>>> kops: Building testing/kops 1.28.4-r5 (using abuild 3.13.0-r3) started Wed, 03 Jul 2024 20:23:12 +0000 >>> kops: Checking sanity of /home/buildozer/aports/testing/kops/APKBUILD... >>> kops: Analyzing dependencies... >>> kops: Installing for build: build-base kubernetes go bash (1/5) Installing kubernetes (1.30.2-r1) (2/5) Installing go (1.22.5-r0) (3/5) Installing readline (8.2.10-r0) (4/5) Installing bash (5.2.26-r0) Executing bash-5.2.26-r0.post-install (5/5) Installing .makedepends-kops (20240703.202314) Executing busybox-1.36.1-r31.trigger OK: 563 MiB in 112 packages >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Cleaning up tmpdir >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 32.7M 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32.7M 100 32.7M 0 0 23.1M 0 0:00:01 0:00:01 --:--:-- 23.1M >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz >>> kops: Checking sha512sums... kops-1.28.4.tar.gz: OK >>> kops: Unpacking /var/cache/distfiles/edge/kops-1.28.4.tar.gz... fatal: not a git repository (or any of the parent directories): .git mkdir -p /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64 GOOS=linux GOARCH=amd64 go build "-trimpath" -o /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64/kops -ldflags=all=" -X k8s.io/kops.Version=1.28.4 -X k8s.io/kops.GitVersion=" k8s.io/kops/cmd/kops go: downloading github.com/aws/aws-sdk-go v1.49.24 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading github.com/spf13/cobra v1.7.0 go: downloading k8s.io/apimachinery v0.28.1 go: downloading github.com/spf13/viper v1.16.0 go: downloading go.uber.org/multierr v1.11.0 go: downloading github.com/google/go-containerregistry v0.16.1 go: downloading k8s.io/api v0.28.1 go: downloading github.com/spf13/pflag v1.0.5 go: downloading golang.org/x/crypto v0.14.0 go: downloading github.com/aws/amazon-ec2-instance-selector/v2 v2.4.1 go: downloading helm.sh/helm/v3 v3.12.3 go: downloading k8s.io/klog/v2 v2.100.1 go: downloading sigs.k8s.io/yaml v1.3.0 go: downloading k8s.io/client-go v0.28.1 go: downloading k8s.io/cli-runtime v0.28.1 go: downloading k8s.io/kubectl v0.28.1 go: downloading github.com/cert-manager/cert-manager v1.12.3 go: downloading github.com/scaleway/scaleway-sdk-go v1.0.0-beta.20.0.20230829075301-d16b548612e4 go: downloading github.com/MakeNowJust/heredoc/v2 v2.0.1 go: downloading github.com/Masterminds/sprig/v3 v3.2.3 go: downloading github.com/MakeNowJust/heredoc v1.0.0 go: downloading golang.org/x/net v0.17.0 go: downloading k8s.io/klog v1.0.0 go: downloading github.com/apparentlymart/go-cidr v1.1.0 go: downloading golang.org/x/sync v0.3.0 go: downloading k8s.io/cloud-provider-aws v1.28.1 go: downloading github.com/Azure/azure-pipeline-go v0.2.3 go: downloading github.com/Azure/azure-storage-blob-go v0.15.0 go: downloading github.com/go-ini/ini v1.67.0 go: downloading github.com/gophercloud/gophercloud v1.6.0 go: downloading github.com/pkg/sftp v1.13.6 go: downloading golang.org/x/oauth2 v0.11.0 go: downloading google.golang.org/api v0.138.0 go: downloading github.com/sergi/go-diff v1.3.1 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/Masterminds/goutils v1.1.1 go: downloading github.com/huandu/xstrings v1.4.0 go: downloading github.com/google/uuid v1.3.1 go: downloading github.com/Masterminds/semver/v3 v3.2.1 go: downloading github.com/imdario/mergo v0.3.15 go: downloading github.com/mitchellh/copystructure v1.2.0 go: downloading github.com/shopspring/decimal v1.3.1 go: downloading github.com/spf13/cast v1.5.1 go: downloading github.com/fsnotify/fsnotify v1.6.0 go: downloading github.com/mitchellh/mapstructure v1.5.0 go: downloading github.com/spf13/afero v1.9.5 go: downloading github.com/spf13/jwalterweatherman v1.1.0 go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/go-logr/logr v1.2.4 go: downloading github.com/pelletier/go-toml v1.9.5 go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b go: downloading github.com/digitalocean/godo v1.102.1 go: downloading github.com/hetznercloud/hcloud-go v1.50.0 go: downloading github.com/Azure/go-autorest/autorest v0.11.29 go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.12 go: downloading k8s.io/mount-utils v0.28.1 go: downloading github.com/Azure/go-autorest v14.2.0+incompatible go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/evanphx/json-patch v5.6.0+incompatible go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.3.0 go: downloading github.com/google/gofuzz v1.2.0 go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/docker/cli v24.0.5+incompatible go: downloading github.com/pkg/errors v0.9.1 go: downloading google.golang.org/grpc v1.57.0 go: downloading github.com/spotinst/spotinst-sdk-go v1.145.0 go: downloading github.com/mattn/go-ieproxy v0.0.1 go: downloading golang.org/x/sys v0.13.0 go: downloading gopkg.in/gcfg.v1 v1.2.3 go: downloading k8s.io/cloud-provider v0.28.0 go: downloading k8s.io/component-base v0.28.1 go: downloading k8s.io/csi-translation-lib v0.28.0 go: downloading github.com/chai2010/gettext-go v1.0.2 go: downloading github.com/mitchellh/go-wordwrap v1.0.1 go: downloading github.com/russross/blackfriday/v2 v2.1.0 go: downloading github.com/kr/fs v0.1.0 go: downloading golang.org/x/exp v0.0.0-20230817173708-d852ddb80c63 go: downloading gopkg.in/square/go-jose.v2 v2.6.0 go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 go: downloading golang.org/x/time v0.3.0 go: downloading golang.org/x/term v0.13.0 go: downloading github.com/golang/protobuf v1.5.3 go: downloading github.com/google/gnostic-models v0.6.8 go: downloading github.com/mitchellh/reflectwalk v1.0.2 go: downloading github.com/subosito/gotenv v1.4.2 go: downloading github.com/hashicorp/hcl v1.0.0 go: downloading gopkg.in/ini.v1 v1.67.0 go: downloading github.com/magiconair/properties v1.8.7 go: downloading github.com/pelletier/go-toml/v2 v2.0.8 go: downloading cloud.google.com/go/compute/metadata v0.2.3 go: downloading k8s.io/cloud-provider-gcp/providers v0.27.1 go: downloading golang.org/x/text v0.13.0 go: downloading cloud.google.com/go/compute v1.23.0 go: downloading github.com/google/go-querystring v1.1.0 go: downloading github.com/hashicorp/go-retryablehttp v0.7.4 go: downloading github.com/charmbracelet/bubbles v0.13.0 go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible go: downloading github.com/charmbracelet/bubbletea v0.21.0 go: downloading github.com/charmbracelet/lipgloss v0.5.0 go: downloading github.com/evertras/bubble-table v0.14.4 go: downloading github.com/muesli/termenv v0.11.1-0.20220212125758-44cd13922739 go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.22 go: downloading github.com/Azure/go-autorest/logger v0.2.1 go: downloading github.com/Azure/go-autorest/tracing v0.6.0 go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.5 go: downloading github.com/dimchansky/utfbom v1.1.1 go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de go: downloading sigs.k8s.io/kustomize/api v0.13.5-0.20230601165947-6ce0bf390ce3 go: downloading sigs.k8s.io/kustomize/kyaml v0.14.3-0.20230601165947-6ce0bf390ce3 go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading github.com/moby/sys/mountinfo v0.6.2 go: downloading github.com/prometheus/client_golang v1.16.0 go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/docker/distribution v2.8.2+incompatible go: downloading github.com/containerd/stargz-snapshotter/estargz v0.14.3 go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading github.com/docker/docker v24.0.5+incompatible go: downloading google.golang.org/protobuf v1.31.0 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20230807174057-1744710a1577 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading k8s.io/component-helpers v0.28.1 go: downloading github.com/moby/term v0.0.0-20221205130635-1aeaba878587 go: downloading github.com/prometheus/client_model v0.4.0 go: downloading github.com/prometheus/procfs v0.10.1 go: downloading k8s.io/apiextensions-apiserver v0.28.0 go: downloading sigs.k8s.io/gateway-api v0.7.0 go: downloading github.com/google/go-cmp v0.5.9 go: downloading github.com/GoogleCloudPlatform/k8s-cloud-provider v1.18.1-0.20220218231025-f11817397a1b go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 go: downloading github.com/oliveagle/jsonpath v0.0.0-20180606110733-2e52cf6e6852 go: downloading github.com/muesli/reflow v0.3.0 go: downloading github.com/sahilm/fuzzy v0.1.0 go: downloading github.com/mattn/go-runewidth v0.0.13 go: downloading github.com/lucasb-eyer/go-colorful v1.2.0 go: downloading github.com/atotto/clipboard v0.1.4 go: downloading github.com/containerd/console v1.0.3 go: downloading github.com/mattn/go-isatty v0.0.17 go: downloading github.com/muesli/ansi v0.0.0-20211018074035-2e021307bc4b go: downloading github.com/muesli/cancelreader v0.2.0 go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 go: downloading github.com/go-openapi/jsonreference v0.20.2 go: downloading github.com/go-openapi/swag v0.22.3 go: downloading github.com/google/btree v1.0.1 go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.2.0 go: downloading github.com/prometheus/common v0.44.0 go: downloading github.com/opencontainers/image-spec v1.1.0-rc4 go: downloading github.com/klauspost/compress v1.16.5 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading github.com/vbatts/tar-split v0.11.3 go: downloading github.com/containerd/containerd v1.7.5 go: downloading oras.land/oras-go v1.2.4-0.20230829103011-4d0bf161925b go: downloading github.com/docker/docker-credential-helpers v0.8.0 go: downloading github.com/exponent-io/jsonpath v0.0.0-20151013193312-d6023ce2651d go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/googleapis/gax-go/v2 v2.12.0 go: downloading github.com/rivo/uniseg v0.2.0 go: downloading github.com/go-errors/errors v1.4.2 go: downloading github.com/go-openapi/jsonpointer v0.19.6 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/emicklei/go-restful/v3 v3.10.2 go: downloading github.com/google/s2a-go v0.1.5 go: downloading go.opencensus.io v0.24.0 go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 go: downloading github.com/xlab/treeprint v1.2.0 go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading github.com/docker/go-units v0.5.0 go: downloading github.com/moby/spdystream v0.2.0 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.2.5 go: downloading github.com/morikuni/aec v1.0.0 go: downloading google.golang.org/appengine v1.6.7 go: downloading go.starlark.net v0.0.0-20230525235612-a134d8f9ddca go: downloading github.com/gorilla/mux v1.8.0 go: downloading github.com/docker/go-metrics v0.0.1 go: downloading github.com/jmespath/go-jmespath v0.4.0 go: downloading go.opentelemetry.io/otel v1.15.0 go: downloading go.opentelemetry.io/otel/trace v1.15.0 go: downloading github.com/moby/locker v1.0.1 go: downloading github.com/go-logr/stdr v1.2.2 go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.1 fatal: not a git repository (or any of the parent directories): .git go test -v ./... go: downloading sigs.k8s.io/controller-runtime v0.16.1 go: downloading github.com/stretchr/testify v1.8.4 go: downloading github.com/jacksontj/memberlistmesh v0.0.0-20190905163944-93462b9d2bb7 go: downloading github.com/weaveworks/mesh v0.0.0-20191105120815-58dbcc3e8e63 go: downloading k8s.io/kubelet v0.28.1 go: downloading github.com/google/go-tpm-tools v0.4.0 go: downloading k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 go: downloading github.com/google/go-tpm v0.9.0 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading github.com/hashicorp/go-sockaddr v1.0.2 go: downloading github.com/hashicorp/memberlist v0.3.1 go: downloading github.com/oklog/ulid v1.3.1 go: downloading golang.org/x/tools v0.12.1-0.20230815132531-74c255bcf846 go: downloading github.com/armon/go-metrics v0.4.0 go: downloading github.com/hashicorp/go-msgpack v0.5.3 go: downloading github.com/hashicorp/go-multierror v1.1.1 go: downloading github.com/miekg/dns v1.1.50 go: downloading github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529 go: downloading github.com/hashicorp/errwrap v1.1.0 go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 go: downloading github.com/hashicorp/golang-lru v0.5.4 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading github.com/evanphx/json-patch/v5 v5.6.0 go: downloading github.com/google/go-sev-guest v0.6.1 go: downloading github.com/pborman/uuid v1.2.0 go: downloading github.com/google/logger v1.1.1 go: downloading golang.org/x/mod v0.12.0 ? k8s.io/kops [no test files] ? k8s.io/kops/channels/cmd/channels [no test files] ? k8s.io/kops/channels/pkg/api [no test files] ? k8s.io/kops/cloudmock/aws/mockautoscaling [no test files] ? k8s.io/kops/cloudmock/aws/mockec2 [no test files] ? k8s.io/kops/cloudmock/aws/mockelbv2 [no test files] ? k8s.io/kops/cloudmock/aws/mockiam [no test files] ? k8s.io/kops/cloudmock/aws/mockroute53 [no test files] ? k8s.io/kops/cloudmock/aws/mocksqs [no test files] ? k8s.io/kops/cloudmock/aws/mockeventbridge [no test files] ? k8s.io/kops/cloudmock/gce [no test files] ? k8s.io/kops/cloudmock/gce/gcphttp [no test files] ? k8s.io/kops/cloudmock/gce/mockcloudresourcemanager [no test files] ? k8s.io/kops/cloudmock/openstack/mockcompute [no test files] ? k8s.io/kops/cloudmock/gce/mockcompute [no test files] ? k8s.io/kops/cloudmock/aws/mockelb [no test files] ? k8s.io/kops/cloudmock/gce/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack [no test files] ? k8s.io/kops/cloudmock/openstack/mockblockstorage [no test files] ? k8s.io/kops/cloudmock/gce/mockstorage [no test files] ? k8s.io/kops/cloudmock/openstack/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack/mockimage [no test files] ? k8s.io/kops/cloudmock/openstack/mockloadbalancer [no test files] ? k8s.io/kops/cloudmock/gce/mockiam [no test files] ? k8s.io/kops/cloudmock/openstack/mocknetworking [no test files] ? k8s.io/kops/cloudmock/scaleway/mockdns [no test files] === RUN Test_Filtering --- PASS: Test_Filtering (0.00s) === RUN Test_Replacement --- PASS: Test_Replacement (0.00s) === RUN Test_GetRequiredUpdates --- PASS: Test_GetRequiredUpdates (0.00s) === RUN Test_NeedsRollingUpdate I0703 20:24:46.233739 35252 addon.go:250] addon test wants to update all nodes I0703 20:24:46.234803 35252 addon.go:250] addon test wants to update workers nodes I0703 20:24:46.234980 35252 addon.go:250] addon test wants to update control-plane nodes --- PASS: Test_NeedsRollingUpdate (0.00s) === RUN Test_InstallPKI I0703 20:24:46.235166 35252 addon.go:283] installing PKI for "test" I0703 20:24:46.665533 35252 addon.go:283] installing PKI for "test" --- PASS: Test_InstallPKI (0.54s) === RUN Test_IsPKIInstalled --- PASS: Test_IsPKIInstalled (0.00s) PASS ok k8s.io/kops/channels/pkg/channels 0.573s === RUN TestGetUpdates --- PASS: TestGetUpdates (0.00s) PASS ok k8s.io/kops/channels/pkg/cmd 0.042s ? k8s.io/kops/cmd/kops/util [no test files] ? k8s.io/kops/cmd/kops-controller/controllers [no test files] ? k8s.io/kops/cmd/kops-controller [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/config [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/server [no test files] ? k8s.io/kops/cmd/kops-utils-cp [no test files] ? k8s.io/kops/cmd/nodeup [no test files] ? k8s.io/kops/dns-controller/cmd/dns-controller [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/interfaces [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/rrstype [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/tests [no test files] ? k8s.io/kops/examples/kops-api-example [no test files] ? k8s.io/kops/nodeup/pkg/model/networking [no test files] ? k8s.io/kops/nodeup/pkg/model/resources [no test files] ? k8s.io/kops/pkg/acls [no test files] ? k8s.io/kops/pkg/acls/gce [no test files] ? k8s.io/kops/pkg/apis/kops/registry [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/apis/nodeup [no test files] ? k8s.io/kops/pkg/applylib [no test files] ? k8s.io/kops/pkg/applylib/mocks [no test files] ? k8s.io/kops/pkg/applylib/mocks/mockkubeapiserver [no test files] ? k8s.io/kops/pkg/bootstrap [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/simple [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/fake [no test files] ? k8s.io/kops/pkg/client/simple/api [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset [no test files] ? k8s.io/kops/pkg/clouds [no test files] ? k8s.io/kops/pkg/clusteraddons [no test files] ? k8s.io/kops/pkg/commands/commandutils [no test files] ? k8s.io/kops/pkg/configserver [no test files] ? k8s.io/kops/pkg/dump [no test files] ? k8s.io/kops/pkg/kopscontrollerclient [no test files] ? k8s.io/kops/pkg/kubemanifest [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awscloudcontrollermanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsebscsidriver [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsloadbalancercontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/certmanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/clusterautoscaler [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/dnscontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/externaldns [no test files] ? k8s.io/kops/pkg/model/domodel [no test files] ? k8s.io/kops/pkg/model/gcemodel [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/nodeterminationhandler [no test files] ? k8s.io/kops/pkg/model/components/kopscontroller [no test files] ? k8s.io/kops/pkg/model/hetznermodel [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/kuberouter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/karpenter [no test files] ? k8s.io/kops/pkg/model/scalewaymodel [no test files] ? k8s.io/kops/pkg/nodeidentity/scaleway [no test files] ? k8s.io/kops/pkg/nodeidentity [no test files] ? k8s.io/kops/pkg/nodeidentity/aws [no test files] ? k8s.io/kops/pkg/nodeidentity/do [no test files] ? k8s.io/kops/pkg/nodeidentity/gce [no test files] ? k8s.io/kops/pkg/nodeidentity/hetzner [no test files] ? k8s.io/kops/pkg/mutexes [no test files] ? k8s.io/kops/pkg/nodeidentity/openstack [no test files] ? k8s.io/kops/pkg/rbac [no test files] ? k8s.io/kops/pkg/resources [no test files] ? k8s.io/kops/pkg/resolver [no test files] ? k8s.io/kops/pkg/resources/digitalocean [no test files] ? k8s.io/kops/pkg/resources/hetzner [no test files] ? k8s.io/kops/pkg/templates [no test files] ? k8s.io/kops/pkg/resources/ops [no test files] ? k8s.io/kops/pkg/testutils [no test files] ? k8s.io/kops/pkg/resources/scaleway [no test files] ? k8s.io/kops/pkg/testutils/golden [no test files] ? k8s.io/kops/pkg/testutils/testcontext [no test files] ? k8s.io/kops/pkg/sshcredentials [no test files] ? k8s.io/kops/pkg/tokens [no test files] ? k8s.io/kops/pkg/resources/spotinst [no test files] ? k8s.io/kops/pkg/try [no test files] ? k8s.io/kops/pkg/resources/openstack [no test files] ? k8s.io/kops/pkg/values [no test files] ? k8s.io/kops/pkg/wellknownoperators [no test files] ? k8s.io/kops/pkg/wellknownports [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns [no test files] ? k8s.io/kops/pkg/zones [no test files] ? k8s.io/kops/proto/kops/bootstrap/v1 [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns/provider [no test files] ? k8s.io/kops/protokube/pkg/gossip/do [no test files] ? k8s.io/kops/protokube/pkg/gossip/hetzner [no test files] ? k8s.io/kops/protokube/pkg/gossip/aws [no test files] ? k8s.io/kops/protokube/pkg/gossip/memberlist [no test files] ? k8s.io/kops/protokube/pkg/gossip/mesh [no test files] ? k8s.io/kops/protokube/pkg/gossip/openstack [no test files] ? k8s.io/kops/protokube/pkg/etcd [no test files] ? k8s.io/kops/pkg/wellknownusers [no test files] ? k8s.io/kops/protokube/cmd/protokube [no test files] ? k8s.io/kops/protokube/pkg/gossip [no test files] ? k8s.io/kops/tests/fuzz [no test files] ? k8s.io/kops/protokube/pkg/gossip/scaleway [no test files] ? k8s.io/kops/protokube/pkg/protokube [no test files] ? k8s.io/kops/tests/integration/channel/simple [no test files] ? k8s.io/kops/upup/models [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/bootstrapchannelbuilder [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcediscovery [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcemetadata [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/do [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmsigner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmverifier [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetzner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetznertasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/scalewaytasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/spotinsttasks [no test files] ? k8s.io/kops/upup/pkg/fi/loader [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/install [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/local [no test files] ? k8s.io/kops/upup/pkg/fi/secrets [no test files] ? k8s.io/kops/upup/tools/generators/fitask [no test files] ? k8s.io/kops/util/pkg/architectures [no test files] ? k8s.io/kops/util/pkg/env [no test files] ? k8s.io/kops/util/pkg/mirrors [no test files] ? k8s.io/kops/util/pkg/tables [no test files] ? k8s.io/kops/util/pkg/ui [no test files] === RUN TestCreateClusterMinimal I0703 20:24:47.513927 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.514102 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.514129 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.514157 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.514191 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.514234 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.514262 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.514273 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.514302 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.514322 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.519148 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.519190 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.556850 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:47.556980 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:47.557244 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:47.565629 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.565734 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.565752 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.565772 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.565787 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.565814 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.565833 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.565842 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.565856 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.565869 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.568504 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.568540 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.623114 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:47.623337 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:47.623696 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:47.629862 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.630001 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.630026 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.630055 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.630082 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.630112 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.630140 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.630159 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.630184 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.630201 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.634128 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.634192 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.666510 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:47.666672 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:47.666977 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:47.672673 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.672792 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.672814 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.672839 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.672859 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.672885 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.672913 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.672927 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.672948 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.672963 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.717563 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.717616 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.746266 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:47.746379 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:47.746594 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:47.752121 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.752216 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.752234 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.752257 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.752274 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.752294 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.752313 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.752323 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.752340 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.752351 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.755123 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.755156 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.799258 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:47.799413 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:47.799792 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:47.804745 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.804855 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.804877 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.804900 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.804918 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.804943 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.804965 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.804977 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.805000 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.805015 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.807581 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.807611 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.834156 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:47.834283 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:47.834537 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:47.840216 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.840305 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.840324 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.840346 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.840361 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.840381 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.840399 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.840408 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.840423 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.840434 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.842952 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.842983 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.872610 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:47.872731 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:47.872960 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterMinimal (0.36s) === RUN TestCreateClusterHetzner I0703 20:24:47.878536 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.878652 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.878672 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.878695 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.878710 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.878732 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.878751 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.878761 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.878777 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.878790 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.881705 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.881743 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0703 20:24:47.913342 36200 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0703 20:24:47.913372 36200 new_cluster.go:1373] Cloud Provider ID: "hetzner" I0703 20:24:47.917993 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.918082 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.918102 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.918132 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.918157 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.918191 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.918219 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.918236 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.918261 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.918280 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.920722 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.920749 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.946265 36200 new_cluster.go:1373] Cloud Provider ID: "hetzner" --- PASS: TestCreateClusterHetzner (0.07s) === RUN TestCreateClusterOpenStack I0703 20:24:47.951649 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.951775 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.951800 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.951830 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.951852 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.951880 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.951916 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.951931 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.951953 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.951972 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.954565 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.954594 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0703 20:24:47.975595 36200 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0703 20:24:47.975623 36200 new_cluster.go:1373] Cloud Provider ID: "openstack" I0703 20:24:47.977098 36200 subnets.go:224] Assigned CIDR 10.0.0.0/16 to subnet us-test1 --- PASS: TestCreateClusterOpenStack (0.03s) === RUN TestCreateClusterOpenStackOctavia I0703 20:24:47.984734 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:47.984853 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:47.984881 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:47.984903 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:47.984918 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:47.984938 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:47.984958 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:47.984968 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:47.984984 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:47.984997 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:47.987445 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:47.987471 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0703 20:24:48.003914 36200 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0703 20:24:48.003942 36200 new_cluster.go:1373] Cloud Provider ID: "openstack" I0703 20:24:48.005292 36200 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0703 20:24:48.005306 36200 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackOctavia (0.03s) === RUN TestCreateClusterOpenStackNoDNS I0703 20:24:48.010236 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.010344 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.010363 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.010386 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.010404 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.010426 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.010446 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.010456 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.010472 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.010484 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.012860 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.012892 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0703 20:24:48.030240 36200 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0703 20:24:48.030274 36200 new_cluster.go:1373] Cloud Provider ID: "openstack" I0703 20:24:48.030310 36200 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0703 20:24:48.030323 36200 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackNoDNS (0.03s) === RUN TestCreateClusterCilium I0703 20:24:48.036617 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.036730 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.036752 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.036777 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.036795 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.036817 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.036838 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.036850 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.036866 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.036879 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.087007 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.087054 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.116000 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.116177 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:48.116486 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterCilium (0.09s) === RUN TestCreateClusterOverride I0703 20:24:48.121798 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.121892 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.121908 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.121930 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.121945 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.121962 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.121979 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.121989 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.122003 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.122015 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.124398 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.124434 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.159082 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.160138 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:48.160686 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterOverride (0.05s) === RUN TestCreateClusterKubernetesFeatureGates I0703 20:24:48.167444 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.167604 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.167630 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.167659 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.167680 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.167707 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.167737 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.167751 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.167772 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.167793 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.171293 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.171330 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.228358 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.228491 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:48.228789 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKubernetesFeatureGates (0.07s) === RUN TestCreateClusterComplex I0703 20:24:48.233585 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.233698 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.233717 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.233738 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.233755 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.233776 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.233795 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.233805 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.233822 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.233834 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.236637 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.236674 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.279506 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.279785 36200 subnets.go:224] Assigned CIDR 10.0.0.0/18 to subnet us-test-1a I0703 20:24:48.279799 36200 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1b I0703 20:24:48.279806 36200 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1c I0703 20:24:48.280105 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplex (0.05s) === RUN TestCreateClusterComplexPrivate I0703 20:24:48.288344 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.288450 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.288471 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.288493 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.288510 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.288539 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.288567 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.288579 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.288597 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.288610 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.291507 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.291539 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.373670 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.374293 36200 subnets.go:205] Assigned CIDR 10.0.0.0/21 to subnet utility-us-test-1a I0703 20:24:48.374311 36200 subnets.go:205] Assigned CIDR 10.0.8.0/21 to subnet utility-us-test-1a-1 I0703 20:24:48.374323 36200 subnets.go:205] Assigned CIDR 10.0.16.0/21 to subnet utility-us-test-1a-4 I0703 20:24:48.374336 36200 subnets.go:205] Assigned CIDR 10.0.24.0/21 to subnet utility-us-test-1b I0703 20:24:48.374350 36200 subnets.go:205] Assigned CIDR 10.0.32.0/21 to subnet utility-us-test-1b-2 I0703 20:24:48.374359 36200 subnets.go:205] Assigned CIDR 10.0.40.0/21 to subnet utility-us-test-1c I0703 20:24:48.374371 36200 subnets.go:205] Assigned CIDR 10.0.48.0/21 to subnet utility-us-test-1c-3 I0703 20:24:48.374387 36200 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1a I0703 20:24:48.374400 36200 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1b I0703 20:24:48.374410 36200 subnets.go:224] Assigned CIDR 10.0.192.0/18 to subnet us-test-1c I0703 20:24:48.374976 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplexPrivate (0.10s) === RUN TestCreateClusterHA I0703 20:24:48.387649 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.387800 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.387830 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.387872 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.387896 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.387927 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.387960 