0611 09:18:22.593886 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.594389 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.594413 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.595543 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.595562 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.600753 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.600803 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.601417 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.601443 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.602566 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.602588 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.607794 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.607826 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateTaintAllButOneNeedUpdate (0.01s) === RUN TestRollingUpdateMaxSurgeIgnoredForMaster I0611 09:18:22.608095 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.608112 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.608121 58189 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0611 09:18:22.608567 58189 instancegroups.go:431] Draining the node: "master-1a.local". I0611 09:18:22.609083 58189 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0611 09:18:22.609147 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:22.609169 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.610279 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.610298 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.615485 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.615549 58189 instancegroups.go:431] Draining the node: "master-1b.local". I0611 09:18:22.616133 58189 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0611 09:18:22.616202 58189 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0611 09:18:22.616233 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.617356 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.617380 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.622612 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.622663 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeIgnoredForMaster (0.01s) === RUN TestRollingUpdateDisabled I0611 09:18:22.623075 58189 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled W0611 09:18:22.623119 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0611 09:18:22.623142 58189 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled W0611 09:18:22.623156 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0611 09:18:22.623172 58189 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled W0611 09:18:22.623187 58189 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0611 09:18:22.623201 58189 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0611 09:18:22.623216 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabled (0.00s) === RUN TestRollingUpdateDisabledSurge I0611 09:18:22.623465 58189 instancegroups.go:607] Detaching instance "bastion-1a", in group "bastion-1". I0611 09:18:22.623510 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:22.624658 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.624684 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.629882 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.629920 58189 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled I0611 09:18:22.629968 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.629983 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.629994 58189 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0611 09:18:22.630527 58189 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled I0611 09:18:22.630543 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.630554 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.630561 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:22.631060 58189 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0611 09:18:22.631101 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:22.632255 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.632286 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.637427 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.637496 58189 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled I0611 09:18:22.637523 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.637545 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.637560 58189 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0611 09:18:22.638581 58189 instancegroups.go:605] Detaching instance "node-2c", node "node-2c.local", in group "node-2". I0611 09:18:22.638645 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:22.639795 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.639814 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:22.645025 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.645064 58189 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0611 09:18:22.645086 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabledSurge (0.02s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdate I0611 09:18:22.645422 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.645454 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.645470 58189 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0611 09:18:22.647443 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.648223 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.648271 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.649437 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.649468 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.649493 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:22.649564 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.650196 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.650472 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.650517 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.651676 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.651766 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.752145 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.752213 58189 instancegroups.go:431] Draining the node: "node-1e.local". I0611 09:18:22.752233 58189 instancegroups.go:431] Draining the node: "node-1d.local". I0611 09:18:22.753234 58189 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0611 09:18:22.753464 58189 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0611 09:18:22.753503 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.754661 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.754691 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.754714 58189 instancegroups.go:431] Draining the node: "node-1f.local". I0611 09:18:22.755179 58189 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0611 09:18:22.755205 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.756321 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.756367 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.856787 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.856854 58189 instancegroups.go:431] Draining the node: "node-1g.local". I0611 09:18:22.857498 58189 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0611 09:18:22.857534 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.858691 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.858721 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.858737 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllButOneNeedUpdate I0611 09:18:22.858911 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.858931 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.858939 58189 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0611 09:18:22.859971 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:22.860022 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:22.860713 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:22.860913 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:22.860947 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.862075 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.862121 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.962525 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.962607 58189 instancegroups.go:431] Draining the node: "node-1d.local". I0611 09:18:22.962633 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:22.963786 58189 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0611 09:18:22.964039 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:22.964082 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.965212 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.965239 58189 instancegroups.go:540] Cluster validated. I0611 09:18:22.965259 58189 instancegroups.go:431] Draining the node: "node-1e.local". I0611 09:18:22.965731 58189 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0611 09:18:22.965757 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:22.966891 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:22.966948 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.067362 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.067430 58189 instancegroups.go:431] Draining the node: "node-1f.local". I0611 09:18:23.068124 58189 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0611 09:18:23.068162 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.069323 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.069359 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.069379 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdateMaster I0611 09:18:23.069608 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.069634 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.069646 58189 instancegroups.go:342] Tainting 7 nodes in "master-1" instancegroup. I0611 09:18:23.071466 58189 instancegroups.go:431] Draining the node: "master-1a.local". I0611 09:18:23.072072 58189 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0611 09:18:23.072124 58189 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0611 09:18:23.072157 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.073278 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.073305 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.073326 58189 instancegroups.go:431] Draining the node: "master-1c.local". I0611 09:18:23.073359 58189 instancegroups.go:431] Draining the node: "master-1b.local". I0611 09:18:23.074104 58189 instancegroups.go:691] skipping deregistration of instance "master-1c", as part of instancegroup with role "ControlPlane" I0611 09:18:23.074150 58189 instancegroups.go:628] Stopping instance "master-1c", node "master-1c.local", in group "master-1" (this may take a while). I0611 09:18:23.074290 58189 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0611 09:18:23.074329 58189 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0611 09:18:23.074352 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.075474 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.075525 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.175931 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.176002 58189 instancegroups.go:431] Draining the node: "master-1e.local". I0611 09:18:23.176029 58189 instancegroups.go:431] Draining the node: "master-1d.local". I0611 09:18:23.177045 58189 instancegroups.go:691] skipping deregistration of instance "master-1e", as part of instancegroup with role "ControlPlane" I0611 09:18:23.177122 58189 instancegroups.go:628] Stopping instance "master-1e", node "master-1e.local", in group "master-1" (this may take a while). I0611 09:18:23.177323 58189 instancegroups.go:691] skipping deregistration of instance "master-1d", as part of instancegroup with role "ControlPlane" I0611 09:18:23.177376 58189 instancegroups.go:628] Stopping instance "master-1d", node "master-1d.local", in group "master-1" (this may take a while). I0611 09:18:23.177412 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.178553 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.178589 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.178625 58189 instancegroups.go:431] Draining the node: "master-1f.local". I0611 09:18:23.179390 58189 instancegroups.go:691] skipping deregistration of instance "master-1f", as part of instancegroup with role "ControlPlane" I0611 09:18:23.179447 58189 instancegroups.go:628] Stopping instance "master-1f", node "master-1f.local", in group "master-1" (this may take a while). I0611 09:18:23.179482 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.180606 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.180650 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.281083 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.281204 58189 instancegroups.go:431] Draining the node: "master-1g.local". I0611 09:18:23.282122 58189 instancegroups.go:691] skipping deregistration of instance "master-1g", as part of instancegroup with role "ControlPlane" I0611 09:18:23.282209 58189 instancegroups.go:628] Stopping instance "master-1g", node "master-1g.local", in group "master-1" (this may take a while). I0611 09:18:23.282253 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.283424 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.283466 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.283495 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdateMaster (0.21s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdate I0611 09:18:23.283783 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.283815 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.283830 58189 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0611 09:18:23.285696 58189 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0611 09:18:23.285774 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:23.286899 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.286941 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.286958 58189 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0611 09:18:23.287010 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:23.291237 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.291312 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.291375 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:23.292308 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:23.292384 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:23.293134 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:23.293183 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.294347 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.294465 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.394851 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.394929 58189 instancegroups.go:431] Draining the node: "node-1d.local". I0611 09:18:23.394974 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:23.395570 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:23.395920 58189 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0611 09:18:23.395949 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.397098 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.397126 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.397147 58189 instancegroups.go:431] Draining the node: "node-1e.local". I0611 09:18:23.397624 58189 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0611 09:18:23.397654 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.398794 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.398830 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.499280 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.499366 58189 instancegroups.go:431] Draining the node: "node-1f.local". I0611 09:18:23.500279 58189 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0611 09:18:23.500332 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.501490 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.501537 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.501562 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdate (0.22s) === RUN TestRollingUpdateMaxSurgeAllButOneNeedUpdate I0611 09:18:23.501820 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.501848 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.501860 58189 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0611 09:18:23.503550 58189 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0611 09:18:23.503606 58189 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0611 09:18:23.503653 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:23.505013 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.505060 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.505104 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:23.505948 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:23.505998 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:23.506699 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:23.506738 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.507847 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.507909 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.608349 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.608418 58189 instancegroups.go:431] Draining the node: "node-1d.local". I0611 09:18:23.608459 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:23.609068 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:23.609433 58189 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0611 09:18:23.609462 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.610616 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.610644 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.610665 58189 instancegroups.go:431] Draining the node: "node-1e.local". I0611 09:18:23.611178 58189 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0611 09:18:23.611209 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.612351 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.612387 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.713072 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.713137 58189 instancegroups.go:431] Draining the node: "node-1f.local". I0611 09:18:23.713750 58189 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0611 09:18:23.713791 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.714904 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.714933 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.714946 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeGreaterThanNeedUpdate I0611 09:18:23.715119 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.715134 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.715142 58189 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0611 09:18:23.715544 58189 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0611 09:18:23.715564 58189 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". I0611 09:18:23.715583 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:23.716727 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.716752 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:23.721955 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.722009 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:23.722037 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:23.722976 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:23.723005 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.723230 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:23.723260 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.724164 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.724185 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:23.729430 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.729479 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeGreaterThanNeedUpdate (0.01s) === RUN TestRollingUpdateDetachFails I0611 09:18:23.729780 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.729806 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.729822 58189 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0611 09:18:23.730544 58189 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". E0611 09:18:23.730598 58189 instancegroups.go:191] Failed to detach instance "node-1b": error detaching instance "node-1b", node "node-1b.local": error detaching instance "node-1b": testing error I0611 09:18:23.730616 58189 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". E0611 09:18:23.730644 58189 instancegroups.go:191] Failed to detach instance "node-1a": error detaching instance "node-1a", node "node-1a.local": error detaching instance "node-1a": testing error I0611 09:18:23.730673 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:23.731827 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.731851 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:23.737089 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.737162 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:23.737216 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:23.738209 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:23.738238 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.738269 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:23.738282 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.739392 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.739413 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:23.744614 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.744652 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDetachFails (0.02s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached I0611 09:18:23.744880 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.744903 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.744912 58189 instancegroups.go:342] Tainting 4 nodes in "node-1" instancegroup. I0611 09:18:23.745697 58189 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0611 09:18:23.745737 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:23.746887 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.746918 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.746927 58189 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0611 09:18:23.746957 58189 instancegroups.go:203] waiting for 1ms after detaching instance I0611 09:18:23.748097 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.748123 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.748153 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:23.748200 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:23.748253 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:23.748729 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:23.748762 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.749103 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:23.749127 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.749444 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:23.749469 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.749912 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.850664 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.850738 58189 instancegroups.go:431] Draining the node: "node-1d.local". I0611 09:18:23.851750 58189 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0611 09:18:23.851802 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.852964 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.852992 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.853008 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached (0.11s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached I0611 09:18:23.853188 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.853208 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.853219 58189 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0611 09:18:23.856192 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:23.857003 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:23.857048 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.858176 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.858210 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.858242 58189 instancegroups.go:431] Draining the node: "node-1e.local". I0611 09:18:23.858291 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:23.859207 58189 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0611 09:18:23.859446 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:23.859482 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.860597 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.860641 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.961432 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.961494 58189 instancegroups.go:431] Draining the node: "node-1g.local". I0611 09:18:23.961550 58189 instancegroups.go:431] Draining the node: "node-1f.local". I0611 09:18:23.962497 58189 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0611 09:18:23.962774 58189 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0611 09:18:23.962828 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.965620 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.965661 58189 instancegroups.go:540] Cluster validated. I0611 09:18:23.965689 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:23.966256 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:23.966286 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:23.967830 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:23.967914 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:24.068531 58189 instancegroups.go:540] Cluster validated. I0611 09:18:24.068585 58189 instancegroups.go:431] Draining the node: "node-1d.local". I0611 09:18:24.069669 58189 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0611 09:18:24.069726 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:24.070916 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:24.070954 58189 instancegroups.go:540] Cluster validated. I0611 09:18:24.070989 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached (0.22s) === RUN TestRollingUpdateOnlyWarmPoolNodes I0611 09:18:24.071306 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:24.071343 58189 instancegroups.go:540] Cluster validated. I0611 09:18:24.071373 58189 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0611 09:18:24.071396 58189 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0611 09:18:24.071415 58189 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0611 09:18:24.071443 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateOnlyWarmPoolNodes (0.00s) === RUN TestRollingWarmPoolBeforeJoinedNodes I0611 09:18:24.071621 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:24.071658 58189 instancegroups.go:540] Cluster validated. I0611 09:18:24.071688 58189 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0611 09:18:24.072642 58189 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0611 09:18:24.072677 58189 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0611 09:18:24.072707 58189 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0611 09:18:24.072746 58189 instancegroups.go:431] Draining the node: "node-1a.local". I0611 09:18:24.073244 58189 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0611 09:18:24.073274 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:24.075160 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:24.075180 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:24.080477 58189 instancegroups.go:540] Cluster validated. I0611 09:18:24.080506 58189 instancegroups.go:431] Draining the node: "node-1b.local". I0611 09:18:24.080964 58189 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0611 09:18:24.080984 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:24.082106 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:24.082128 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:24.087326 58189 instancegroups.go:540] Cluster validated. I0611 09:18:24.087353 58189 instancegroups.go:431] Draining the node: "node-1c.local". I0611 09:18:24.087827 58189 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0611 09:18:24.087848 58189 instancegroups.go:469] waiting for 1ms after terminating instance I0611 09:18:24.088970 58189 instancegroups.go:504] Validating the cluster. I0611 09:18:24.088992 58189 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0611 09:18:24.094178 58189 instancegroups.go:540] Cluster validated. I0611 09:18:24.094200 58189 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingWarmPoolBeforeJoinedNodes (0.02s) === RUN TestSettings === RUN TestSettings/DrainAndTerminate === RUN TestSettings/MaxUnavailable === RUN TestSettings/MaxSurge --- PASS: TestSettings (0.00s) --- PASS: TestSettings/DrainAndTerminate (0.00s) --- PASS: TestSettings/MaxUnavailable (0.00s) --- PASS: TestSettings/MaxSurge (0.00s) === RUN TestMaxUnavailable === RUN TestMaxUnavailable/0_1 === RUN TestMaxUnavailable/0%_1 === RUN TestMaxUnavailable/39%_10 === RUN TestMaxUnavailable/100%_10 --- PASS: TestMaxUnavailable (0.00s) --- PASS: TestMaxUnavailable/0_1 (0.00s) --- PASS: TestMaxUnavailable/0%_1 (0.00s) --- PASS: TestMaxUnavailable/39%_10 (0.00s) --- PASS: TestMaxUnavailable/100%_10 (0.00s) === RUN TestMaxSurge === RUN TestMaxSurge/0_1 === RUN TestMaxSurge/0%_1 === RUN TestMaxSurge/31%_10 === RUN TestMaxSurge/100%_10 --- PASS: TestMaxSurge (0.00s) --- PASS: TestMaxSurge/0_1 (0.00s) --- PASS: TestMaxSurge/0%_1 (0.00s) --- PASS: TestMaxSurge/31%_10 (0.00s) --- PASS: TestMaxSurge/100%_10 (0.00s) === RUN TestAWSDefault --- PASS: TestAWSDefault (0.00s) PASS ok k8s.io/kops/pkg/instancegroups 1.992s === RUN TestWriteToken === RUN TestWriteToken/WriteJson === RUN TestWriteToken/WriteJsonWithIndent --- PASS: TestWriteToken (0.00s) --- PASS: TestWriteToken/WriteJson (0.00s) --- PASS: TestWriteToken/WriteJsonWithIndent (0.00s) PASS ok k8s.io/kops/pkg/jsonutils 0.006s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.00s) PASS ok k8s.io/kops/pkg/k8scodecs 0.012s === RUN TestParse E0611 09:18:22.119478 58192 versions.go:96] unable to parse Kubernetes version "" E0611 09:18:22.119591 58192 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: TestParse (0.00s) === RUN TestIsGTE === RUN TestIsGTE/KV_greater_than_Version === RUN TestIsGTE/KV_greater_than_Version#01 === RUN TestIsGTE/KV_equal_Version === RUN TestIsGTE/KV_equal_Version#01 === RUN TestIsGTE/Version_greater_than_KV === RUN TestIsGTE/Version_greater_than_KV#01 --- PASS: TestIsGTE (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version#01 (0.00s) --- PASS: TestIsGTE/KV_equal_Version (0.00s) --- PASS: TestIsGTE/KV_equal_Version#01 (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV#01 (0.00s) PASS ok k8s.io/kops/pkg/k8sversion 0.010s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.01s) === RUN TestToVersionedJSON --- PASS: TestToVersionedJSON (0.00s) === RUN TestRewriteAPIGroup --- PASS: TestRewriteAPIGroup (0.00s) PASS ok k8s.io/kops/pkg/kopscodecs 0.040s === RUN TestBuildKubecfg === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster === RUN TestBuildKubecfg/Public_DNS_with_kops_auth_plugin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option --- PASS: TestBuildKubecfg (0.21s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin (0.05s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port (0.03s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate (0.03s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster (0.00s) --- PASS: TestBuildKubecfg/Public_DNS_with_kops_auth_plugin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin (0.03s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option (0.00s) PASS ok k8s.io/kops/pkg/kubeconfig 0.294s === RUN Test_ProxyFunc --- PASS: Test_ProxyFunc (0.00s) === RUN TestBootstrapUserData --- PASS: TestBootstrapUserData (0.01s) === RUN TestValidateAWSVolumeAllow50ratio --- PASS: TestValidateAWSVolumeAllow50ratio (0.00s) PASS ok k8s.io/kops/pkg/model 0.090s === RUN TestRootVolumeOptimizationFlag --- PASS: TestRootVolumeOptimizationFlag (0.00s) === RUN TestAPIServerAdditionalSecurityGroupsWithNLB === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Node --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Node (0.00s) === RUN TestJoinSuffixes --- PASS: TestJoinSuffixes (0.00s) === RUN TestIAMServiceEC2 --- PASS: TestIAMServiceEC2 (0.00s) === RUN Test_formatAWSIAMStatement === RUN Test_formatAWSIAMStatement/namespace_and_name_without_wildcard === RUN Test_formatAWSIAMStatement/name_contains_wildcard === RUN Test_formatAWSIAMStatement/namespace_contains_wildcard --- PASS: Test_formatAWSIAMStatement (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_and_name_without_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/name_contains_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_contains_wildcard (0.00s) PASS ok k8s.io/kops/pkg/model/awsmodel 0.083s === RUN TestAPILoadBalancerModelBuilder_Build --- PASS: TestAPILoadBalancerModelBuilder_Build (0.00s) === RUN TestSubnetForLoadbalancer --- PASS: TestSubnetForLoadbalancer (0.00s) === RUN TestCloudTagsForInstanceGroup --- PASS: TestCloudTagsForInstanceGroup (0.00s) === RUN TestNetworkModelBuilder_Build --- PASS: TestNetworkModelBuilder_Build (0.00s) === RUN TestResourceGroupModelBuilder_Build --- PASS: TestResourceGroupModelBuilder_Build (0.00s) === RUN TestVMScaleSetModelBuilder_Build --- PASS: TestVMScaleSetModelBuilder_Build (0.00s) === RUN TestGetCapacity === RUN TestGetCapacity/test_case_0 === RUN TestGetCapacity/test_case_1 === RUN TestGetCapacity/test_case_2 === RUN TestGetCapacity/test_case_3 --- PASS: TestGetCapacity (0.00s) --- PASS: TestGetCapacity/test_case_0 (0.00s) --- PASS: TestGetCapacity/test_case_1 (0.00s) --- PASS: TestGetCapacity/test_case_2 (0.00s) --- PASS: TestGetCapacity/test_case_3 (0.00s) === RUN TestGetStorageProfile === RUN TestGetStorageProfile/test_case_0 === RUN TestGetStorageProfile/test_case_1 --- PASS: TestGetStorageProfile (0.00s) --- PASS: TestGetStorageProfile/test_case_0 (0.00s) --- PASS: TestGetStorageProfile/test_case_1 (0.00s) === RUN TestParseImage === RUN TestParseImage/test_case_0 === RUN TestParseImage/test_case_1 === RUN TestParseImage/test_case_2 === RUN TestParseImage/test_case_3 --- PASS: TestParseImage (0.00s) --- PASS: TestParseImage/test_case_0 (0.00s) --- PASS: TestParseImage/test_case_1 (0.00s) --- PASS: TestParseImage/test_case_2 (0.00s) --- PASS: TestParseImage/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/model/azuremodel 0.085s === RUN TestCloudConfigurationOptionsBuilder === RUN TestCloudConfigurationOptionsBuilder/neither === RUN TestCloudConfigurationOptionsBuilder/all_false === RUN TestCloudConfigurationOptionsBuilder/all_true === RUN TestCloudConfigurationOptionsBuilder/os_false === RUN TestCloudConfigurationOptionsBuilder/os_true === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_true === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_true --- PASS: TestCloudConfigurationOptionsBuilder (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/neither (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_true (0.00s) === RUN Test_Build_Containerd_Supported_Version --- PASS: Test_Build_Containerd_Supported_Version (0.00s) === RUN Test_Build_Containerd_Unneeded_Runtime --- PASS: Test_Build_Containerd_Unneeded_Runtime (0.00s) === RUN Test_Build_Containerd_Needed_Runtime --- PASS: Test_Build_Containerd_Needed_Runtime (0.00s) === RUN TestImage I0611 09:18:22.169848 58198 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestImage (0.00s) === RUN Test_Build_KCM_Builder --- PASS: Test_Build_KCM_Builder (0.00s) === RUN Test_Build_KCM_Builder_Change_Duration --- PASS: Test_Build_KCM_Builder_Change_Duration (0.00s) === RUN Test_Build_KCM_Builder_CIDR_Mask_Size === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: (0.00s) === RUN TestFeatureGatesKubernetesVersion --- PASS: TestFeatureGatesKubernetesVersion (0.00s) === RUN TestFeatureGatesOverride --- PASS: TestFeatureGatesOverride (0.00s) === RUN Test_Build_Scheduler_Without_PolicyConfigMap --- PASS: Test_Build_Scheduler_Without_PolicyConfigMap (0.00s) === RUN Test_Build_Scheduler_PolicyConfigMap_Supported_Version --- PASS: Test_Build_Scheduler_PolicyConfigMap_Supported_Version (0.00s) PASS ok k8s.io/kops/pkg/model/components 0.062s === RUN Test_RunEtcdManagerBuilder I0611 09:18:22.187377 58199 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunEtcdManagerBuilder/basedir=tests/minimal === RUN Test_RunEtcdManagerBuilder/basedir=tests/interval === RUN Test_RunEtcdManagerBuilder/basedir=tests/proxy === RUN Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings W0611 09:18:22.237034 58199 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 W0611 09:18:22.239417 58199 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 --- PASS: Test_RunEtcdManagerBuilder (0.06s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/minimal (0.02s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/interval (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/proxy (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings (0.01s) PASS ok k8s.io/kops/pkg/model/components/etcdmanager 0.140s === RUN Test_RunKubeApiserverBuilder I0611 09:18:22.182797 58200 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunKubeApiserverBuilder/basedir=tests/minimal --- PASS: Test_RunKubeApiserverBuilder (0.01s) --- PASS: Test_RunKubeApiserverBuilder/basedir=tests/minimal (0.01s) PASS ok k8s.io/kops/pkg/model/components/kubeapiserver 0.086s === RUN Test_RunKubeSchedulerBuilder === RUN Test_RunKubeSchedulerBuilder/basedir=tests/minimal === RUN Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig === RUN Test_RunKubeSchedulerBuilder/basedir=tests/mixing --- PASS: Test_RunKubeSchedulerBuilder (0.02s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/minimal (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig (0.00s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/mixing (0.00s) PASS ok k8s.io/kops/pkg/model/components/kubescheduler 0.099s === RUN TestDefaultInstanceGroupVolumeSize --- PASS: TestDefaultInstanceGroupVolumeSize (0.00s) PASS ok k8s.io/kops/pkg/model/defaults 0.027s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) === RUN TestPolicyGeneration --- PASS: TestPolicyGeneration (0.00s) === RUN TestEmptyPolicy --- PASS: TestEmptyPolicy (0.00s) PASS ok k8s.io/kops/pkg/model/iam 0.062s === RUN TestServerGroupBuilder I0611 09:18:29.943583 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:29.959063 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:29.967265 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:29.985022 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:29.998688 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.030903 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.103708 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.125694 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.143377 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.157055 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.167263 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.180403 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.188123 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.195288 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.206159 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.271459 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.278657 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:30.287130 59131 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestServerGroupBuilder (0.35s) PASS ok k8s.io/kops/pkg/model/openstackmodel 0.425s === RUN Test_NodeUpTabs --- PASS: Test_NodeUpTabs (0.00s) PASS ok k8s.io/kops/pkg/model/resources 0.031s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetVMSSNameFromProviderID === RUN TestGetVMSSNameFromProviderID/test_case_0 === RUN TestGetVMSSNameFromProviderID/test_case_1 === RUN TestGetVMSSNameFromProviderID/test_case_2 --- PASS: TestGetVMSSNameFromProviderID (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_0 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_1 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_2 (0.00s) === RUN TestIdentifyNode === RUN TestIdentifyNode/test_case_0 === RUN TestIdentifyNode/test_case_1 --- PASS: TestIdentifyNode (0.00s) --- PASS: TestIdentifyNode/test_case_0 (0.00s) --- PASS: TestIdentifyNode/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/nodeidentity/azure 0.033s === RUN TestBuildNodeLabels === RUN TestBuildNodeLabels/RoleControlPlane === RUN TestBuildNodeLabels/RoleNode --- PASS: TestBuildNodeLabels (0.00s) --- PASS: TestBuildNodeLabels/RoleControlPlane (0.00s) --- PASS: TestBuildNodeLabels/RoleNode (0.00s) PASS ok k8s.io/kops/pkg/nodelabels 0.026s === RUN TestGenerateCertificate === RUN TestGenerateCertificate/selfsigned === RUN TestGenerateCertificate/client === RUN TestGenerateCertificate/server --- PASS: TestGenerateCertificate (0.01s) --- PASS: TestGenerateCertificate/selfsigned (0.00s) --- PASS: TestGenerateCertificate/client (0.00s) --- PASS: TestGenerateCertificate/server (0.00s) === RUN TestCertificateRoundTrip --- PASS: TestCertificateRoundTrip (0.00s) === RUN TestIssueCert === RUN TestIssueCert/ca === RUN TestIssueCert/client === RUN TestIssueCert/clientOneYear === RUN TestIssueCert/#00 === RUN TestIssueCert/server --- PASS: TestIssueCert (1.31s) --- PASS: TestIssueCert/ca (0.54s) --- PASS: TestIssueCert/client (0.19s) --- PASS: TestIssueCert/clientOneYear (0.57s) --- PASS: TestIssueCert/#00 (0.00s) --- PASS: TestIssueCert/server (0.00s) === RUN TestPrivateKeyRoundTripRSA === RUN TestPrivateKeyRoundTripRSA/rsa === RUN TestPrivateKeyRoundTripRSA/ecdsa --- PASS: TestPrivateKeyRoundTripRSA (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/rsa (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/ecdsa (0.00s) === RUN Test_AWSFingerprint_RsaKey1 --- PASS: Test_AWSFingerprint_RsaKey1 (0.00s) === RUN Test_AWSFingerprint_RsaKeyEncrypted --- PASS: Test_AWSFingerprint_RsaKeyEncrypted (0.00s) === RUN Test_AWSFingerprint_Ed25519Key --- PASS: Test_AWSFingerprint_Ed25519Key (0.00s) === RUN Test_AWSFingerprint_TrickyWhitespace --- PASS: Test_AWSFingerprint_TrickyWhitespace (0.00s) === RUN Test_AWSFingerprint_DsaKey --- PASS: Test_AWSFingerprint_DsaKey (0.00s) === RUN Test_OpenSSHFingerprint_RsaKey1 --- PASS: Test_OpenSSHFingerprint_RsaKey1 (0.00s) PASS ok k8s.io/kops/pkg/pki 1.328s === RUN TestLongDesc --- PASS: TestLongDesc (0.00s) PASS ok k8s.io/kops/pkg/pretty 0.012s === RUN TestAddUntaggedRouteTables I0611 09:18:29.944651 59137 routetable.go:53] DescribeRouteTables: { } I0611 09:18:29.944877 59137 aws.go:230] Skipping route table in VPC, but with wrong cluster tag ("other.example.com") W0611 09:18:29.944909 59137 tags.go:67] cluster tag not found on route-table:rtb-1234 --- PASS: TestAddUntaggedRouteTables (0.00s) === RUN TestListIAMInstanceProfiles I0611 09:18:29.945104 59137 iaminstanceprofile.go:193] ListInstanceProfiles: { } W0611 09:18:29.945214 59137 aws.go:2076] could not find instance profile "__no_entity__.me.example.com". Resource may already have been deleted: NoSuchEntity: No such entity --- PASS: TestListIAMInstanceProfiles (0.00s) === RUN TestListIAMRoles I0611 09:18:29.945333 59137 iamrole.go:89] ListRoles: { } --- PASS: TestListIAMRoles (0.00s) === RUN TestListRouteTables I0611 09:18:29.945527 59137 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["me.example.com"] }] } I0611 09:18:29.945653 59137 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/me.example.com"] }] } --- PASS: TestListRouteTables (0.00s) === RUN TestSharedVolume I0611 09:18:29.945844 59137 volumes.go:33] CreateVolume: { TagSpecifications: [{ ResourceType: "volume", Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "shared" }] }] } I0611 09:18:29.946008 59137 volumes.go:33] CreateVolume: { TagSpecifications: [{ Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "owned" }] }] } I0611 09:18:29.946104 59137 volumes.go:128] DescribeVolumes: { } W0611 09:18:29.946176 59137 aws.go:2229] (new) cluster tag not found on volume:vol-2 aws_test.go:334: 2 --- PASS: TestSharedVolume (0.00s) === RUN TestMatchesElbTags --- PASS: TestMatchesElbTags (0.00s) === RUN TestListVPCs I0611 09:18:29.946501 59137 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:29.946658 59137 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:29.946721 59137 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:29.946843 59137 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:29.946926 59137 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:29.947049 59137 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:29.947118 59137 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:29.947202 59137 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:29.947266 59137 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:29.947344 59137 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:29.947405 59137 tags.go:42] CreateTags { Resources: ["vpc-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "legacy.example.com" }] } I0611 09:18:29.947477 59137 tags.go:42] CreateTags { Resources: ["vpc-shared"], Tags: [{ Key: "kubernetes.io/cluster/shared.example.com", Value: "shared" }] } I0611 09:18:29.947544 59137 tags.go:42] CreateTags { Resources: ["vpc-shared-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "shared-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/shared-with-legacy.example.com", Value: "shared" }] } I0611 09:18:29.947624 59137 tags.go:42] CreateTags { Resources: ["vpc-owned"], Tags: [{ Key: "kubernetes.io/cluster/owned.example.com", Value: "owned" }] } I0611 09:18:29.947696 59137 tags.go:42] CreateTags { Resources: ["vpc-owned-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "owned-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/owned-with-legacy.example.com", Value: "owned" }] } I0611 09:18:29.947774 59137 tags.go:42] CreateTags { Resources: ["vpc-other"], Tags: [{ Key: "KubernetesCluster", Value: "other.example.com" },{ Key: "kubernetes.io/cluster/other.example.com", Value: "shared" }] } I0611 09:18:29.947875 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["mismatch.example.com"] }] } I0611 09:18:29.947947 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/mismatch.example.com"] }] } I0611 09:18:29.948012 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["legacy.example.com"] }] } I0611 09:18:29.948082 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/legacy.example.com"] }] } I0611 09:18:29.948160 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared-with-legacy.example.com"] }] } I0611 09:18:29.948223 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared-with-legacy.example.com"] }] } I0611 09:18:29.948293 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared.example.com"] }] } I0611 09:18:29.948350 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared.example.com"] }] } I0611 09:18:29.948397 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned-with-legacy.example.com"] }] } I0611 09:18:29.948429 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned-with-legacy.example.com"] }] } I0611 09:18:29.948465 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned.example.com"] }] } I0611 09:18:29.948492 59137 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned.example.com"] }] } --- PASS: TestListVPCs (0.00s) PASS ok k8s.io/kops/pkg/resources/aws 0.076s === RUN TestListResourcesAzure --- PASS: TestListResourcesAzure (0.00s) === RUN TestIsOwnedByCluster === RUN TestIsOwnedByCluster/test_case_0 === RUN TestIsOwnedByCluster/test_case_1 === RUN TestIsOwnedByCluster/test_case_2 === RUN TestIsOwnedByCluster/test_case_3 --- PASS: TestIsOwnedByCluster (0.00s) --- PASS: TestIsOwnedByCluster/test_case_0 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_1 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_2 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/resources/azure 0.026s === RUN TestNameMatch --- PASS: TestNameMatch (0.00s) === RUN TestMatchesClusterNameWithUUID --- PASS: TestMatchesClusterNameWithUUID (0.00s) PASS ok k8s.io/kops/pkg/resources/gce 0.060s === RUN TestEscapeCommand --- PASS: TestEscapeCommand (0.00s) === RUN TestRawManifest --- PASS: TestRawManifest (0.00s) === RUN TestRawMixedManifest --- PASS: TestRawMixedManifest (0.00s) === RUN TestKeyPairOnlyManifest --- PASS: TestKeyPairOnlyManifest (0.00s) === RUN TestUnitFileExtensionValid === RUN TestUnitFileExtensionValid/valid_extension:_.automount === RUN TestUnitFileExtensionValid/valid_extension:_.device === RUN TestUnitFileExtensionValid/valid_extension:_.mount === RUN TestUnitFileExtensionValid/valid_extension:_.path === RUN TestUnitFileExtensionValid/valid_extension:_.scope === RUN TestUnitFileExtensionValid/valid_extension:_.service === RUN TestUnitFileExtensionValid/valid_extension:_.slice === RUN TestUnitFileExtensionValid/valid_extension:_.socket === RUN TestUnitFileExtensionValid/valid_extension:_.swap === RUN TestUnitFileExtensionValid/valid_extension:_.target === RUN TestUnitFileExtensionValid/valid_extension:_.timer === RUN TestUnitFileExtensionValid/invalid_extension:_(no_extension) === RUN TestUnitFileExtensionValid/invalid_extension:_.not-valid --- PASS: TestUnitFileExtensionValid (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.automount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.device (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.mount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.path (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.scope (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.service (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.slice (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.socket (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.swap (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.target (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.timer (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_(no_extension) (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_.not-valid (0.00s) PASS ok k8s.io/kops/pkg/systemd 0.011s === RUN TestTruncateString === RUN TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false --- PASS: TestTruncateString (0.00s) --- PASS: TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false (0.00s) PASS ok k8s.io/kops/pkg/truncate 0.005s === RUN TestJoin --- PASS: TestJoin (0.00s) PASS ok k8s.io/kops/pkg/urls 0.004s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) PASS ok k8s.io/kops/pkg/util/stringorslice 0.004s === RUN Test_Overlap --- PASS: Test_Overlap (0.00s) === RUN Test_BelongsTo --- PASS: Test_BelongsTo (0.00s) === RUN Test_SplitInto8 --- PASS: Test_SplitInto8 (0.00s) PASS ok k8s.io/kops/pkg/util/subnet 0.005s === RUN TestRenderGeneralOK --- PASS: TestRenderGeneralOK (0.01s) === RUN TestRenderMissingValue --- PASS: TestRenderMissingValue (0.00s) === RUN TestRenderIndent --- PASS: TestRenderIndent (0.00s) === RUN TestRenderChannelFunctions --- PASS: TestRenderChannelFunctions (0.00s) === RUN TestRenderSnippet --- PASS: TestRenderSnippet (0.00s) === RUN TestRenderContext --- PASS: TestRenderContext (0.00s) === RUN TestAllowForMissingVars --- PASS: TestAllowForMissingVars (0.00s) === RUN TestRenderIntegration --- PASS: TestRenderIntegration (0.00s) PASS ok k8s.io/kops/pkg/util/templater 0.045s === RUN Test_ValidateCloudGroupMissing --- PASS: Test_ValidateCloudGroupMissing (0.00s) === RUN Test_ValidateNodesNotEnough --- PASS: Test_ValidateNodesNotEnough (0.00s) === RUN Test_ValidateDetachedNodesDontCount --- PASS: Test_ValidateDetachedNodesDontCount (0.00s) === RUN Test_ValidateNodeNotReady --- PASS: Test_ValidateNodeNotReady (0.00s) === RUN Test_ValidateMastersNotEnough --- PASS: Test_ValidateMastersNotEnough (0.00s) === RUN Test_ValidateMasterNotReady --- PASS: Test_ValidateMasterNotReady (0.00s) === RUN Test_ValidateMasterStaticPods --- PASS: Test_ValidateMasterStaticPods (0.00s) === RUN Test_ValidateNoPodFailures --- PASS: Test_ValidateNoPodFailures (0.00s) === RUN Test_ValidatePodFailure === RUN Test_ValidatePodFailure/pending-node-kube-system === RUN Test_ValidatePodFailure/pending-node-kube-system#01 === RUN Test_ValidatePodFailure/pending-node-kube-system#02 === RUN Test_ValidatePodFailure/pending-node-otherNamespace === RUN Test_ValidatePodFailure/pending-node-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-node-otherNamespace#02 === RUN Test_ValidatePodFailure/pending-cluster-kube-system === RUN Test_ValidatePodFailure/pending-cluster-kube-system#01 === RUN Test_ValidatePodFailure/pending-cluster-kube-system#02 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-node-kube-system === RUN Test_ValidatePodFailure/notready-node-kube-system#01 === RUN Test_ValidatePodFailure/notready-node-kube-system#02 === RUN Test_ValidatePodFailure/notready-node-otherNamespace === RUN Test_ValidatePodFailure/notready-node-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-node-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-cluster-kube-system === RUN Test_ValidatePodFailure/notready-cluster-kube-system#01 === RUN Test_ValidatePodFailure/notready-cluster-kube-system#02 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-node-kube-system === RUN Test_ValidatePodFailure/unknown-node-kube-system#01 === RUN Test_ValidatePodFailure/unknown-node-kube-system#02 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#01 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#02 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 --- PASS: Test_ValidatePodFailure (0.01s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 (0.00s) === RUN Test_ValidateBastionNodes === RUN Test_ValidateBastionNodes/instancegroup's_nodes_not_ready === RUN Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready --- PASS: Test_ValidateBastionNodes (0.00s) --- PASS: Test_ValidateBastionNodes/instancegroup's_nodes_not_ready (0.00s) --- PASS: Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready (0.00s) === RUN Test_ValidateDetachedNodesNotValidated --- PASS: Test_ValidateDetachedNodesNotValidated (0.00s) PASS ok k8s.io/kops/pkg/validation 0.091s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetInternalIP --- PASS: TestGetInternalIP (0.00s) === RUN TestGetSeeds --- PASS: TestGetSeeds (0.00s) PASS ok k8s.io/kops/protokube/pkg/gossip/azure 0.005s === RUN TestRemovesDuplicateGuardedBlocks W0611 09:18:37.464225 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.464273 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.464282 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.464290 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.464298 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.464307 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.464314 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.464322 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.464329 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.464337 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.464344 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.464352 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.464359 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.464367 