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.387978 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.388011 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.388027 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.392064 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.392109 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.429824 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.430105 36200 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0703 20:24:48.430118 36200 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0703 20:24:48.430127 36200 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0703 20:24:48.430406 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:48.437082 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.437188 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.437207 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.437236 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.437254 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.437277 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.437299 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.437310 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.437328 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.437342 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.440546 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.440582 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.474229 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.474489 36200 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0703 20:24:48.474506 36200 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0703 20:24:48.474512 36200 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0703 20:24:48.474760 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHA (0.10s) === RUN TestCreateClusterMinimalGCE I0703 20:24:48.483411 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.483525 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.483543 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.483565 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.483580 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.483601 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.483621 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.483633 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.483649 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.483662 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.486765 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.486793 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.504032 36200 new_cluster.go:1373] Cloud Provider ID: "gce" I0703 20:24:48.504113 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 I0703 20:24:48.507835 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.507935 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.507950 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.507967 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.507988 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.508017 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.508034 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.508045 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.508061 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.508071 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.510760 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.510812 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.576121 36200 new_cluster.go:1373] Cloud Provider ID: "gce" I0703 20:24:48.576207 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterMinimalGCE (0.10s) === RUN TestCreateClusterHAGCE I0703 20:24:48.581151 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.581283 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.581305 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.581327 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.581345 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.581371 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.581393 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.581406 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.581425 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.581440 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.584270 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.584308 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.611485 36200 new_cluster.go:1373] Cloud Provider ID: "gce" I0703 20:24:48.611607 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterHAGCE (0.04s) === RUN TestCreateClusterGCE I0703 20:24:48.617877 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.617997 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.618018 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.618039 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.618056 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.618078 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.618101 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.618114 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.618132 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.618149 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.621076 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.621106 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.641310 36200 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0703 20:24:48.641377 36200 new_cluster.go:1373] Cloud Provider ID: "gce" I0703 20:24:48.641443 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterGCE (0.03s) === RUN TestCreateClusterHASharedZone I0703 20:24:48.651445 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.651640 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.651674 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.651715 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.651747 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.651787 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.651820 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.651849 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.651880 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.651902 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.656702 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.656744 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0703 20:24:48.744276 36200 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0703 20:24:48.744326 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.744650 36200 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0703 20:24:48.745013 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZone (0.10s) === RUN TestCreateClusterHASharedZones I0703 20:24:48.752983 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.753167 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.753196 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.753226 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.753250 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.753284 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.753312 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.753330 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.753358 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.753378 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.761690 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.761750 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0703 20:24:48.807943 36200 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0703 20:24:48.807998 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.808357 36200 subnets.go:224] Assigned CIDR 172.20.0.0/17 to subnet us-test-1a I0703 20:24:48.808371 36200 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1b I0703 20:24:48.808678 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZones (0.06s) === RUN TestCreateClusterPrivate I0703 20:24:48.817592 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.817722 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.817743 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.817767 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.817785 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.817810 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.817831 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.817845 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.817867 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.817882 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.821329 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.821381 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.889324 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:48.889531 36200 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0703 20:24:48.889547 36200 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0703 20:24:48.889823 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:48.889856 36200 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterPrivate (0.08s) === RUN TestCreateClusterPrivateGCE I0703 20:24:48.901244 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.901443 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.901478 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.901526 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.901558 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.901597 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.901630 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.901652 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.901681 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.901704 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.906938 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.907002 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.968003 36200 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0703 20:24:48.968090 36200 new_cluster.go:1373] Cloud Provider ID: "gce" I0703 20:24:48.968194 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterPrivateGCE (0.07s) === RUN TestCreateClusterWithNGWSpecified I0703 20:24:48.975302 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:48.975450 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:48.975474 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:48.975502 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:48.975524 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:48.975552 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:48.975577 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:48.975592 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:48.975614 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:48.975630 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:48.979208 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:48.979249 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.009597 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:49.009828 36200 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0703 20:24:49.009845 36200 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0703 20:24:49.010122 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:49.010157 36200 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithNGWSpecified (0.04s) === RUN TestCreateClusterWithINGWSpecified I0703 20:24:49.016013 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.016133 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.016154 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.016178 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.016197 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.016229 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.016251 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.016264 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.016283 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.016297 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.019559 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.019600 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.070928 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:49.071117 36200 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0703 20:24:49.071131 36200 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0703 20:24:49.071397 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:49.071422 36200 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithINGWSpecified (0.06s) === RUN TestCreateClusterSharedVPC I0703 20:24:49.076759 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.076872 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.076899 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.076922 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.076942 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.076964 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.076988 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.077000 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.077019 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.077032 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.080523 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.080555 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.124614 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:49.124746 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.124781 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.124802 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.124812 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.124838 36200 subnets.go:224] Assigned CIDR 10.0.0.0/12 to subnet us-test-1a I0703 20:24:49.125046 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedVPC (0.05s) === RUN TestCreateClusterSharedSubnets I0703 20:24:49.131634 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.131739 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.131756 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.131774 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.131789 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.131807 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.131829 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.131838 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.131853 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.131865 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.135706 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.135731 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.157002 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.157038 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.157090 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:49.157180 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.157193 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.157206 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.157215 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.157435 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnets (0.03s) === RUN TestCreateClusterSharedSubnetsVpcLookup I0703 20:24:49.160969 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.161089 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.161106 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.161123 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.161140 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.161170 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.161187 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.161197 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.161212 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.161224 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.164559 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.164584 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.176051 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:24:49.176084 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.176096 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.176143 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:49.176228 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.176240 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.176253 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.176260 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.176426 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnetsVpcLookup (0.02s) === RUN TestCreateClusterPrivateSharedSubnets I0703 20:24:49.179806 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.179890 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.179905 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.179921 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.179933 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.179951 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.179967 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.179976 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.179988 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.179998 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.183755 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.183808 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.262984 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.263030 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.263070 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.263082 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.263137 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:49.263245 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.263260 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.263278 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:24:49.263287 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:24:49.263558 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterPrivateSharedSubnets (0.09s) === RUN TestCreateClusterIPv6 I0703 20:24:49.268084 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.268200 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.268219 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.268239 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.268256 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.268277 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.268297 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.268308 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.268325 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.268338 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.272344 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.272402 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.334499 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:49.334684 36200 subnets.go:205] Assigned CIDR 172.20.0.0/21 to subnet utility-us-test-1a I0703 20:24:49.334711 36200 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet dualstack-us-test-1a I0703 20:24:49.335207 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterIPv6 (0.08s) === RUN TestCreateClusterDifferentAMIs I0703 20:24:49.344629 36200 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0703 20:24:49.344648 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.344844 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.344878 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.344920 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.344952 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.344996 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.345029 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.345051 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.345080 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.345103 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.349447 