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.464375 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.464383 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.472704 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.472746 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.472852 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.472871 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.472958 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.472976 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.473070 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.473089 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.473176 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.473192 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.473310 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.473327 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.473423 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.473441 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.473586 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.473604 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.473688 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.473703 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.473800 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.473817 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.473930 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.473946 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.474031 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.474047 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.474134 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.474151 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.474234 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.474250 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.474335 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.474351 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.474464 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.474484 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.474574 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.474591 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.474681 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.474698 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.474792 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.474808 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.475076 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.475095 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.475188 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.475207 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.475292 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.475307 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.475387 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.475402 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.475485 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.475503 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.475597 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.475613 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.475692 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.475708 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.475790 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.475806 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.475889 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.475906 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476016 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.476033 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476118 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.476134 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476220 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.476239 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476334 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.476350 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476436 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.476452 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476536 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.476552 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476643 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.476659 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476743 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.476758 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476872 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.476888 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.476992 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.477009 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.477095 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.477111 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.477198 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.477214 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.477354 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.477371 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.477460 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.477475 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.477571 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.477597 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.477684 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.477698 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.477803 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.477823 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.477904 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.477931 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478016 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478032 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478118 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478133 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478213 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478228 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478307 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478333 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478415 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478430 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478514 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478530 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478623 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478639 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478723 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478745 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478832 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478845 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.478930 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.478944 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479030 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479043 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479129 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479142 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479222 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479234 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479319 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479332 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479412 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479425 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479506 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479518 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479643 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479657 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479744 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479757 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479839 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479852 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.479931 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.479944 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480026 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480039 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480122 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480135 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480216 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480230 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480311 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480333 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480419 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480432 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480513 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480526 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480608 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480621 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480706 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480718 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480798 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480814 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480898 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.480910 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.480989 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.481002 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.481081 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.481094 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.481316 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.481368 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.482119 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.482144 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.482234 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.482256 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.482347 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.482363 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.482450 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.482472 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.482619 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.482637 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.482731 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.482751 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.482835 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.482850 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.482931 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.482946 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483030 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483052 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483134 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483150 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483239 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483258 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483348 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483362 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483441 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483455 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483537 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483552 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483637 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483653 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483743 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483758 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483839 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483854 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.483933 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.483947 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.484025 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484040 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.484125 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484141 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRemovesDuplicateGuardedBlocks (0.02s) === RUN TestRecoversFromBadNesting W0611 09:18:37.484645 60426 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0611 09:18:37.484661 60426 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0611 09:18:37.484674 60426 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0611 09:18:37.484685 60426 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0611 09:18:37.484695 60426 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0611 09:18:37.484703 60426 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0611 09:18:37.484709 60426 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0611 09:18:37.484744 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484758 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484768 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.484779 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484789 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.484799 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484808 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.484818 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484828 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.484838 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484848 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484858 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484867 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484877 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.484886 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.484895 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.501302 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.501334 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.501415 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.501427 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.501499 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.501514 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.501590 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.501604 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.501844 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.501859 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.501928 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.501942 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502013 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502026 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502092 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502107 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502179 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502193 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502266 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502280 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502353 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502369 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502445 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502459 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502540 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502558 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502647 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502662 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502735 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502748 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502838 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502851 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.502922 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.502936 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503010 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503022 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503101 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503114 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503198 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503212 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503285 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503298 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503371 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503384 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503454 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503467 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503541 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503554 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503626 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503647 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503730 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503745 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503817 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503830 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.503901 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.503916 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504020 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504034 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504105 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504118 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504193 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504208 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504286 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504300 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504376 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504390 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504476 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504491 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504567 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504581 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504657 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504671 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504758 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504772 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504848 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504862 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.504936 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.504949 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505019 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505032 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505102 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505115 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505196 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505210 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505281 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505294 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505366 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505380 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505454 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505466 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505532 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505545 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505619 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505634 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505709 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505722 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505798 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505814 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505890 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505905 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.505981 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.505999 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506081 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506099 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506193 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506208 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506273 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506287 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506364 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506378 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506455 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506473 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506550 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506564 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506645 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506661 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506737 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506751 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506830 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506846 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.506928 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.506941 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507016 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507031 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507117 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507132 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507212 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507228 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507307 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507323 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507437 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507454 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507531 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507546 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507628 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507644 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507721 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507736 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507829 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507844 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.507916 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.507931 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508009 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508024 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508100 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508115 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508186 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508200 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508275 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508289 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508362 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508381 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508488 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508503 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508577 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508592 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508673 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508688 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508759 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508774 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508848 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508862 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.508935 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.508951 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509035 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509050 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509134 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509149 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509226 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509244 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509322 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509337 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509412 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509427 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509507 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509522 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509601 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509616 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509693 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509708 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509786 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509802 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509880 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509895 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.509973 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.509988 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.510066 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.510082 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.510158 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.510174 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.510257 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.510271 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.510345 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.510360 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.510436 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.510451 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0611 09:18:37.510528 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0611 09:18:37.510542 60426 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRecoversFromBadNesting (0.03s) PASS ok k8s.io/kops/protokube/pkg/gossip/dns/hosts 0.050s === RUN TestSerializeEmptyCluster --- PASS: TestSerializeEmptyCluster (0.01s) PASS ok k8s.io/kops/tests/codecs 0.032s === RUN TestKopsUpgrades --- PASS: TestKopsUpgrades (0.01s) === RUN TestKubernetesUpgrades --- PASS: TestKubernetesUpgrades (0.00s) === RUN TestFindImage --- PASS: TestFindImage (0.00s) === RUN TestRecommendedKubernetesVersion --- PASS: TestRecommendedKubernetesVersion (0.00s) === RUN TestOrdering --- PASS: TestOrdering (0.00s) === RUN TestChannelsSelfConsistent --- PASS: TestChannelsSelfConsistent (0.01s) === RUN TestChannelImages === RUN TestChannelImages/stable-channel === RUN TestChannelImages/alpha-channel --- PASS: TestChannelImages (0.00s) --- PASS: TestChannelImages/stable-channel (0.00s) --- PASS: TestChannelImages/alpha-channel (0.00s) PASS ok k8s.io/kops/tests/integration/channel 0.062s === RUN TestConversionMinimal === RUN TestConversionMinimal/legacy-v1alpha2-v1alpha2 --- PASS: TestConversionMinimal (0.02s) --- PASS: TestConversionMinimal/legacy-v1alpha2-v1alpha2 (0.02s) PASS ok k8s.io/kops/tests/integration/conversion 0.052s === RUN Test_tryResourceAsString --- PASS: Test_tryResourceAsString (0.00s) === RUN Test_DryrunTarget_PrintReport --- PASS: Test_DryrunTarget_PrintReport (0.00s) === RUN TestWriteFile I0611 09:18:37.494439 60433 files.go:57] Writing file "/tmp/TestWriteFile1092944172/001/SubDir/test1.tmp" I0611 09:18:37.494595 60433 files.go:113] Changing file mode for "/tmp/TestWriteFile1092944172/001/SubDir/test1.tmp" to -rw-r--r-- --- PASS: TestWriteFile (0.00s) === RUN TestBigInt_Format --- PASS: TestBigInt_Format (0.00s) === RUN TestVFSCAStoreRoundTrip --- PASS: TestVFSCAStoreRoundTrip (0.01s) === RUN TestAddItem === RUN TestAddItem/first_primary === RUN TestAddItem/first_secondary === RUN TestAddItem/firstBigSerial_primary === RUN TestAddItem/firstBigSerial_secondary === RUN TestAddItem/after_primary === RUN TestAddItem/after_secondary === RUN TestAddItem/bigSerialAfter_primary === RUN TestAddItem/bigSerialAfter_secondary === RUN TestAddItem/before_primary === RUN TestAddItem/before_secondary === RUN TestAddItem/first_certonly_primary === RUN TestAddItem/first_certonly_secondary === RUN TestAddItem/after_certonly_primary === RUN TestAddItem/after_certonly_secondary === RUN TestAddItem/before_certonly_primary === RUN TestAddItem/before_certonly_secondary --- PASS: TestAddItem (0.00s) --- PASS: TestAddItem/first_primary (0.00s) --- PASS: TestAddItem/first_secondary (0.00s) --- PASS: TestAddItem/firstBigSerial_primary (0.00s) --- PASS: TestAddItem/firstBigSerial_secondary (0.00s) --- PASS: TestAddItem/after_primary (0.00s) --- PASS: TestAddItem/after_secondary (0.00s) --- PASS: TestAddItem/bigSerialAfter_primary (0.00s) --- PASS: TestAddItem/bigSerialAfter_secondary (0.00s) --- PASS: TestAddItem/before_primary (0.00s) --- PASS: TestAddItem/before_secondary (0.00s) --- PASS: TestAddItem/first_certonly_primary (0.00s) --- PASS: TestAddItem/first_certonly_secondary (0.00s) --- PASS: TestAddItem/after_certonly_primary (0.00s) --- PASS: TestAddItem/after_certonly_secondary (0.00s) --- PASS: TestAddItem/before_certonly_primary (0.00s) --- PASS: TestAddItem/before_certonly_secondary (0.00s) PASS ok k8s.io/kops/upup/pkg/fi 0.044s === RUN TestBootstrapChannelBuilder_BuildTasks I0611 09:18:42.017286 61354 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:42.017521 61354 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:42.017576 61354 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:42.017655 61354 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:42.017720 61354 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:42.017828 61354 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:42.017886 61354 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:42.017921 61354 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:42.017983 61354 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:42.018038 61354 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:42.031199 61354 zones.go:93] ListHostedZonesPages { } I0611 09:18:42.196160 61354 zones.go:93] ListHostedZonesPages { } I0611 09:18:42.353683 61354 zones.go:93] ListHostedZonesPages { } I0611 09:18:42.501310 61354 zones.go:93] ListHostedZonesPages { } I0611 09:18:42.618776 61354 zones.go:93] ListHostedZonesPages { } I0611 09:18:42.753313 61354 zones.go:93] ListHostedZonesPages { } I0611 09:18:42.895863 61354 zones.go:93] ListHostedZonesPages { } I0611 09:18:43.030219 61354 zones.go:93] ListHostedZonesPages { } I0611 09:18:43.567904 61354 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_BuildTasks (1.66s) === RUN TestBootstrapChannelBuilder_ServiceAccountIAM I0611 09:18:43.673981 61354 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:43.674068 61354 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:43.674118 61354 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:43.674154 61354 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:43.674179 61354 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:43.674214 61354 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:43.674240 61354 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:43.674257 61354 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:43.674280 61354 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:43.674296 61354 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:43.674314 61354 featureflag.go:167] Unknown FeatureFlag "+UseServiceAccountExternalPermissions" I0611 09:18:43.675402 61354 zones.go:93] ListHostedZonesPages { } I0611 09:18:43.822311 61354 featureflag.go:167] Unknown FeatureFlag "-UseServiceAccountExternalPermissions" --- PASS: TestBootstrapChannelBuilder_ServiceAccountIAM (0.15s) === RUN TestBootstrapChannelBuilder_AWSCloudController I0611 09:18:43.822529 61354 featureflag.go:164] FeatureFlag "ImageDigest"=false I0611 09:18:43.822646 61354 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:43.822709 61354 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0611 09:18:43.822761 61354 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0611 09:18:43.822797 61354 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0611 09:18:43.822847 61354 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0611 09:18:43.822887 61354 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0611 09:18:43.822916 61354 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0611 09:18:43.822956 61354 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0611 09:18:43.822982 61354 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0611 09:18:43.824720 61354 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_AWSCloudController (0.10s) === RUN TestContainerdVersionUrl === RUN TestContainerdVersionUrl/1.4.1- === RUN TestContainerdVersionUrl/1.4.1-arm === RUN TestContainerdVersionUrl/-amd64 === RUN TestContainerdVersionUrl/-arm64 === RUN TestContainerdVersionUrl/1.1.1-amd64 === RUN TestContainerdVersionUrl/1.1.1-arm64 === RUN TestContainerdVersionUrl/1.6.5-amd64 === RUN TestContainerdVersionUrl/1.5.5-arm64 --- PASS: TestContainerdVersionUrl (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1- (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-arm (0.00s) --- PASS: TestContainerdVersionUrl/-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.6.5-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.5.5-arm64 (0.00s) === RUN TestDeepValidate_OK --- PASS: TestDeepValidate_OK (0.00s) === RUN TestDeepValidate_NoNodeZones --- PASS: TestDeepValidate_NoNodeZones (0.00s) === RUN TestDeepValidate_NoMasterZones --- PASS: TestDeepValidate_NoMasterZones (0.00s) === RUN TestDeepValidate_BadZone deepvalidate_test.go:58: Zone validation not checked by DeepValidate --- SKIP: TestDeepValidate_BadZone (0.00s) === RUN TestDeepValidate_MixedRegion deepvalidate_test.go:70: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_MixedRegion (0.00s) === RUN TestDeepValidate_RegionAsZone deepvalidate_test.go:84: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_RegionAsZone (0.00s) === RUN TestDeepValidate_NotIncludedZone --- PASS: TestDeepValidate_NotIncludedZone (0.00s) === RUN TestDeepValidate_DuplicateZones --- PASS: TestDeepValidate_DuplicateZones (0.00s) === RUN TestDeepValidate_ExtraMasterZone --- PASS: TestDeepValidate_ExtraMasterZone (0.00s) === RUN TestDeepValidate_EvenEtcdClusterSize --- PASS: TestDeepValidate_EvenEtcdClusterSize (0.00s) === RUN TestDeepValidate_MissingEtcdMember --- PASS: TestDeepValidate_MissingEtcdMember (0.00s) === RUN TestPopulateClusterSpec_Proxy --- PASS: TestPopulateClusterSpec_Proxy (0.00s) === RUN TestPrecreateDNSNames --- PASS: TestPrecreateDNSNames (0.00s) === RUN TestDockerVersionUrlHash === RUN TestDockerVersionUrlHash/19.03.13-amd64 === RUN TestDockerVersionUrlHash/19.03.13-arm64 === RUN TestDockerVersionUrlHash/18.06.3-amd64 === RUN TestDockerVersionUrlHash/18.06.3-arm64 === RUN TestDockerVersionUrlHash/17.03.1-amd64 === RUN TestDockerVersionUrlHash/17.03.1-arm64 --- PASS: TestDockerVersionUrlHash (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-arm64 (0.00s) === RUN TestDockerVersionUrl === RUN TestDockerVersionUrl/19.03.13- === RUN TestDockerVersionUrl/19.03.13-arm === RUN TestDockerVersionUrl/-amd64 === RUN TestDockerVersionUrl/-arm64 === RUN TestDockerVersionUrl/18.06.3-amd64 === RUN TestDockerVersionUrl/18.06.3-arm64 === RUN TestDockerVersionUrl/19.03.13-amd64 === RUN TestDockerVersionUrl/19.03.13-arm64 --- PASS: TestDockerVersionUrl (0.00s) --- PASS: TestDockerVersionUrl/19.03.13- (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm (0.00s) --- PASS: TestDockerVersionUrl/-amd64 (0.00s) --- PASS: TestDockerVersionUrl/-arm64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm64 (0.00s) === RUN TestDockerVersionHash === RUN TestDockerVersionHash/19.03.13- === RUN TestDockerVersionHash/19.03.13-arm === RUN TestDockerVersionHash/-amd64 === RUN TestDockerVersionHash/-arm64 === RUN TestDockerVersionHash/1.1.1-amd64 === RUN TestDockerVersionHash/1.1.1-arm64 === RUN TestDockerVersionHash/19.03.13-amd64 === RUN TestDockerVersionHash/19.03.13-arm64 --- PASS: TestDockerVersionHash (0.00s) --- PASS: TestDockerVersionHash/19.03.13- (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm (0.00s) --- PASS: TestDockerVersionHash/-amd64 (0.00s) --- PASS: TestDockerVersionHash/-arm64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-amd64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-arm64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm64 (0.00s) === RUN TestDockerVersionsHashesAmd64 docker_test.go:245: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesAmd64 (0.00s) === RUN TestDockerVersionsHashesArm64 docker_test.go:260: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesArm64 (0.00s) === RUN Test_FindCNIAssetFromEnvironmentVariable --- PASS: Test_FindCNIAssetFromEnvironmentVariable (0.00s) === RUN Test_FindCNIAssetFromDefaults122 --- PASS: Test_FindCNIAssetFromDefaults122 (0.11s) === RUN TestRemoveSharedPrefix --- PASS: TestRemoveSharedPrefix (0.00s) === RUN TestCreateEtcdCluster --- PASS: TestCreateEtcdCluster (0.00s) === RUN TestSetupNetworking W0611 09:18:44.046949 61354 new_cluster.go:1152] flannel UDP mode is not recommended; consider flannel-vxlan instead --- PASS: TestSetupNetworking (0.00s) === RUN TestDefaultImage --- PASS: TestDefaultImage (0.00s) === RUN TestPopulateCluster_Default_NoError --- PASS: TestPopulateCluster_Default_NoError (0.00s) === RUN TestPopulateCluster_Subnets === RUN TestPopulateCluster_Subnets/100.64.0.0/10 === RUN TestPopulateCluster_Subnets/10.0.0.0/9 === RUN TestPopulateCluster_Subnets/10.0.0.0/8 === RUN TestPopulateCluster_Subnets/::/0 --- PASS: TestPopulateCluster_Subnets (0.01s) --- PASS: TestPopulateCluster_Subnets/100.64.0.0/10 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/9 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/8 (0.00s) --- PASS: TestPopulateCluster_Subnets/::/0 (0.00s) === RUN TestPopulateCluster_Docker_Spec --- PASS: TestPopulateCluster_Docker_Spec (0.00s) === RUN TestPopulateCluster_StorageDefault --- PASS: TestPopulateCluster_StorageDefault (0.00s) === RUN TestPopulateCluster_EvictionHard --- PASS: TestPopulateCluster_EvictionHard (0.00s) === RUN TestPopulateCluster_Custom_CIDR --- PASS: TestPopulateCluster_Custom_CIDR (0.00s) === RUN TestPopulateCluster_IsolateMasters --- PASS: TestPopulateCluster_IsolateMasters (0.00s) === RUN TestPopulateCluster_IsolateMastersFalse --- PASS: TestPopulateCluster_IsolateMastersFalse (0.00s) === RUN TestPopulateCluster_Name_Required --- PASS: TestPopulateCluster_Name_Required (0.00s) === RUN TestPopulateCluster_Zone_Required --- PASS: TestPopulateCluster_Zone_Required (0.00s) === RUN TestPopulateCluster_NetworkCIDR_Required --- PASS: TestPopulateCluster_NetworkCIDR_Required (0.00s) === RUN TestPopulateCluster_NonMasqueradeCIDR_Required --- PASS: TestPopulateCluster_NonMasqueradeCIDR_Required (0.00s) === RUN TestPopulateCluster_CloudProvider_Required --- PASS: TestPopulateCluster_CloudProvider_Required (0.00s) === RUN TestPopulateCluster_APIServerCount --- PASS: TestPopulateCluster_APIServerCount (0.00s) === RUN TestPopulateCluster_AnonymousAuth --- PASS: TestPopulateCluster_AnonymousAuth (0.00s) === RUN TestPopulateCluster_DockerVersion --- PASS: TestPopulateCluster_DockerVersion (0.00s) === RUN TestPopulateCluster_KubeController_High_Enough_Version --- PASS: TestPopulateCluster_KubeController_High_Enough_Version (0.00s) === RUN TestPopulateInstanceGroup_Name_Required --- PASS: TestPopulateInstanceGroup_Name_Required (0.00s) === RUN TestPopulateInstanceGroup_Role_Required --- PASS: TestPopulateInstanceGroup_Role_Required (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision --- PASS: TestPopulateInstanceGroup_AddTaintsCollision (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision3 --- PASS: TestPopulateInstanceGroup_AddTaintsCollision3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard --- PASS: TestPopulateInstanceGroup_EvictionHard (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard3 --- PASS: TestPopulateInstanceGroup_EvictionHard3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard4 --- PASS: TestPopulateInstanceGroup_EvictionHard4 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard2 --- PASS: TestPopulateInstanceGroup_EvictionHard2 (0.00s) === RUN TestPopulateInstanceGroup_AddTaints --- PASS: TestPopulateInstanceGroup_AddTaints (0.00s) === RUN TestMachineArchitecture === RUN TestMachineArchitecture/t2.micro-amd64 === RUN TestMachineArchitecture/t3.micro-amd64 === RUN TestMachineArchitecture/a1.large-arm64 --- PASS: TestMachineArchitecture (0.00s) --- PASS: TestMachineArchitecture/t2.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/t3.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/a1.large-arm64 (0.00s) === RUN TestRuncVersionUrlHash === RUN TestRuncVersionUrlHash/1.100.0-amd64 === RUN TestRuncVersionUrlHash/1.100.0-arm64 === RUN TestRuncVersionUrlHash/1.1.0-amd64 === RUN TestRuncVersionUrlHash/1.1.0-arm64 --- PASS: TestRuncVersionUrlHash (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionUrl === RUN TestRuncVersionUrl/1.1.0- === RUN TestRuncVersionUrl/1.1.0-arm === RUN TestRuncVersionUrl/-amd64 === RUN TestRuncVersionUrl/-arm64 === RUN TestRuncVersionUrl/1.0.0-amd64 === RUN TestRuncVersionUrl/1.0.0-arm64 === RUN TestRuncVersionUrl/1.1.0-amd64 === RUN TestRuncVersionUrl/1.1.0-arm64 --- PASS: TestRuncVersionUrl (0.00s) --- PASS: TestRuncVersionUrl/1.1.0- (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm (0.00s) --- PASS: TestRuncVersionUrl/-amd64 (0.00s) --- PASS: TestRuncVersionUrl/-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm64 (0.00s) === RUN TestRuncVersionHash === RUN TestRuncVersionHash/1.1.0- === RUN TestRuncVersionHash/1.1.0-arm === RUN TestRuncVersionHash/-amd64 === RUN TestRuncVersionHash/-arm64 === RUN TestRuncVersionHash/1.0.0-amd64 === RUN TestRuncVersionHash/1.0.0-arm64 === RUN TestRuncVersionHash/1.100.0-amd64 === RUN TestRuncVersionHash/1.100.0-arm64 === RUN TestRuncVersionHash/1.1.0-amd64 === RUN TestRuncVersionHash/1.1.0-arm64 --- PASS: TestRuncVersionHash (0.00s) --- PASS: TestRuncVersionHash/1.1.0- (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm (0.00s) --- PASS: TestRuncVersionHash/-amd64 (0.00s) --- PASS: TestRuncVersionHash/-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionsHashesAmd64 runc_test.go:240: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesAmd64 (0.00s) === RUN TestRuncVersionsHashesArm64 runc_test.go:255: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesArm64 (0.00s) === RUN Test_AssignSubnets === RUN Test_AssignSubnets/test-1 === RUN Test_AssignSubnets/test-2 I0611 09:18:44.078910 61354 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-3 I0611 09:18:44.078972 61354 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet a I0611 09:18:44.078985 61354 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-4 I0611 09:18:44.079038 61354 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet b I0611 09:18:44.079050 61354 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-5 I0611 09:18:44.079103 61354 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-6 I0611 09:18:44.079158 61354 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-7 I0611 09:18:44.079213 61354 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0611 09:18:44.079230 61354 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-8 I0611 09:18:44.079285 61354 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0611 09:18:44.079300 61354 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-9 === RUN Test_AssignSubnets/test-10 I0611 09:18:44.079391 61354 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-11 === RUN Test_AssignSubnets/test-12 I0611 09:18:44.079480 61354 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-13 I0611 09:18:44.079537 61354 subnets.go:205] Assigned CIDR 10.0.0.0/14 to subnet a I0611 09:18:44.079547 61354 subnets.go:205] Assigned CIDR 10.4.0.0/14 to subnet b I0611 09:18:44.079556 61354 subnets.go:205] Assigned CIDR 10.8.0.0/14 to subnet c I0611 09:18:44.079569 61354 subnets.go:224] Assigned CIDR 10.32.0.0/11 to subnet a I0611 09:18:44.079581 61354 subnets.go:224] Assigned CIDR 10.64.0.0/11 to subnet b I0611 09:18:44.079591 61354 subnets.go:224] Assigned CIDR 10.96.0.0/11 to subnet b I0611 09:18:44.079599 61354 subnets.go:224] Assigned CIDR 10.128.0.0/11 to subnet c I0611 09:18:44.079606 61354 subnets.go:224] Assigned CIDR 10.160.0.0/11 to subnet c --- PASS: Test_AssignSubnets (0.00s) --- PASS: Test_AssignSubnets/test-1 (0.00s) --- PASS: Test_AssignSubnets/test-2 (0.00s) --- PASS: Test_AssignSubnets/test-3 (0.00s) --- PASS: Test_AssignSubnets/test-4 (0.00s) --- PASS: Test_AssignSubnets/test-5 (0.00s) --- PASS: Test_AssignSubnets/test-6 (0.00s) --- PASS: Test_AssignSubnets/test-7 (0.00s) --- PASS: Test_AssignSubnets/test-8 (0.00s) --- PASS: Test_AssignSubnets/test-9 (0.00s) --- PASS: Test_AssignSubnets/test-10 (0.00s) --- PASS: Test_AssignSubnets/test-11 (0.00s) --- PASS: Test_AssignSubnets/test-12 (0.00s) --- PASS: Test_AssignSubnets/test-13 (0.00s) === RUN Test_TemplateFunctions_CloudControllerConfigArgv === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller (0.00s) === RUN Test_KarpenterInstanceTypes I0611 09:18:44.080756 61354 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: Test_KarpenterInstanceTypes (0.00s) === RUN TestKopsFeatureEnabled === RUN TestKopsFeatureEnabled/Missing_feature === RUN TestKopsFeatureEnabled/Existing_feature I0611 09:18:44.080931 61354 featureflag.go:164] FeatureFlag "Scaleway"=true --- PASS: TestKopsFeatureEnabled (0.00s) --- PASS: TestKopsFeatureEnabled/Missing_feature (0.00s) --- PASS: TestKopsFeatureEnabled/Existing_feature (0.00s) === RUN Test_BuildMirroredAsset === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup --- PASS: Test_BuildMirroredAsset (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup (0.00s) === RUN TestValidateFull_Default_Validates --- PASS: TestValidateFull_Default_Validates (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_NoDot --- PASS: TestValidateFull_ClusterName_InvalidDNS_NoDot (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_Invalid --- PASS: TestValidateFull_ClusterName_InvalidDNS_Invalid (0.00s) === RUN TestValidateFull_ClusterName_Required --- PASS: TestValidateFull_ClusterName_Required (0.00s) === RUN TestValidateFull_UpdatePolicy_Valid === RUN TestValidateFull_UpdatePolicy_Valid/missing === RUN TestValidateFull_UpdatePolicy_Valid/automatic === RUN TestValidateFull_UpdatePolicy_Valid/external --- PASS: TestValidateFull_UpdatePolicy_Valid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/missing (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/automatic (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/external (0.00s) === RUN TestValidateFull_UpdatePolicy_Invalid === RUN TestValidateFull_UpdatePolicy_Invalid/empty === RUN TestValidateFull_UpdatePolicy_Invalid/populated --- PASS: TestValidateFull_UpdatePolicy_Invalid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/empty (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/populated (0.00s) === RUN Test_Validate_Kubenet_With_14 --- PASS: Test_Validate_Kubenet_With_14 (0.00s) === RUN TestValidate_ClusterName_Import --- PASS: TestValidate_ClusterName_Import (0.00s) === RUN TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity --- PASS: TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup 2.167s === RUN TestGetASGTagsToDelete --- PASS: TestGetASGTagsToDelete (0.00s) === RUN TestProcessCompare --- PASS: TestProcessCompare (0.00s) === RUN TestAutoscalingGroupTerraformRender I0611 09:18:42.001217 61355 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender1108843323/001 I0611 09:18:42.001682 61355 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender1108843323/001 I0611 09:18:42.002103 61355 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender1108843323/001 --- PASS: TestAutoscalingGroupTerraformRender (0.00s) === RUN TestTGsARNsChunks --- PASS: TestTGsARNsChunks (0.01s) === RUN TestGetEBSVolumeTagsToDelete --- PASS: TestGetEBSVolumeTagsToDelete (0.00s) === RUN TestSharedEgressOnlyInternetGatewayDoesNotRename I0611 09:18:42.010287 61355 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0611 09:18:42.010401 61355 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0611 09:18:42.010434 61355 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] }], VpcId: "vpc-1" } I0611 09:18:42.010604 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.010782 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.010891 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.010922 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.011296 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:18:42.011364 61355 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0611 09:18:42.011432 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.011531 61355 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0611 09:18:42.011654 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0611 09:18:42.011742 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.011813 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.011884 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.011911 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.011961 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.012016 61355 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0611 09:18:42.012099 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedEgressOnlyInternetGatewayDoesNotRename (0.00s) === RUN TestElasticIPCreate I0611 09:18:42.012298 61355 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0611 09:18:42.012398 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.012573 61355 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0611 09:18:42.012641 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:18:42.012681 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.012720 61355 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0611 09:18:42.012832 61355 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0611 09:18:42.013117 61355 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0611 09:18:42.013222 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:18:42.013281 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.013326 61355 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0611 09:18:42.013413 61355 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:18:42.013632 61355 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "eip1" }] }] } I0611 09:18:42.013719 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:18:42.013761 61355 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedElasticIp", Value: "192.0.2.1" },{ Key: "AssociatedElasticIpAllocationId", Value: "eipalloc-1" }] } I0611 09:18:42.013823 61355 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0611 09:18:42.013929 61355 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0611 09:18:42.013996 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.014067 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.014113 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.014160 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.014210 61355 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0611 09:18:42.014269 61355 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0611 09:18:42.014373 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.014424 61355 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0611 09:18:42.014557 61355 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:18:42.014652 61355 address.go:120] DescribeAddresses: { Filters: [{ Name: "public-ip", Values: ["192.0.2.1"] }] } I0611 09:18:42.014733 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0611 09:18:42.014805 61355 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestElasticIPCreate (0.00s) === RUN TestSharedInternetGatewayDoesNotRename I0611 09:18:42.014904 61355 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0611 09:18:42.014968 61355 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0611 09:18:42.015008 61355 internetgateways.go:66] CreateInternetGateway: { } I0611 09:18:42.015051 61355 tags.go:42] CreateTags { Resources: ["igw-1"], Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] } I0611 09:18:42.015152 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.015261 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.015328 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.015356 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.015471 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:18:42.015510 61355 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0611 09:18:42.015554 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.015652 61355 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0611 09:18:42.015781 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0611 09:18:42.015861 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.015930 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.015997 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.016025 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.016079 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.016131 61355 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0611 09:18:42.016207 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedInternetGatewayDoesNotRename (0.00s) === RUN TestLaunchTemplateTerraformRender I0611 09:18:42.016811 61355 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender3831932625/001 I0611 09:18:42.017216 61355 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender3831932625/001 --- PASS: TestLaunchTemplateTerraformRender (0.00s) === RUN TestParseRemovalRule --- PASS: TestParseRemovalRule (0.00s) === RUN TestPortRemovalRule --- PASS: TestPortRemovalRule (0.00s) === RUN TestPortRemovalRule_Zero --- PASS: TestPortRemovalRule_Zero (0.00s) === RUN TestSecurityGroupCreate I0611 09:18:42.017845 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.017924 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.018078 61355 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0611 09:18:42.018178 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:18:42.018226 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.018266 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.018378 61355 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0611 09:18:42.018676 61355 securitygroups.go:40] CreateSecurityGroup: { Description: "Description", GroupName: "sg1", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "sg1" }] }], VpcId: "vpc-1" } I0611 09:18:42.018762 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0611 09:18:42.018812 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0611 09:18:42.018897 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.018958 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.019027 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.019054 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.019095 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.019132 