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.349508 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.392663 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:49.392768 36200 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0703 20:24:49.392789 36200 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0703 20:24:49.393135 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:49.401193 36200 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestCreateClusterDifferentAMIs (0.06s) === RUN TestCreateClusterKarpenter I0703 20:24:49.401308 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.401454 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.401480 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.401508 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.401532 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.401562 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.401588 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.401613 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.401637 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.401655 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.405827 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.405886 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0703 20:24:49.441515 36200 new_cluster.go:1373] Cloud Provider ID: "aws" I0703 20:24:49.441753 36200 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0703 20:24:49.441776 36200 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0703 20:24:49.441794 36200 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0703 20:24:49.442208 36200 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKarpenter (0.05s) === RUN TestParseCloudLabels --- PASS: TestParseCloudLabels (0.00s) === RUN TestConfirmation --- PASS: TestConfirmation (0.00s) === RUN TestEditInstanceGroup I0703 20:24:49.450301 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.450452 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.450480 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.450573 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.450600 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.450632 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.450661 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.450679 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.450708 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.450729 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.456947 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } --- PASS: TestEditInstanceGroup (0.01s) === RUN TestMinimal I0703 20:24:49.458318 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:49.458472 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:49.458497 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:49.458524 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:49.458549 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:49.458577 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:49.458601 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:49.458622 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:49.458644 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:49.458661 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:49.471901 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0703 20:24:49.473452 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:49.473498 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0703 20:24:54.031687 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:57.300223 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:24:57.302363 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:24:57.302389 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:24:57.302480 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:24:57.307133 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:24:57.312852 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:24:57.313949 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:57.314464 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:57.314720 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:57.315410 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:57.315547 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:24:57.315991 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:24:57.316491 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:24:57.321696 36200 target.go:111] Terraform output is in /tmp/test4013908752/out --- PASS: TestMinimal (7.87s) === RUN TestMinimal_v1_23 I0703 20:24:57.325957 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:57.326143 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:57.326178 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:57.326218 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:57.326250 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:57.326291 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:57.326323 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:57.326344 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:57.326375 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:57.326397 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:57.354711 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0703 20:24:57.357023 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:57.357087 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:59.452224 36200 zones.go:93] ListHostedZonesPages { } I0703 20:24:59.545149 36200 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0703 20:24:59.546271 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:24:59.546296 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:24:59.546373 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:24:59.547451 36200 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0703 20:24:59.552017 36200 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0703 20:24:59.552249 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:59.552459 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:59.552618 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:59.553033 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:59.553114 36200 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0703 20:24:59.553375 36200 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0703 20:24:59.553587 36200 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0703 20:24:59.558445 36200 target.go:111] Terraform output is in /tmp/test456237168/out --- PASS: TestMinimal_v1_23 (2.24s) === RUN TestMinimal_v1_24 I0703 20:24:59.566706 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:59.566910 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:59.566951 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:59.566990 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:59.567021 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:59.567062 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:59.567095 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:59.567117 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:59.567147 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:59.567168 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:59.588116 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:24:59.590779 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:24:59.590863 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:01.460222 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:01.604318 36200 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0703 20:25:01.605301 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:01.605319 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:01.605381 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:01.609352 36200 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0703 20:25:01.617741 36200 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0703 20:25:01.618377 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:01.618582 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:01.618693 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:01.619104 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:01.619199 36200 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0703 20:25:01.619401 36200 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0703 20:25:01.619665 36200 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0703 20:25:01.625692 36200 target.go:111] Terraform output is in /tmp/test686699146/out --- PASS: TestMinimal_v1_24 (2.06s) === RUN TestMinimal_v1_25 I0703 20:25:01.630373 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:01.630559 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:01.630599 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:01.630667 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:01.630700 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:01.630744 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:01.630786 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:01.630813 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:01.630870 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:01.630898 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:01.652932 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0703 20:25:01.655926 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:01.656003 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:03.692129 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:03.840550 36200 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0703 20:25:03.841352 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:03.841380 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:03.841456 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:03.843863 36200 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0703 20:25:03.848662 36200 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0703 20:25:03.848979 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:03.849196 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:03.849399 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:03.849724 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:03.849825 36200 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0703 20:25:03.850052 36200 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0703 20:25:03.850367 36200 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0703 20:25:03.856052 36200 target.go:111] Terraform output is in /tmp/test1795911427/out --- PASS: TestMinimal_v1_25 (2.23s) === RUN TestMinimal_v1_26 I0703 20:25:03.860599 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:03.860768 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:03.860801 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:03.860860 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:03.860901 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:03.860939 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:03.860974 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:03.860998 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:03.861032 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:03.861053 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:03.881847 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0703 20:25:03.884585 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:03.884656 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:06.018375 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:06.156271 36200 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0703 20:25:06.160953 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:06.160978 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:06.161033 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:06.162237 36200 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0703 20:25:06.165365 36200 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0703 20:25:06.165564 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:06.165803 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:06.165873 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:06.166109 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:06.166158 36200 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0703 20:25:06.166376 36200 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0703 20:25:06.166504 36200 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0703 20:25:06.169765 36200 target.go:111] Terraform output is in /tmp/test3521384986/out --- PASS: TestMinimal_v1_26 (2.31s) === RUN TestMinimal_v1_27 I0703 20:25:06.171749 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:06.171838 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:06.171855 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:06.171878 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:06.171893 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:06.171917 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:06.171935 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:06.171945 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:06.171961 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:06.171972 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:06.193289 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0703 20:25:06.195797 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:06.195872 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:08.869854 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:09.013015 36200 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0703 20:25:09.013507 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:09.013522 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:09.013567 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:09.015788 36200 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0703 20:25:09.020608 36200 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0703 20:25:09.020952 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:09.021089 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:09.021347 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:09.021621 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:09.021704 36200 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0703 20:25:09.021942 36200 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0703 20:25:09.022182 36200 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0703 20:25:09.027593 36200 target.go:111] Terraform output is in /tmp/test2438629027/out --- PASS: TestMinimal_v1_27 (2.86s) === RUN TestMinimal_NoneDNS I0703 20:25:09.034943 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:09.035135 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:09.035169 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:09.035210 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:09.035243 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:09.035283 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:09.035316 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:09.035337 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:09.035365 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:09.035386 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0703 20:25:09.059497 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:09.059567 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:10.420176 36200 executor.go:111] Tasks: 0 done / 110 total; 43 can run I0703 20:25:10.422113 36200 executor.go:111] Tasks: 43 done / 110 total; 24 can run I0703 20:25:10.424195 36200 executor.go:111] Tasks: 67 done / 110 total; 29 can run I0703 20:25:10.424639 36200 executor.go:111] Tasks: 96 done / 110 total; 2 can run I0703 20:25:10.424667 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:10.424705 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:10.424782 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:10.424827 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:10.427247 36200 executor.go:111] Tasks: 98 done / 110 total; 4 can run I0703 20:25:10.427371 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:10.427567 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:10.427767 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:10.427820 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:10.427888 36200 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0703 20:25:10.428092 36200 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0703 20:25:10.428267 36200 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0703 20:25:10.432402 36200 target.go:111] Terraform output is in /tmp/test1982221981/out --- PASS: TestMinimal_NoneDNS (1.40s) === RUN TestHetzner I0703 20:25:10.435331 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:25:12.437861 36200 executor.go:111] Tasks: 0 done / 46 total; 37 can run I0703 20:25:12.440285 36200 executor.go:111] Tasks: 37 done / 46 total; 3 can run I0703 20:25:12.440461 36200 executor.go:111] Tasks: 40 done / 46 total; 2 can run I0703 20:25:12.442384 36200 executor.go:111] Tasks: 42 done / 46 total; 4 can run I0703 20:25:12.443030 36200 executor.go:111] Tasks: 46 done / 46 total; 0 can run I0703 20:25:12.446635 36200 target.go:111] Terraform output is in /tmp/test3695138227/out --- PASS: TestHetzner (2.01s) === RUN TestNvidia I0703 20:25:12.448071 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:12.448160 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:12.448180 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:12.448203 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:12.448220 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:12.448241 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:12.448261 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:12.448272 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:12.448288 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:12.448300 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:12.459300 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:12.461397 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:12.461452 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:14.329955 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:14.434308 36200 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0703 20:25:14.434511 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:14.434527 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:14.434573 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:14.436321 36200 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0703 20:25:14.439806 36200 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0703 20:25:14.440068 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:14.440786 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:14.441288 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:14.441423 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:14.441561 36200 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0703 20:25:14.442150 36200 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0703 20:25:14.443032 36200 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0703 20:25:14.449025 36200 target.go:111] Terraform output is in /tmp/test2141247190/out --- PASS: TestNvidia (2.01s) === RUN TestMinimalGossip I0703 20:25:14.453437 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:14.453649 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:14.453685 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:14.453726 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:14.453762 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:14.453809 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:14.453846 