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.019194 61355 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0611 09:18:42.019314 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSecurityGroupCreate (0.00s) === RUN Test_Subnet_ValidateRequired --- PASS: Test_Subnet_ValidateRequired (0.00s) === RUN Test_Subnet_CannotChangeSubnet --- PASS: Test_Subnet_CannotChangeSubnet (0.00s) === RUN TestSubnetCreate I0611 09:18:42.019672 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.019735 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.019913 61355 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0611 09:18:42.019981 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:18:42.020019 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.020063 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.020127 61355 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0611 09:18:42.020278 61355 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0611 09:18:42.020350 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:18:42.020391 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.020426 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0611 09:18:42.020533 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.020600 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.020665 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.020690 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.020731 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.020769 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.020827 61355 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0611 09:18:42.020915 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.020953 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSubnetCreate (0.00s) === RUN TestSubnetCreateIPv6 I0611 09:18:42.021146 61355 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0611 09:18:42.021210 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.021345 61355 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0611 09:18:42.021405 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:18:42.021447 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.021503 61355 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0611 09:18:42.021574 61355 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0611 09:18:42.021723 61355 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0611 09:18:42.021714 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.022023 61355 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0611 09:18:42.022102 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:18:42.022157 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.022202 61355 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0611 09:18:42.022341 61355 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0611 09:18:42.022409 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.022497 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.022530 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.022582 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.022625 61355 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0611 09:18:42.022704 61355 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0611 09:18:42.022807 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.022882 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.022962 61355 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6 (0.00s) === RUN TestSubnetCreateIPv6NetNum I0611 09:18:42.023140 61355 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0611 09:18:42.023204 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.023343 61355 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0611 09:18:42.023418 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:18:42.023459 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.023494 61355 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0611 09:18:42.023552 61355 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0611 09:18:42.023797 61355 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0611 09:18:42.023886 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:18:42.023929 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.024001 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.024118 61355 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0611 09:18:42.024162 61355 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0611 09:18:42.024279 61355 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0611 09:18:42.024341 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.024411 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.024439 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.024517 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.024564 61355 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0611 09:18:42.024637 61355 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0611 09:18:42.024829 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.024869 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.024943 61355 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6NetNum (0.00s) === RUN TestSharedSubnetCreateDoesNotCreateNew I0611 09:18:42.025033 61355 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "ExistingVPC" }] }] } I0611 09:18:42.025135 61355 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "ExistingSubnet" }] }], VpcId: "vpc-1" } I0611 09:18:42.025252 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.025312 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.025372 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.025398 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.025519 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:18:42.025564 61355 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0611 09:18:42.025612 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.025666 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.025832 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0611 09:18:42.025875 61355 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0611 09:18:42.025926 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0611 09:18:42.026041 61355 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0611 09:18:42.026098 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.026159 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.026193 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.026242 61355 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0611 09:18:42.026296 61355 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0611 09:18:42.026382 61355 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedSubnetCreateDoesNotCreateNew (0.00s) === RUN TestVPCCreate I0611 09:18:42.026505 61355 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:42.026566 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.026697 61355 vpcs.go:89] CreateVpc: { CidrBlock: "172.21.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0611 09:18:42.026757 61355 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0611 09:18:42.026794 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.026825 61355 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0611 09:18:42.026888 61355 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:42.026945 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0611 09:18:42.027011 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.027039 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.027078 61355 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0611 09:18:42.027110 61355 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestVPCCreate (0.00s) === RUN Test4758 --- PASS: Test4758 (0.00s) === RUN TestSharedVPCAdditionalCIDR I0611 09:18:42.027257 61355 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "172.22.0.0/16", VpcId: "vpc-1" } I0611 09:18:42.027339 61355 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:42.027395 61355 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc-1"] }] } I0611 09:18:42.027461 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0611 09:18:42.027489 61355 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0611 09:18:42.027535 61355 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestSharedVPCAdditionalCIDR (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awstasks 0.107s === RUN TestValidateRegion --- PASS: TestValidateRegion (0.00s) === RUN TestFindRegion --- PASS: TestFindRegion (0.00s) === RUN TestEC2TagSpecification === RUN TestEC2TagSpecification/No_tags === RUN TestEC2TagSpecification/simple_tag --- PASS: TestEC2TagSpecification (0.00s) --- PASS: TestEC2TagSpecification/No_tags (0.00s) --- PASS: TestEC2TagSpecification/simple_tag (0.00s) === RUN Test_GetResourceName32 --- PASS: Test_GetResourceName32 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awsup 0.054s === RUN TestZoneToLocation === RUN TestZoneToLocation/test_case_0 === RUN TestZoneToLocation/test_case_1 === RUN TestZoneToLocation/test_case_2 --- PASS: TestZoneToLocation (0.00s) --- PASS: TestZoneToLocation/test_case_0 (0.00s) --- PASS: TestZoneToLocation/test_case_1 (0.00s) --- PASS: TestZoneToLocation/test_case_2 (0.00s) === RUN TestZoneToAvailabilityZoneNumber === RUN TestZoneToAvailabilityZoneNumber/test_case_0 === RUN TestZoneToAvailabilityZoneNumber/test_case_1 === RUN TestZoneToAvailabilityZoneNumber/test_case_2 --- PASS: TestZoneToAvailabilityZoneNumber (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_0 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_1 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_2 (0.00s) === RUN TestFindEtcdStatus --- PASS: TestFindEtcdStatus (0.00s) === RUN TestGetCloudGroups --- PASS: TestGetCloudGroups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azure 0.034s === RUN TestDiskRenderAzure I0611 09:18:41.975709 61357 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRenderAzure (0.00s) === RUN TestDiskFind --- PASS: TestDiskFind (0.00s) === RUN TestDiskRun I0611 09:18:41.976350 61357 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRun (0.00s) === RUN TestDiskCheckChanges === RUN TestDiskCheckChanges/test_case_0 === RUN TestDiskCheckChanges/test_case_1 === RUN TestDiskCheckChanges/test_case_2 === RUN TestDiskCheckChanges/test_case_3 --- PASS: TestDiskCheckChanges (0.00s) --- PASS: TestDiskCheckChanges/test_case_0 (0.00s) --- PASS: TestDiskCheckChanges/test_case_1 (0.00s) --- PASS: TestDiskCheckChanges/test_case_2 (0.00s) --- PASS: TestDiskCheckChanges/test_case_3 (0.00s) === RUN TestLoadBalancerRenderAzure I0611 09:18:41.976740 61357 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRenderAzure (0.00s) === RUN TestLoadBalancerFind loadbalancer_test.go:124: *azuretasks.LoadBalancer {"Name":"loadbalancer","Lifecycle":"","ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Subnet":{"Name":"subnet","Lifecycle":"","ID":null,"ResourceGroup":null,"VirtualNetwork":null,"NatGateway":null,"NetworkSecurityGroup":null,"CIDR":null,"Shared":null},"External":true,"Tags":null,"ForAPIServer":false} --- PASS: TestLoadBalancerFind (0.00s) === RUN TestLoadBalancerRun I0611 09:18:41.977823 61357 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRun (0.00s) === RUN TestLoadBalancerCheckChanges === RUN TestLoadBalancerCheckChanges/test_case_0 === RUN TestLoadBalancerCheckChanges/test_case_1 === RUN TestLoadBalancerCheckChanges/test_case_2 === RUN TestLoadBalancerCheckChanges/test_case_3 --- PASS: TestLoadBalancerCheckChanges (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_0 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_1 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_2 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_3 (0.00s) === RUN TestPublicIPAddressRenderAzure I0611 09:18:41.978179 61357 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRenderAzure (0.00s) === RUN TestPublicIPAddressFind publicipaddress_test.go:102: *azuretasks.PublicIPAddress {"Name":"publicIPAddress","Lifecycle":"","ID":null,"ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Tags":null} --- PASS: TestPublicIPAddressFind (0.00s) === RUN TestPublicIPAddressRun I0611 09:18:41.978661 61357 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRun (0.00s) === RUN TestPublicIPAddressCheckChanges === RUN TestPublicIPAddressCheckChanges/test_case_0 === RUN TestPublicIPAddressCheckChanges/test_case_1 === RUN TestPublicIPAddressCheckChanges/test_case_2 === RUN TestPublicIPAddressCheckChanges/test_case_3 --- PASS: TestPublicIPAddressCheckChanges (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_0 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_1 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_2 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_3 (0.00s) === RUN TestResourceGroupRenderAzure I0611 09:18:41.979001 61357 resourcegroup.go:108] Creating a new Resource Group with name: rg I0611 09:18:41.979022 61357 resourcegroup.go:110] Updating a Resource Group with name: rg --- PASS: TestResourceGroupRenderAzure (0.00s) === RUN TestResourceGroupFind --- PASS: TestResourceGroupFind (0.00s) === RUN TestResourceGroupRun I0611 09:18:41.979358 61357 resourcegroup.go:108] Creating a new Resource Group with name: rg --- PASS: TestResourceGroupRun (0.00s) === RUN TestResourceGroupCheckChanges === RUN TestResourceGroupCheckChanges/test_case_0 === RUN TestResourceGroupCheckChanges/test_case_1 === RUN TestResourceGroupCheckChanges/test_case_2 === RUN TestResourceGroupCheckChanges/test_case_3 --- PASS: TestResourceGroupCheckChanges (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_0 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_1 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_2 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_3 (0.00s) === RUN TestRoleAssignmentRenderAzure --- PASS: TestRoleAssignmentRenderAzure (0.00s) === RUN TestRoleAssignmentFind --- PASS: TestRoleAssignmentFind (0.00s) === RUN TestRoleAssignmentFind_NoPrincipalID --- PASS: TestRoleAssignmentFind_NoPrincipalID (0.00s) === RUN TestRoleAssignmentCheckChanges === RUN TestRoleAssignmentCheckChanges/test_case_0 === RUN TestRoleAssignmentCheckChanges/test_case_1 === RUN TestRoleAssignmentCheckChanges/test_case_2 === RUN TestRoleAssignmentCheckChanges/test_case_3 --- PASS: TestRoleAssignmentCheckChanges (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_0 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_1 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_2 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_3 (0.00s) === RUN TestSubnetRenderAzure I0611 09:18:41.980199 61357 subnet.go:126] Creating a new Subnet with name: vnet --- PASS: TestSubnetRenderAzure (0.00s) === RUN TestSubnetFind --- PASS: TestSubnetFind (0.00s) === RUN TestSubnetCheckChanges === RUN TestSubnetCheckChanges/test_case_0 === RUN TestSubnetCheckChanges/test_case_1 === RUN TestSubnetCheckChanges/test_case_2 === RUN TestSubnetCheckChanges/test_case_3 --- PASS: TestSubnetCheckChanges (0.00s) --- PASS: TestSubnetCheckChanges/test_case_0 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_1 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_2 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_3 (0.00s) === RUN TestVirtualNetworkRenderAzure I0611 09:18:41.980601 61357 virtualnetwork.go:122] Creating a new Virtual Network with name: vnet --- PASS: TestVirtualNetworkRenderAzure (0.00s) === RUN TestVirtualNetworkFind --- PASS: TestVirtualNetworkFind (0.00s) === RUN TestVirtualNetworkRun I0611 09:18:41.980906 61357 virtualnetwork.go:122] Creating a new Virtual Network with name: rg --- PASS: TestVirtualNetworkRun (0.00s) === RUN TestVirtualNetworkCheckChanges === RUN TestVirtualNetworkCheckChanges/test_case_0 === RUN TestVirtualNetworkCheckChanges/test_case_1 === RUN TestVirtualNetworkCheckChanges/test_case_2 === RUN TestVirtualNetworkCheckChanges/test_case_3 --- PASS: TestVirtualNetworkCheckChanges (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_0 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_1 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_2 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_3 (0.00s) === RUN TestSubnetIDParse --- PASS: TestSubnetIDParse (0.00s) === RUN TestLoadBalancerIDParse --- PASS: TestLoadBalancerIDParse (0.00s) === RUN TestVMScaleSetRenderAzure I0611 09:18:41.981432 61357 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRenderAzure (0.00s) === RUN TestVMScaleSetFind --- PASS: TestVMScaleSetFind (0.00s) === RUN TestVMScaleSetRun I0611 09:18:41.981836 61357 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRun (0.00s) === RUN TestVMScaleSetCheckChanges === RUN TestVMScaleSetCheckChanges/test_case_0 === RUN TestVMScaleSetCheckChanges/test_case_1 === RUN TestVMScaleSetCheckChanges/test_case_2 === RUN TestVMScaleSetCheckChanges/test_case_3 --- PASS: TestVMScaleSetCheckChanges (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_0 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_1 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_2 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_3 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azuretasks 0.045s === RUN Test_Find === RUN Test_Find/successfully_found_volume === RUN Test_Find/no_volume_found === RUN Test_Find/error_from_server --- PASS: Test_Find (0.00s) --- PASS: Test_Find/successfully_found_volume (0.00s) --- PASS: Test_Find/no_volume_found (0.00s) --- PASS: Test_Find/error_from_server (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/dotasks 0.045s === RUN TestProjectIAMBinding I0611 09:18:43.414339 62188 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:43.414896 62188 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0611 09:18:43.414922 62188 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:43.415410 62188 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0611 09:18:43.415437 62188 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:43.415600 62188 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestProjectIAMBinding (0.00s) === RUN TestServiceAccount I0611 09:18:43.415718 62188 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:43.415837 62188 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0611 09:18:43.415861 62188 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:43.415984 62188 