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:14.453872 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:14.453904 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:14.453925 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:14.470438 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:14.470494 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:15.842910 36200 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0703 20:25:15.848480 36200 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0703 20:25:15.853022 36200 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0703 20:25:15.853342 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:15.853612 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:15.854034 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:15.854165 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:15.854265 36200 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0703 20:25:15.854529 36200 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0703 20:25:15.854734 36200 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0703 20:25:15.859844 36200 target.go:111] Terraform output is in /tmp/test2239207042/out --- PASS: TestMinimalGossip (1.41s) === RUN TestMinimalGossipIRSA I0703 20:25:15.864119 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:15.864305 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:15.864338 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:15.864378 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:15.864413 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:15.864449 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:15.864480 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:15.864504 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:15.864532 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:15.864554 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:15.885697 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:15.885751 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:17.314536 36200 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0703 20:25:17.317784 36200 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0703 20:25:17.321429 36200 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0703 20:25:17.321825 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:17.322048 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:17.322273 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:17.322444 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:17.322551 36200 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0703 20:25:17.322847 36200 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0703 20:25:17.323099 36200 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0703 20:25:17.329517 36200 target.go:111] Terraform output is in /tmp/test2984454358/out --- PASS: TestMinimalGossipIRSA (1.47s) === RUN TestMinimalGCE I0703 20:25:17.334755 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:17.336313 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:25:19.273858 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:25:19.273943 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:25:19.274100 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0703 20:25:19.274135 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0703 20:25:19.274166 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0703 20:25:19.274276 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0703 20:25:19.275582 36200 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0703 20:25:19.278567 36200 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0703 20:25:19.283433 36200 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0703 20:25:19.284590 36200 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0703 20:25:19.284891 36200 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0703 20:25:19.288245 36200 target.go:111] Terraform output is in /tmp/test271091826/out --- PASS: TestMinimalGCE (1.96s) === RUN TestMinimalGCEPrivate I0703 20:25:19.291531 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:19.293008 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:25:20.982462 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:25:20.982538 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:25:20.982631 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/main" W0703 20:25:20.982651 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/events" W0703 20:25:20.982666 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com" W0703 20:25:20.982716 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0703 20:25:20.983775 36200 executor.go:111] Tasks: 0 done / 65 total; 41 can run I0703 20:25:20.991975 36200 executor.go:111] Tasks: 41 done / 65 total; 17 can run I0703 20:25:20.996876 36200 executor.go:111] Tasks: 58 done / 65 total; 5 can run I0703 20:25:20.997703 36200 executor.go:111] Tasks: 63 done / 65 total; 2 can run I0703 20:25:20.997863 36200 executor.go:111] Tasks: 65 done / 65 total; 0 can run I0703 20:25:21.001792 36200 target.go:111] Terraform output is in /tmp/test2835073121/out --- PASS: TestMinimalGCEPrivate (1.71s) === RUN TestMinimalGCEInternalLoadBalancer I0703 20:25:21.005188 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:21.006782 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:25:22.658597 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:25:22.658652 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:25:22.658754 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/main" W0703 20:25:22.658772 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/events" W0703 20:25:22.658786 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com" W0703 20:25:22.658833 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0703 20:25:22.658866 36200 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0703 20:25:22.659992 36200 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0703 20:25:22.668188 36200 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0703 20:25:22.668754 36200 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0703 20:25:22.669033 36200 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0703 20:25:22.673608 36200 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0703 20:25:22.674531 36200 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0703 20:25:22.674719 36200 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0703 20:25:22.674990 36200 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0703 20:25:22.675286 36200 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0703 20:25:22.679436 36200 target.go:111] Terraform output is in /tmp/test4021548631/out --- PASS: TestMinimalGCEInternalLoadBalancer (1.68s) === RUN TestMinimalGCEPublicLoadBalancer I0703 20:25:22.682926 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:22.684541 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:25:24.299777 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:25:24.299866 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:25:24.299993 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/main" W0703 20:25:24.300020 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/events" W0703 20:25:24.300040 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com" W0703 20:25:24.300098 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0703 20:25:24.301583 36200 executor.go:111] Tasks: 0 done / 71 total; 43 can run I0703 20:25:24.304766 36200 executor.go:111] Tasks: 43 done / 71 total; 19 can run I0703 20:25:24.309245 36200 executor.go:111] Tasks: 62 done / 71 total; 7 can run I0703 20:25:24.310009 36200 executor.go:111] Tasks: 69 done / 71 total; 2 can run I0703 20:25:24.310191 36200 executor.go:111] Tasks: 71 done / 71 total; 0 can run I0703 20:25:24.317993 36200 target.go:111] Terraform output is in /tmp/test4119322116/out --- PASS: TestMinimalGCEPublicLoadBalancer (1.64s) === RUN TestMinimalGCELongClusterName I0703 20:25:24.321892 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:24.323629 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:25:25.953348 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:25:25.953442 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:25:25.953554 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0703 20:25:25.953580 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0703 20:25:25.953601 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0703 20:25:25.953664 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0703 20:25:25.954930 36200 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0703 20:25:25.959159 36200 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0703 20:25:25.962959 36200 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0703 20:25:25.963580 36200 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0703 20:25:25.963749 36200 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0703 20:25:25.967849 36200 target.go:111] Terraform output is in /tmp/test1394614863/out --- PASS: TestMinimalGCELongClusterName (1.65s) === RUN TestMinimalGCEInternalLoadBalancerLongClusterName I0703 20:25:25.971486 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:25.973187 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:25:27.598409 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:25:27.598483 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:25:27.598629 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0703 20:25:27.598651 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0703 20:25:27.598672 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0703 20:25:27.598734 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0703 20:25:27.598776 36200 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0703 20:25:27.600171 36200 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0703 20:25:27.604326 36200 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0703 20:25:27.604761 36200 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0703 20:25:27.604932 36200 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0703 20:25:27.609474 36200 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0703 20:25:27.610290 36200 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0703 20:25:27.610480 36200 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0703 20:25:27.610623 36200 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0703 20:25:27.610754 36200 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0703 20:25:27.614858 36200 target.go:111] Terraform output is in /tmp/test797314948/out --- PASS: TestMinimalGCEInternalLoadBalancerLongClusterName (1.65s) === RUN TestMinimalGCEDNSNone I0703 20:25:27.618414 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:27.620029 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:25:29.212718 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:25:29.212869 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:25:29.213657 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0703 20:25:29.213796 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0703 20:25:29.213844 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0703 20:25:29.214092 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0703 20:25:29.214149 36200 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0703 20:25:29.215870 36200 executor.go:111] Tasks: 0 done / 72 total; 41 can run I0703 20:25:29.218604 36200 executor.go:111] Tasks: 41 done / 72 total; 18 can run I0703 20:25:29.219083 36200 executor.go:111] Tasks: 59 done / 72 total; 2 can run I0703 20:25:29.219310 36200 executor.go:111] Tasks: 61 done / 72 total; 2 can run I0703 20:25:29.223579 36200 executor.go:111] Tasks: 63 done / 72 total; 4 can run I0703 20:25:29.224348 36200 executor.go:111] Tasks: 67 done / 72 total; 2 can run I0703 20:25:29.224515 36200 executor.go:111] Tasks: 69 done / 72 total; 1 can run I0703 20:25:29.224661 36200 executor.go:111] Tasks: 70 done / 72 total; 2 can run I0703 20:25:29.224825 36200 executor.go:111] Tasks: 72 done / 72 total; 0 can run I0703 20:25:29.228692 36200 target.go:111] Terraform output is in /tmp/test3910172631/out --- PASS: TestMinimalGCEDNSNone (1.61s) === RUN TestMinimalScaleway I0703 20:25:29.232034 36200 featureflag.go:164] FeatureFlag "Scaleway"=true I0703 20:25:29.232053 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:25:31.302869 36200 executor.go:111] Tasks: 0 done / 49 total; 37 can run I0703 20:25:31.305834 36200 executor.go:111] Tasks: 37 done / 49 total; 6 can run I0703 20:25:31.310028 36200 executor.go:111] Tasks: 43 done / 49 total; 6 can run I0703 20:25:31.311064 36200 executor.go:111] Tasks: 49 done / 49 total; 0 can run I0703 20:25:31.313851 36200 target.go:111] Terraform output is in /tmp/test960415965/out I0703 20:25:31.317388 36200 featureflag.go:164] FeatureFlag "Scaleway"=false --- PASS: TestMinimalScaleway (2.09s) === RUN TestHA I0703 20:25:31.317533 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:31.317741 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:31.317784 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:31.317832 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:31.317868 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:31.317915 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:31.317956 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:31.317981 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:31.318018 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:31.318044 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:31.350612 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:31.353687 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:31.353766 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:31.353812 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:31.353852 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:32.622684 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:32.779592 36200 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0703 20:25:32.782728 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:32.782767 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:32.782879 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:32.788591 36200 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0703 20:25:32.793601 36200 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0703 20:25:32.793769 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:32.793972 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:32.794153 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:32.794372 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:32.794442 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:32.794623 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:32.794772 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:32.794868 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:32.794979 36200 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0703 20:25:32.795333 36200 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0703 20:25:32.795670 36200 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0703 20:25:32.803491 36200 target.go:111] Terraform output is in /tmp/test2168910679/out --- PASS: TestHA (1.49s) === RUN TestHighAvailabilityGCE I0703 20:25:32.809420 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:32.811163 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:25:34.566775 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:25:34.566867 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:25:34.566975 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/main" W0703 20:25:34.566998 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/events" W0703 20:25:34.567019 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com" W0703 20:25:34.567078 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0703 20:25:34.567145 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0703 20:25:34.567195 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0703 20:25:34.568867 36200 executor.go:111] Tasks: 0 done / 82 total; 49 can run I0703 20:25:34.571655 36200 executor.go:111] Tasks: 49 done / 82 total; 19 can run I0703 20:25:34.576183 36200 executor.go:111] Tasks: 68 done / 82 total; 8 can run I0703 20:25:34.577138 36200 executor.go:111] Tasks: 76 done / 82 total; 6 can run I0703 20:25:34.577425 36200 executor.go:111] Tasks: 82 done / 82 total; 0 can run I0703 20:25:34.582483 36200 target.go:111] Terraform output is in /tmp/test634229937/out --- PASS: TestHighAvailabilityGCE (1.78s) === RUN TestComplex I0703 20:25:34.587002 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:34.587241 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:34.587283 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:34.587380 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:34.587440 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:34.587492 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:34.587568 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:34.587602 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:34.587635 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:34.587671 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:34.619520 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:25:34.623319 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:34.623403 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:36.580279 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:36.742215 36200 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0703 20:25:36.743244 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:36.743276 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:36.743364 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:36.745182 36200 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0703 20:25:36.752268 36200 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0703 20:25:36.754534 36200 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0703 20:25:36.754719 36200 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0703 20:25:36.754800 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:36.754870 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:36.754972 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:36.755038 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:36.759398 36200 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0703 20:25:36.759561 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:36.759745 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:36.760189 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:36.760261 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:36.760359 36200 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0703 20:25:36.760616 36200 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0703 20:25:36.760894 36200 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0703 20:25:36.768148 36200 target.go:111] Terraform output is in /tmp/test648646587/out I0703 20:25:36.772836 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:36.773000 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:36.773037 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:36.773101 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:36.773137 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:36.773175 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:36.773210 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:36.773233 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:36.773264 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:36.773290 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:36.800195 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:25:36.803499 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:36.803570 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:38.035683 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:38.201745 36200 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0703 20:25:38.203090 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:38.203122 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:38.203211 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:38.204562 36200 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0703 20:25:38.207284 36200 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0703 20:25:38.207936 36200 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0703 20:25:38.208142 36200 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0703 20:25:38.208196 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:38.208263 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:38.208375 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:38.208446 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:38.212786 36200 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0703 20:25:38.212943 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:38.213136 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:38.213595 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:38.213682 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:38.213776 36200 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0703 20:25:38.214056 36200 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0703 20:25:38.214349 36200 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0703 20:25:38.220992 36200 target.go:111] Terraform output is in /tmp/test3104300941/out --- PASS: TestComplex (3.64s) === RUN TestCompress I0703 20:25:38.225773 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:38.225969 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:38.226008 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:38.226049 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:38.226083 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:38.226124 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:38.226162 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:38.226187 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:38.226219 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:38.226243 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:38.249939 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:38.252682 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:38.252762 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:39.500162 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:39.653511 36200 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0703 20:25:39.653930 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:39.653967 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:39.654055 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:39.656078 36200 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0703 20:25:39.661485 36200 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0703 20:25:39.661742 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:39.661882 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:39.666139 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:39.668951 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:39.669082 36200 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0703 20:25:39.669398 36200 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0703 20:25:39.669746 36200 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0703 20:25:39.675377 36200 target.go:111] Terraform output is in /tmp/test2833598128/out --- PASS: TestCompress (1.45s) === RUN TestExternalPolicies I0703 20:25:39.679820 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:39.680003 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:39.680040 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:39.680081 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:39.680116 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:39.680156 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:39.680190 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:39.680214 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:39.680244 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:39.680268 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:39.702896 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:39.706074 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:39.706145 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:40.936668 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:41.085589 36200 executor.go:111] Tasks: 0 done / 115 total; 47 can run I0703 20:25:41.086209 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:41.086245 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:41.086334 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:41.092653 36200 executor.go:111] Tasks: 47 done / 115 total; 22 can run I0703 20:25:41.095937 36200 executor.go:111] Tasks: 69 done / 115 total; 30 can run I0703 20:25:41.096529 36200 executor.go:111] Tasks: 99 done / 115 total; 4 can run W0703 20:25:41.096589 36200 api.go:53] PageSize not implemented W0703 20:25:41.096623 36200 api.go:53] PageSize not implemented I0703 20:25:41.101289 36200 executor.go:111] Tasks: 103 done / 115 total; 4 can run I0703 20:25:41.101438 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:41.101628 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:41.101797 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:41.102229 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:41.102321 36200 executor.go:111] Tasks: 107 done / 115 total; 2 can run I0703 20:25:41.102569 36200 executor.go:111] Tasks: 109 done / 115 total; 6 can run I0703 20:25:41.102829 36200 executor.go:111] Tasks: 115 done / 115 total; 0 can run I0703 20:25:41.109265 36200 target.go:111] Terraform output is in /tmp/test3170219257/out --- PASS: TestExternalPolicies (1.43s) === RUN TestMinimalIPv6 I0703 20:25:41.113940 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:41.114122 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:41.114161 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:41.114223 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:41.114259 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:41.114302 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:41.114340 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:41.114364 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:41.114396 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:41.114421 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:41.138340 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:25:41.141575 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:41.141644 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:42.400251 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:42.558613 36200 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0703 20:25:42.559189 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:42.559224 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:42.559321 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:42.561350 36200 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0703 20:25:42.563992 36200 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0703 20:25:42.564899 36200 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0703 20:25:42.565311 36200 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0703 20:25:42.565393 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:42.565465 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:42.565552 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:42.565620 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:42.574017 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:25:42.574195 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:42.574328 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:42.574724 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:42.574776 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:42.574869 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:25:42.575103 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:25:42.575359 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:25:42.582075 36200 target.go:111] Terraform output is in /tmp/test1709414833/out --- PASS: TestMinimalIPv6 (1.47s) === RUN TestMinimalIPv6Calico I0703 20:25:42.587519 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:42.587713 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:42.587752 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:42.587793 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:42.587829 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:42.587872 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:42.587946 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:42.587972 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:42.588007 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:42.588031 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:42.611872 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:25:42.614920 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:42.614986 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:43.879178 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:44.250669 36200 executor.go:111] Tasks: 0 done / 138 total; 47 can run I0703 20:25:44.251556 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:44.251596 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:44.251721 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:44.253654 36200 executor.go:111] Tasks: 47 done / 138 total; 25 can run I0703 20:25:44.256156 36200 executor.go:111] Tasks: 72 done / 138 total; 37 can run I0703 20:25:44.258913 36200 executor.go:111] Tasks: 109 done / 138 total; 9 can run I0703 20:25:44.261505 36200 executor.go:111] Tasks: 118 done / 138 total; 8 can run I0703 20:25:44.262376 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:44.262464 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:44.262501 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:44.262590 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:44.266876 36200 executor.go:111] Tasks: 126 done / 138 total; 4 can run I0703 20:25:44.267062 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:44.267268 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:44.267702 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:44.267773 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:44.267843 36200 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0703 20:25:44.268143 36200 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0703 20:25:44.268434 36200 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0703 20:25:44.275756 36200 target.go:111] Terraform output is in /tmp/test2626069203/out --- PASS: TestMinimalIPv6Calico (1.69s) === RUN TestMinimalIPv6Cilium I0703 20:25:44.281349 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:44.281537 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:44.281577 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:44.281620 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:44.281669 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:44.281713 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:44.281792 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:44.281818 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:44.281853 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:44.281879 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:44.306235 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:25:44.309351 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:44.309422 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:45.531917 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:45.717496 36200 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0703 20:25:45.718297 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:45.718330 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:45.718420 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:45.720792 36200 executor.go:111] Tasks: 47 done / 137 total; 25 can run I0703 20:25:45.723481 36200 executor.go:111] Tasks: 72 done / 137 total; 36 can run I0703 20:25:45.724356 36200 executor.go:111] Tasks: 108 done / 137 total; 9 can run I0703 20:25:45.724701 36200 executor.go:111] Tasks: 117 done / 137 total; 8 can run I0703 20:25:45.724810 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:45.724881 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:45.724973 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:45.725035 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:45.729389 36200 executor.go:111] Tasks: 125 done / 137 total; 4 can run I0703 20:25:45.729543 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:45.729729 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:45.730971 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:45.731448 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:45.731746 36200 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0703 20:25:45.732497 36200 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0703 20:25:45.733606 36200 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0703 20:25:45.743004 36200 target.go:111] Terraform output is in /tmp/test1379184425/out --- PASS: TestMinimalIPv6Cilium (1.47s) === RUN TestMinimalIPv6NoSubnetPrefix I0703 20:25:45.747887 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:45.748070 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:45.748107 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:45.748152 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:45.748187 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:45.748228 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:45.748264 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:45.748287 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:45.748318 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:45.748342 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:45.772083 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:25:45.775721 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:45.775798 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:47.018686 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:47.171114 36200 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0703 20:25:47.173049 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:47.173079 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:47.173164 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:47.174117 36200 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0703 20:25:47.176680 36200 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0703 20:25:47.177662 36200 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0703 20:25:47.177981 36200 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0703 20:25:47.178046 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:47.178112 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:47.178207 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:25:47.178270 36200 loadbalancers.go:35] PageSize not implemented I0703 20:25:47.182650 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:25:47.182870 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:47.183068 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:47.183475 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:47.183557 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:47.183626 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:25:47.183874 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:25:47.184140 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:25:47.191032 36200 target.go:111] Terraform output is in /tmp/test3370596028/out --- PASS: TestMinimalIPv6NoSubnetPrefix (1.45s) === RUN TestMinimalWarmPool I0703 20:25:47.195738 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:47.195931 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:47.195969 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:47.196010 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:47.196044 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:47.196085 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:47.196121 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:47.196144 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:47.196175 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:47.196197 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:47.216554 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:47.219487 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:47.219559 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:48.460057 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:48.640049 36200 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0703 20:25:48.643799 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:48.643836 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:48.643947 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:48.648698 36200 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0703 20:25:48.653761 36200 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0703 20:25:48.654273 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:48.654497 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:48.654712 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:48.655140 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:48.655232 36200 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0703 20:25:48.655500 36200 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0703 20:25:48.655719 36200 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0703 20:25:48.662274 36200 target.go:111] Terraform output is in /tmp/test1928299856/out --- PASS: TestMinimalWarmPool (1.47s) === RUN TestMinimalEtcd I0703 20:25:48.667217 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:48.667430 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:48.667476 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:48.667581 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:48.667634 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:48.667707 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:48.667756 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:48.667802 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:48.667862 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:48.667902 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:48.688899 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:48.691768 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:48.691862 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:49.942862 36200 zones.go:93] ListHostedZonesPages { } W0703 20:25:50.077771 36200 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc W0703 20:25:50.077842 36200 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 10 W0703 20:25:50.080887 36200 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc I0703 20:25:50.092083 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:25:50.093527 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:50.093566 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:50.093696 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:50.095036 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:25:50.099804 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:25:50.099978 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:50.100216 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:50.100623 