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0611 09:18:43.416009 62188 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:43.416051 62188 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestServiceAccount (0.00s) === RUN TestStorageBucketIAM I0611 09:18:43.416136 62188 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:43.416391 62188 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0611 09:18:43.416416 62188 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:43.416785 62188 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0611 09:18:43.416811 62188 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0611 09:18:43.416938 62188 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestStorageBucketIAM (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/gcetasks 0.076s === RUN Test_OpenstackCloud_MakeCloud === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value --- PASS: Test_OpenstackCloud_MakeCloud (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value (0.00s) === RUN Test_OpenstackCloud_GetApiIngressStatus === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled --- PASS: Test_OpenstackCloud_GetApiIngressStatus (0.01s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled (0.00s) === RUN Test_BuildClients === RUN Test_BuildClients/Empty_openstack_spec_means_no_load_balancer === RUN Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned === RUN Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned === RUN Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned === RUN Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled --- PASS: Test_BuildClients (0.00s) --- PASS: Test_BuildClients/Empty_openstack_spec_means_no_load_balancer (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled (0.00s) === RUN Test_WaitForStatusActiveIsSuccessful --- PASS: Test_WaitForStatusActiveIsSuccessful (1.00s) === RUN Test_WaitForStatusActiveResultsInInstanceNotFound --- PASS: Test_WaitForStatusActiveResultsInInstanceNotFound (1.00s) === RUN Test_WaitForStatusActiveResultsInUnableToCreateServer --- PASS: Test_WaitForStatusActiveResultsInUnableToCreateServer (1.00s) === RUN Test_WaitForStatusActiveResultsInTimeout --- PASS: Test_WaitForStatusActiveResultsInTimeout (1.00s) === RUN TestGetMetadataFromMetadataServiceReturnsNotFoundError --- PASS: TestGetMetadataFromMetadataServiceReturnsNotFoundError (0.00s) === RUN TestGetMetadataFromMetadataService --- PASS: TestGetMetadataFromMetadataService (0.00s) === RUN TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound --- PASS: TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound (0.00s) === RUN TestGetMetadataFromConfigDrive --- PASS: TestGetMetadataFromConfigDrive (0.00s) === RUN TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound --- PASS: TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound (0.00s) === RUN TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenConfigDriveFails --- PASS: TestGetMetadataFromServiceEndpointWhenConfigDriveFails (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromConfigDriveWhenServiceEndpointFails --- PASS: TestGetMetadataFromConfigDriveWhenServiceEndpointFails (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstack 4.072s === RUN TestFilterPortsReturnsAllPorts --- PASS: TestFilterPortsReturnsAllPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPort --- PASS: TestFilterPortsReturnsOnlyTaggedPort (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPorts --- PASS: TestFilterPortsReturnsOnlyTaggedPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername --- PASS: TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil (0.00s) === RUN Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges --- PASS: Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges (0.00s) === RUN Test_Port_GetDependencies --- PASS: Test_Port_GetDependencies (0.00s) === RUN Test_NewPortTaskFromCloud === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs --- PASS: Test_NewPortTaskFromCloud (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs (0.00s) === RUN Test_Port_Find === RUN Test_Port_Find/nothing_found === RUN Test_Port_Find/port_found_no_tags === RUN Test_Port_Find/port_found_with_tags === RUN Test_Port_Find/multiple_ports_found === RUN Test_Port_Find/error_listing_ports === RUN Test_Port_Find/port_found_with_allowed_address_pairs --- PASS: Test_Port_Find (0.00s) --- PASS: Test_Port_Find/nothing_found (0.00s) --- PASS: Test_Port_Find/port_found_no_tags (0.00s) --- PASS: Test_Port_Find/port_found_with_tags (0.00s) --- PASS: Test_Port_Find/multiple_ports_found (0.00s) --- PASS: Test_Port_Find/error_listing_ports (0.00s) --- PASS: Test_Port_Find/port_found_with_allowed_address_pairs (0.00s) === RUN Test_Port_CheckChanges === RUN Test_Port_CheckChanges/actual_nil_all_required_fields_set === RUN Test_Port_CheckChanges/actual_nil_required_field_Name_nil === RUN Test_Port_CheckChanges/actual_nil_required_field_Network_nil === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set --- PASS: Test_Port_CheckChanges (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_all_required_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Name_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Network_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set (0.00s) === RUN Test_Port_RenderOpenstack === RUN Test_Port_RenderOpenstack/actual_not_nil === RUN Test_Port_RenderOpenstack/actual_nil_success === RUN Test_Port_RenderOpenstack/actual_nil_cloud_error === RUN Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success --- PASS: Test_Port_RenderOpenstack (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_not_nil (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_success (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_cloud_error (0.00s) --- PASS: Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success (0.00s) === RUN Test_Port_createOptsFromPortTask === RUN Test_Port_createOptsFromPortTask/all_fields_set === RUN Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups --- PASS: Test_Port_createOptsFromPortTask (0.00s) --- PASS: Test_Port_createOptsFromPortTask/all_fields_set (0.00s) --- PASS: Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstacktasks 0.059s === RUN TestCreateValidScalewayProfile === RUN TestCreateValidScalewayProfile/Only_environment_set === RUN TestCreateValidScalewayProfile/Only_profile_set === RUN TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID === RUN TestCreateValidScalewayProfile/Environment_should_override_whole_profile === RUN TestCreateValidScalewayProfile/Empty_profile_for_integration_tests --- PASS: TestCreateValidScalewayProfile (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_environment_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_profile_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_whole_profile (0.00s) --- PASS: TestCreateValidScalewayProfile/Empty_profile_for_integration_tests (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/scaleway 0.033s === RUN TestWriteLocalsOutputs === RUN TestWriteLocalsOutputs/empty_map === RUN TestWriteLocalsOutputs/single_output === RUN TestWriteLocalsOutputs/list_output --- PASS: TestWriteLocalsOutputs (0.00s) --- PASS: TestWriteLocalsOutputs/empty_map (0.00s) --- PASS: TestWriteLocalsOutputs/single_output (0.00s) --- PASS: TestWriteLocalsOutputs/list_output (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraform 0.031s === RUN TestGetOutputs === RUN TestGetOutputs/empty_map === RUN TestGetOutputs/single_output === RUN TestGetOutputs/list_output === RUN TestGetOutputs/duplicate_names === RUN TestGetOutputs/duplicate_values --- PASS: TestGetOutputs (0.00s) --- PASS: TestGetOutputs/empty_map (0.00s) --- PASS: TestGetOutputs/single_output (0.00s) --- PASS: TestGetOutputs/list_output (0.00s) --- PASS: TestGetOutputs/duplicate_names (0.00s) --- PASS: TestGetOutputs/duplicate_values (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter 0.005s === RUN TestKeypairDeps --- PASS: TestKeypairDeps (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/fitasks 0.033s === RUN TestArchiveDependencies --- PASS: TestArchiveDependencies (0.00s) === RUN TestBindMountCommands I0611 09:18:46.678765 62584 bindmount.go:223] running mount command [mount --bind /containerized_mounter /containerized_mounter] I0611 09:18:46.678836 62584 bindmount.go:232] running mount command [mount -o remount,exec /containerized_mounter] I0611 09:18:46.678848 62584 bindmount.go:223] running mount command [mount --rbind /var/lib/kubelet/ /containerized_mounter/rootfs/var/lib/kubelet] I0611 09:18:46.678861 62584 bindmount.go:243] running mount command [mount --make-rshared /containerized_mounter/rootfs/var/lib/kubelet] I0611 09:18:46.678871 62584 bindmount.go:223] running mount command [mount --bind -o ro /proc /containerized_mounter/rootfs/proc] I0611 09:18:46.678883 62584 bindmount.go:223] running mount command [mount --bind -o ro /dev /containerized_mounter/rootfs/dev] I0611 09:18:46.678897 62584 bindmount.go:223] running mount command [mount --bind -o ro /etc/resolv.conf /containerized_mounter/rootfs/etc/resolv.conf] --- PASS: TestBindMountCommands (0.00s) === RUN TestBindMountDependencies --- PASS: TestBindMountDependencies (0.00s) === RUN TestFileDependencies === RUN TestFileDependencies/user === RUN TestFileDependencies/parentDir === RUN TestFileDependencies/afterFiles --- PASS: TestFileDependencies (0.00s) --- PASS: TestFileDependencies/user (0.00s) --- PASS: TestFileDependencies/parentDir (0.00s) --- PASS: TestFileDependencies/afterFiles (0.00s) === RUN TestIssueCertFileDependencies --- PASS: TestIssueCertFileDependencies (0.00s) === RUN TestLoadImageTask_Deps --- PASS: TestLoadImageTask_Deps (0.00s) === RUN TestServiceTask_Deps --- PASS: TestServiceTask_Deps (0.00s) === RUN TestServiceTask_UnknownTypes W0611 09:18:46.679322 62584 service.go:110] Unhandled type *nodetasks.FakeTask in Service::GetDependencies: &{} --- PASS: TestServiceTask_UnknownTypes (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/nodeup/nodetasks 0.064s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) === RUN TestStringSlicesEqualIgnoreOrder --- PASS: TestStringSlicesEqualIgnoreOrder (0.00s) === RUN TestHashString --- PASS: TestHashString (0.00s) === RUN TestSanitizeString --- PASS: TestSanitizeString (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/utils 0.004s === RUN TestFindDistribution --- PASS: TestFindDistribution (0.00s) PASS ok k8s.io/kops/util/pkg/distributions 0.005s === RUN TestWithTee --- PASS: TestWithTee (0.00s) PASS ok k8s.io/kops/util/pkg/exec 0.004s === RUN TestNewHasher === RUN TestNewHasher/sha256 === RUN TestNewHasher/sha1 === RUN TestNewHasher/md5 --- PASS: TestNewHasher (0.00s) --- PASS: TestNewHasher/sha256 (0.00s) --- PASS: TestNewHasher/sha1 (0.00s) --- PASS: TestNewHasher/md5 (0.00s) === RUN TestMemberFromString === RUN TestMemberFromString/sha256_1 === RUN TestMemberFromString/sha256_2 === RUN TestMemberFromString/sha256_3 === RUN TestMemberFromString/sha1_1 === RUN TestMemberFromString/sha1_2 === RUN TestMemberFromString/sha1_3 === RUN TestMemberFromString/md5_1 === RUN TestMemberFromString/md5_2 === RUN TestMemberFromString/md5_3 --- PASS: TestMemberFromString (0.00s) --- PASS: TestMemberFromString/sha256_1 (0.00s) --- PASS: TestMemberFromString/sha256_2 (0.00s) --- PASS: TestMemberFromString/sha256_3 (0.00s) --- PASS: TestMemberFromString/sha1_1 (0.00s) --- PASS: TestMemberFromString/sha1_2 (0.00s) --- PASS: TestMemberFromString/sha1_3 (0.00s) --- PASS: TestMemberFromString/md5_1 (0.00s) --- PASS: TestMemberFromString/md5_2 (0.00s) --- PASS: TestMemberFromString/md5_3 (0.00s) === RUN TestFromString === RUN TestFromString/sha256 === RUN TestFromString/sha1 === RUN TestFromString/md5 === RUN TestFromString/unknown --- PASS: TestFromString (0.00s) --- PASS: TestFromString/sha256 (0.00s) --- PASS: TestFromString/sha1 (0.00s) --- PASS: TestFromString/md5 (0.00s) --- PASS: TestFromString/unknown (0.00s) PASS ok k8s.io/kops/util/pkg/hashing 0.005s === RUN TestKeys --- PASS: TestKeys (0.00s) === RUN TestSortedKeys --- PASS: TestSortedKeys (0.00s) PASS ok k8s.io/kops/util/pkg/maps 0.004s === RUN TestGetProxyEnvVars W0611 09:18:46.641823 62590 proxy.go:34] EgressProxy set but no proxy host provided --- PASS: TestGetProxyEnvVars (0.00s) PASS ok k8s.io/kops/util/pkg/proxy 0.023s === RUN TestSet === RUN TestSet/simple_setting === RUN TestSet/setting_with_wildcard === RUN TestSet/creating_missing_objects === RUN TestSet/set_int === RUN TestSet/set_int32 === RUN TestSet/set_int64 === RUN TestSet/set_int_pointer === RUN TestSet/set_int32_pointer === RUN TestSet/set_int64_pointer === RUN TestSet/set_enum === RUN TestSet/set_enum_slice === RUN TestSet/append_enum_slice === RUN TestSet/set_env_var === RUN TestSet/set_env_var_with_val === RUN TestSet/set_duration --- PASS: TestSet (0.00s) --- PASS: TestSet/simple_setting (0.00s) --- PASS: TestSet/setting_with_wildcard (0.00s) --- PASS: TestSet/creating_missing_objects (0.00s) --- PASS: TestSet/set_int (0.00s) --- PASS: TestSet/set_int32 (0.00s) --- PASS: TestSet/set_int64 (0.00s) --- PASS: TestSet/set_int_pointer (0.00s) --- PASS: TestSet/set_int32_pointer (0.00s) --- PASS: TestSet/set_int64_pointer (0.00s) --- PASS: TestSet/set_enum (0.00s) --- PASS: TestSet/set_enum_slice (0.00s) --- PASS: TestSet/append_enum_slice (0.00s) --- PASS: TestSet/set_env_var (0.00s) --- PASS: TestSet/set_env_var_with_val (0.00s) --- PASS: TestSet/set_duration (0.00s) === RUN TestSetInvalidPath === RUN TestSetInvalidPath/setting_with_wildcard === RUN TestSetInvalidPath/creating_missing_objects === RUN TestSetInvalidPath/set_int === RUN TestSetInvalidPath/set_int32 === RUN TestSetInvalidPath/set_int64 --- PASS: TestSetInvalidPath (0.00s) --- PASS: TestSetInvalidPath/setting_with_wildcard (0.00s) --- PASS: TestSetInvalidPath/creating_missing_objects (0.00s) --- PASS: TestSetInvalidPath/set_int (0.00s) --- PASS: TestSetInvalidPath/set_int32 (0.00s) --- PASS: TestSetInvalidPath/set_int64 (0.00s) === RUN TestUnset === RUN TestUnset/simple_unsetting === RUN TestUnset/unsetting_with_wildcard === RUN TestUnset/uset_int === RUN TestUnset/unset_int32 === RUN TestUnset/unset_int64 === RUN TestUnset/unset_int_pointer === RUN TestUnset/unset_int32_pointer === RUN TestUnset/unset_int64_pointer === RUN TestUnset/unset_enum === RUN TestUnset/unset_enum_slice --- PASS: TestUnset (0.00s) --- PASS: TestUnset/simple_unsetting (0.00s) --- PASS: TestUnset/unsetting_with_wildcard (0.00s) --- PASS: TestUnset/uset_int (0.00s) --- PASS: TestUnset/unset_int32 (0.00s) --- PASS: TestUnset/unset_int64 (0.00s) --- PASS: TestUnset/unset_int_pointer (0.00s) --- PASS: TestUnset/unset_int32_pointer (0.00s) --- PASS: TestUnset/unset_int64_pointer (0.00s) --- PASS: TestUnset/unset_enum (0.00s) --- PASS: TestUnset/unset_enum_slice (0.00s) === RUN TestUnsetInvalidPath === RUN TestUnsetInvalidPath/usetting_with_wildcard === RUN TestUnsetInvalidPath/missing_objects --- PASS: TestUnsetInvalidPath (0.00s) --- PASS: TestUnsetInvalidPath/usetting_with_wildcard (0.00s) --- PASS: TestUnsetInvalidPath/missing_objects (0.00s) === RUN TestParseFieldPath === RUN TestParseFieldPath/test_Spec.Containers.Image === RUN TestParseFieldPath/test_Spec.Containers[0].Image === RUN TestParseFieldPath/test_Spec.Containers[*].Image --- PASS: TestParseFieldPath (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers.Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[0].Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[*].Image (0.00s) === RUN Test_Merge --- PASS: Test_Merge (0.00s) PASS ok k8s.io/kops/util/pkg/reflectutils 0.031s === RUN TestGetUniqueStrings --- PASS: TestGetUniqueStrings (0.00s) === RUN TestContains --- PASS: TestContains (0.00s) PASS ok k8s.io/kops/util/pkg/slice 0.004s === RUN TestSplitToSections --- PASS: TestSplitToSections (0.00s) PASS ok k8s.io/kops/util/pkg/text 0.004s === RUN TestAzureBlobPathBase === RUN TestAzureBlobPathBase/Test_case_0 === RUN TestAzureBlobPathBase/Test_case_1 === RUN TestAzureBlobPathBase/Test_case_2 --- PASS: TestAzureBlobPathBase (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_2 (0.00s) === RUN TestAzureBlobPathPath === RUN TestAzureBlobPathPath/Test_case_0 === RUN TestAzureBlobPathPath/Test_case_1 === RUN TestAzureBlobPathPath/Test_case_2 --- PASS: TestAzureBlobPathPath (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_2 (0.00s) === RUN TestAzureBlobPathJoin --- PASS: TestAzureBlobPathJoin (0.00s) === RUN TestCreateFile --- PASS: TestCreateFile (0.00s) === RUN TestWriteTo --- PASS: TestWriteTo (0.00s) === RUN TestMemFsCreateFile --- PASS: TestMemFsCreateFile (0.00s) === RUN TestMemFsReadDir --- PASS: TestMemFsReadDir (0.00s) === RUN TestMemFsReadTree --- PASS: TestMemFsReadTree (0.00s) === RUN Test_VFSPath --- PASS: Test_VFSPath (0.00s) === RUN Test_S3Path_Parse --- PASS: Test_S3Path_Parse (0.00s) PASS ok k8s.io/kops/util/pkg/vfs 0.027s === RUN TestGSRenderTerraform === RUN TestGSRenderTerraform/gs://foo/bar --- PASS: TestGSRenderTerraform (0.00s) --- PASS: TestGSRenderTerraform/gs://foo/bar (0.00s) === RUN TestS3RenderTerraform === RUN TestS3RenderTerraform/s3://foo/bar W0611 09:18:49.407389 62694 s3context.go:235] Unable to read bucket encryption policy for "foo" in region "us-east-1": will encrypt using AES256 --- PASS: TestS3RenderTerraform (0.00s) --- PASS: TestS3RenderTerraform/s3://foo/bar (0.00s) PASS ok k8s.io/kops/util/pkg/vfs/tests 0.059s >>> kops: Entering fakeroot... >>> kops*: Running postcheck for kops >>> kops*: Preparing package kops... >>> kops*: Stripping binaries >>> kops*: Scanning shared objects >>> kops*: Tracing dependencies... >>> kops*: Package size: 147.7 MB >>> kops*: Compressing data... >>> kops*: Create checksum... >>> kops*: Create kops-1.28.4-r4.apk >>> kops: Build complete at Tue, 11 Jun 2024 09:21:31 +0000 elapsed time 0h 6m 17s >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Uninstalling dependencies... (1/5) Purging .makedepends-kops (20240611.091516) (2/5) Purging kubernetes (1.30.1-r0) (3/5) Purging go (1.22.4-r1) (4/5) Purging bash (5.2.26-r0) Executing bash-5.2.26-r0.pre-deinstall (5/5) Purging readline (8.2.10-r0) Executing busybox-1.36.1-r31.trigger OK: 378 MiB in 107 packages >>> kops: Updating the testing/x86_64 repository index... >>> kops: Signing the index...