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:50.100712 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:50.100780 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:25:50.101045 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:25:50.101337 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:25:50.106800 36200 target.go:111] Terraform output is in /tmp/test643332822/out --- PASS: TestMinimalEtcd (1.44s) === RUN TestMinimalGp3 I0703 20:25:50.111512 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:50.111708 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:50.111748 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:50.111790 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:50.111824 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:50.111871 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:50.111909 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:50.111933 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:50.111968 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:50.111993 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:50.136914 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:50.139815 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:50.139892 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:51.372792 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:51.521239 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:25:51.522176 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:51.522201 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:51.522286 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:51.526796 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:25:51.534284 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:25:51.534769 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:51.534972 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:51.535186 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:51.535682 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:51.535786 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:25:51.536052 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:25:51.536336 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:25:51.541815 36200 target.go:111] Terraform output is in /tmp/test1289230670/out --- PASS: TestMinimalGp3 (1.43s) === RUN TestMinimalLongClusterName I0703 20:25:51.546450 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:51.546632 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:51.546667 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:51.546702 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:51.546733 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:51.546770 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:51.546802 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:51.546824 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:51.546855 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:51.546877 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:51.566640 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:51.569231 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:51.569300 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0703 20:25:52.799838 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:52.951790 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:25:52.952279 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:52.952320 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:52.952406 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:52.954462 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:25:52.959223 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:25:52.959559 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:52.959832 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:52.960225 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:52.960340 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:52.960433 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:25:52.960677 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:25:52.960949 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:25:52.966820 36200 target.go:111] Terraform output is in /tmp/test2555169048/out --- PASS: TestMinimalLongClusterName (1.43s) === RUN TestExistingSG I0703 20:25:52.971711 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:52.971904 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:52.971946 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:52.971988 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:52.972023 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:52.972069 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:52.972105 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:52.972129 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:52.972164 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:52.972191 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:53.005594 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:53.008871 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:53.008949 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:53.008996 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:53.009038 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.252865 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:54.412538 36200 executor.go:111] Tasks: 0 done / 163 total; 53 can run I0703 20:25:54.413173 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:54.413207 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:54.413295 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:54.415809 36200 executor.go:111] Tasks: 53 done / 163 total; 26 can run I0703 20:25:54.418241 36200 executor.go:111] Tasks: 79 done / 163 total; 54 can run I0703 20:25:54.419066 36200 executor.go:111] Tasks: 133 done / 163 total; 6 can run W0703 20:25:54.419141 36200 api.go:53] PageSize not implemented W0703 20:25:54.419175 36200 api.go:53] PageSize not implemented W0703 20:25:54.419269 36200 api.go:53] PageSize not implemented W0703 20:25:54.419371 36200 api.go:53] PageSize not implemented I0703 20:25:54.423680 36200 executor.go:111] Tasks: 139 done / 163 total; 8 can run I0703 20:25:54.423869 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.423995 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.424115 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.424267 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.424325 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.424517 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.424652 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.425189 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.425373 36200 executor.go:111] Tasks: 147 done / 163 total; 4 can run I0703 20:25:54.425678 36200 executor.go:111] Tasks: 151 done / 163 total; 12 can run I0703 20:25:54.426030 36200 executor.go:111] Tasks: 163 done / 163 total; 0 can run I0703 20:25:54.434976 36200 target.go:111] Terraform output is in /tmp/test1936898437/out --- PASS: TestExistingSG (1.47s) === RUN TestBastionAdditionalUserData I0703 20:25:54.440875 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:54.441064 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:54.441103 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:54.441147 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:54.441187 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:54.441228 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:54.441262 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:54.441285 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:54.441317 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:54.441341 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:54.470298 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:54.473224 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.473297 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:54.473345 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:55.730164 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:55.879745 36200 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0703 20:25:55.880937 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:55.880973 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:55.881104 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:55.882910 36200 executor.go:111] Tasks: 47 done / 137 total; 30 can run I0703 20:25:55.885521 36200 executor.go:111] Tasks: 77 done / 137 total; 35 can run I0703 20:25:55.886300 36200 executor.go:111] Tasks: 112 done / 137 total; 6 can run W0703 20:25:55.886362 36200 api.go:53] PageSize not implemented W0703 20:25:55.886400 36200 api.go:53] PageSize not implemented W0703 20:25:55.886435 36200 api.go:53] PageSize not implemented I0703 20:25:55.890641 36200 executor.go:111] Tasks: 118 done / 137 total; 7 can run I0703 20:25:55.890791 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:55.890984 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:55.891172 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:55.891358 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:55.891423 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:55.891612 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:55.891709 36200 executor.go:111] Tasks: 125 done / 137 total; 3 can run I0703 20:25:55.892020 36200 executor.go:111] Tasks: 128 done / 137 total; 9 can run I0703 20:25:55.892284 36200 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0703 20:25:55.899570 36200 target.go:111] Terraform output is in /tmp/test1648968094/out --- PASS: TestBastionAdditionalUserData (1.47s) === RUN TestPrivateFlannel I0703 20:25:55.909868 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:55.910061 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:55.910099 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:55.910140 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:55.910175 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:55.910217 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:55.910290 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:55.910315 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:55.910346 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:55.910369 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:55.933595 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:25:55.936539 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:55.936610 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:55.936655 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:57.182968 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:57.342900 36200 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0703 20:25:57.343879 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:57.343911 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:57.343993 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:57.347640 36200 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0703 20:25:57.352408 36200 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0703 20:25:57.354225 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:57.354372 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:57.354579 36200 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0703 20:25:57.354674 36200 api.go:53] PageSize not implemented W0703 20:25:57.354785 36200 api.go:53] PageSize not implemented I0703 20:25:57.359174 36200 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0703 20:25:57.359347 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:57.359535 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:57.359941 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:57.359993 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:57.360098 36200 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0703 20:25:57.360324 36200 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0703 20:25:57.360599 36200 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0703 20:25:57.367768 36200 target.go:111] Terraform output is in /tmp/test1259967972/out --- PASS: TestPrivateFlannel (1.46s) === RUN TestPrivateCalico I0703 20:25:57.372966 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:57.373158 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:57.373196 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:57.373238 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:57.373272 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:57.373316 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:57.373390 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:57.373418 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:57.373450 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:57.373475 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:57.397055 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:25:57.400306 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:57.400376 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:57.400427 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:58.651446 36200 zones.go:93] ListHostedZonesPages { } I0703 20:25:59.028563 36200 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0703 20:25:59.029181 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:25:59.029212 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:25:59.029300 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:25:59.033184 36200 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0703 20:25:59.035842 36200 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0703 20:25:59.036377 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:59.036537 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:59.036634 36200 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0703 20:25:59.036740 36200 api.go:53] PageSize not implemented W0703 20:25:59.036858 36200 api.go:53] PageSize not implemented I0703 20:25:59.041297 36200 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0703 20:25:59.041531 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:59.041737 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:59.041942 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:59.042337 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:59.042433 36200 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0703 20:25:59.042690 36200 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0703 20:25:59.042965 36200 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0703 20:25:59.050720 36200 target.go:111] Terraform output is in /tmp/test2004131326/out --- PASS: TestPrivateCalico (1.69s) === RUN TestPrivateCilium I0703 20:25:59.061110 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:59.061322 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:59.061360 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:59.061403 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:59.061436 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:59.061477 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:59.061514 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:59.061537 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:59.061571 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:59.061595 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:59.085721 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:25:59.088966 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:59.089032 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:25:59.089079 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:00.354521 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:00.531972 36200 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0703 20:26:00.536268 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:00.536310 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:00.536469 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:00.541017 36200 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0703 20:26:00.544206 36200 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0703 20:26:00.544692 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:00.544843 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:00.544961 36200 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0703 20:26:00.545037 36200 api.go:53] PageSize not implemented W0703 20:26:00.545160 36200 api.go:53] PageSize not implemented I0703 20:26:00.549511 36200 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0703 20:26:00.549675 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:00.549842 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:00.550243 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:00.550318 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:00.550394 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:26:00.550659 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:26:00.550937 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:26:00.558154 36200 target.go:111] Terraform output is in /tmp/test1815533394/out --- PASS: TestPrivateCilium (1.50s) === RUN TestPrivateCilium2 I0703 20:26:00.563209 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:00.563390 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:00.563428 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:00.563475 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:00.563510 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:00.563555 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:00.563629 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:00.563654 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:00.563688 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:00.563713 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:00.587124 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:26:00.592985 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:00.593136 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:00.593251 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:01.834249 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:02.396813 36200 executor.go:111] Tasks: 0 done / 138 total; 50 can run I0703 20:26:02.399487 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:02.399559 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:02.399704 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:02.405357 36200 executor.go:111] Tasks: 50 done / 138 total; 30 can run I0703 20:26:02.408485 36200 executor.go:111] Tasks: 80 done / 138 total; 36 can run I0703 20:26:02.408894 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:02.409040 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:02.409136 36200 executor.go:111] Tasks: 116 done / 138 total; 6 can run W0703 20:26:02.409224 36200 api.go:53] PageSize not implemented W0703 20:26:02.409281 36200 api.go:53] PageSize not implemented I0703 20:26:02.413745 36200 executor.go:111] Tasks: 122 done / 138 total; 8 can run I0703 20:26:02.413970 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:02.414141 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:02.414549 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:02.414624 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:02.414687 36200 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0703 20:26:02.414904 36200 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0703 20:26:02.415173 36200 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0703 20:26:02.423286 36200 target.go:111] Terraform output is in /tmp/test2969072177/out --- PASS: TestPrivateCilium2 (1.87s) === RUN TestPrivateCiliumAdvanced I0703 20:26:02.435909 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:02.436124 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:02.436161 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:02.436218 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:02.436255 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:02.436298 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:02.436335 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:02.436359 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:02.436390 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:02.436414 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:02.465034 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:02.468189 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:02.468257 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:02.468303 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:03.702749 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:03.899413 36200 executor.go:111] Tasks: 0 done / 142 total; 54 can run I0703 20:26:03.904044 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:03.904102 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:03.904284 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:03.908380 36200 executor.go:111] Tasks: 54 done / 142 total; 30 can run I0703 20:26:03.911445 36200 executor.go:111] Tasks: 84 done / 142 total; 36 can run I0703 20:26:03.912191 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:03.912378 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:03.912474 36200 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0703 20:26:03.912519 36200 api.go:53] PageSize not implemented W0703 20:26:03.912542 36200 api.go:53] PageSize not implemented I0703 20:26:03.917895 36200 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0703 20:26:03.918125 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:03.918332 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:03.918752 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:03.919123 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:03.919232 36200 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0703 20:26:03.919536 36200 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0703 20:26:03.919813 36200 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0703 20:26:03.927458 36200 target.go:111] Terraform output is in /tmp/test398016878/out --- PASS: TestPrivateCiliumAdvanced (1.50s) === RUN TestPrivateCiliumENI I0703 20:26:03.932972 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:03.933159 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:03.933198 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:03.933240 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:03.933273 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:03.933315 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:03.933351 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:03.933375 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:03.933407 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:03.933434 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:03.956406 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:03.959358 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:03.959422 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:03.959464 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:05.186764 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:05.377751 36200 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0703 20:26:05.378325 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:05.378358 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:05.378445 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:05.380261 36200 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0703 20:26:05.382974 36200 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0703 20:26:05.383133 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:05.383278 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:05.383606 36200 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0703 20:26:05.383700 36200 api.go:53] PageSize not implemented W0703 20:26:05.383819 36200 api.go:53] PageSize not implemented I0703 20:26:05.388149 36200 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0703 20:26:05.388394 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:05.388586 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:05.390000 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:05.390237 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:05.390424 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:26:05.390991 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:26:05.391564 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:26:05.401471 36200 target.go:111] Terraform output is in /tmp/test725908357/out --- PASS: TestPrivateCiliumENI (1.47s) === RUN TestPrivateCanal I0703 20:26:05.407314 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:05.407527 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:05.407567 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:05.407608 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:05.407642 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:05.407682 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:05.407755 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:05.407780 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:05.408237 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:05.408265 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:05.430238 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:26:05.433215 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:05.433289 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:05.433337 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:06.733060 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:07.097991 36200 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0703 20:26:07.098867 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:07.098909 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:07.099005 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:07.100884 36200 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0703 20:26:07.103581 36200 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0703 20:26:07.104058 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:07.104200 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:07.104292 36200 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0703 20:26:07.104386 36200 api.go:53] PageSize not implemented W0703 20:26:07.104462 36200 api.go:53] PageSize not implemented I0703 20:26:07.108850 36200 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0703 20:26:07.109225 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:07.109427 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:07.109628 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:07.110037 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:07.110140 36200 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0703 20:26:07.110394 36200 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0703 20:26:07.110673 36200 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0703 20:26:07.118401 36200 target.go:111] Terraform output is in /tmp/test204914442/out --- PASS: TestPrivateCanal (1.72s) === RUN TestPrivateKopeio I0703 20:26:07.124278 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:07.124473 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:07.124513 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:07.124555 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:07.124589 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:07.124632 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:07.124670 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:07.124695 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:07.124731 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:07.124756 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:07.154030 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:07.157034 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:07.157111 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:07.157157 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:08.410228 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:08.568644 36200 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0703 20:26:08.569390 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:08.569421 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:08.569500 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:08.572374 36200 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0703 20:26:08.575319 36200 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0703 20:26:08.575605 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:08.575742 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:08.577406 36200 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0703 20:26:08.577981 36200 api.go:53] PageSize not implemented W0703 20:26:08.578057 36200 api.go:53] PageSize not implemented I0703 20:26:08.585283 36200 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0703 20:26:08.585449 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:08.585647 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:08.586055 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:08.586132 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:08.586205 36200 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0703 20:26:08.586484 36200 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0703 20:26:08.586819 36200 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0703 20:26:08.593976 36200 target.go:111] Terraform output is in /tmp/test1568532710/out --- PASS: TestPrivateKopeio (1.47s) === RUN TestUnmanaged I0703 20:26:08.598982 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:08.599176 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:08.599216 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:08.599259 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:08.599293 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:08.599335 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:08.599370 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:08.599396 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:08.599430 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:08.599454 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:08.623134 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:08.625842 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:08.625903 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:08.625943 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:09.888030 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:10.031903 36200 executor.go:111] Tasks: 0 done / 126 total; 46 can run I0703 20:26:10.037189 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:10.037241 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:10.037476 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:10.040444 36200 executor.go:111] Tasks: 46 done / 126 total; 27 can run I0703 20:26:10.041951 36200 executor.go:111] Tasks: 73 done / 126 total; 33 can run I0703 20:26:10.042379 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:10.042527 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:10.042614 36200 executor.go:111] Tasks: 106 done / 126 total; 5 can run W0703 20:26:10.042677 36200 api.go:53] PageSize not implemented W0703 20:26:10.042787 36200 api.go:53] PageSize not implemented I0703 20:26:10.047171 36200 executor.go:111] Tasks: 111 done / 126 total; 7 can run I0703 20:26:10.047329 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:10.047400 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:10.047862 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:10.048003 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:10.048095 36200 executor.go:111] Tasks: 118 done / 126 total; 2 can run I0703 20:26:10.048321 36200 executor.go:111] Tasks: 120 done / 126 total; 6 can run I0703 20:26:10.048485 36200 executor.go:111] Tasks: 126 done / 126 total; 0 can run I0703 20:26:10.055210 36200 target.go:111] Terraform output is in /tmp/test3165024644/out --- PASS: TestUnmanaged (1.46s) === RUN TestPrivateSharedSubnet I0703 20:26:10.060064 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:10.060256 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:10.060294 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:10.060332 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:10.060363 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:10.060405 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:10.060440 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:10.060464 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:10.060496 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:10.060519 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:10.083784 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:10.086517 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:10.086580 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:10.086622 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:11.338669 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:11.493173 36200 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0703 20:26:11.493531 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:11.493565 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:11.493653 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:11.499748 36200 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0703 20:26:11.499921 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:26:11.503383 36200 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0703 20:26:11.503579 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:11.503745 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:11.503942 36200 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0703 20:26:11.504023 36200 api.go:53] PageSize not implemented W0703 20:26:11.504133 36200 api.go:53] PageSize not implemented I0703 20:26:11.508578 36200 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0703 20:26:11.508747 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:11.508933 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:11.509143 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:11.509572 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:11.509666 36200 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0703 20:26:11.509931 36200 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0703 20:26:11.510200 36200 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0703 20:26:11.517129 36200 target.go:111] Terraform output is in /tmp/test2221567844/out --- PASS: TestPrivateSharedSubnet (1.46s) === RUN TestPrivateSharedIP I0703 20:26:11.522097 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:11.522277 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:11.522314 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:11.522354 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:11.522386 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:11.522427 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:11.522460 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:11.522482 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:11.522513 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:11.522534 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:11.546039 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:11.548903 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:11.548970 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:11.549018 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:12.783801 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:12.936543 36200 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0703 20:26:12.938809 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:12.938840 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:12.938917 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:12.940600 36200 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0703 20:26:12.940996 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:26:12.943146 36200 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0703 20:26:12.943627 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:12.943785 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:12.943921 36200 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0703 20:26:12.944007 36200 api.go:53] PageSize not implemented W0703 20:26:12.944127 36200 api.go:53] PageSize not implemented I0703 20:26:12.951401 36200 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0703 20:26:12.952602 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:12.953702 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:12.953774 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:12.954197 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:12.954308 36200 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0703 20:26:12.954527 36200 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0703 20:26:12.954703 36200 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0703 20:26:12.961750 36200 target.go:111] Terraform output is in /tmp/test3760212499/out --- PASS: TestPrivateSharedIP (1.44s) === RUN TestPrivateDns1 I0703 20:26:12.966592 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:12.966792 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:12.966831 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:12.966869 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:12.966905 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:12.966949 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:12.966986 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:12.967011 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:12.967048 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:12.967074 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0703 20:26:12.993411 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:12.993480 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:12.993527 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:14.453183 36200 executor.go:111] Tasks: 0 done / 135 total; 46 can run I0703 20:26:14.456772 36200 executor.go:111] Tasks: 46 done / 135 total; 28 can run I0703 20:26:14.457061 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "internal.example.com" I0703 20:26:14.457097 36200 zones.go:40] GetHostedZone { Id: "/hostedzone/Z2AFAKE1ZON3NO" } I0703 20:26:14.457174 36200 dnszone.go:248] Existing zone "internal.example.com." found; will configure TF to reuse I0703 20:26:14.457189 36200 dnszone.go:271] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding I0703 20:26:14.457422 36200 executor.go:111] Tasks: 74 done / 135 total; 39 can run I0703 20:26:14.457879 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:14.458024 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:14.460253 36200 executor.go:111] Tasks: 113 done / 135 total; 6 can run W0703 20:26:14.460333 36200 api.go:53] PageSize not implemented W0703 20:26:14.460399 36200 api.go:53] PageSize not implemented I0703 20:26:14.464735 36200 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0703 20:26:14.465000 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:14.465224 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:14.465420 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:14.465863 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:14.465957 36200 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0703 20:26:14.466260 36200 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0703 20:26:14.466527 36200 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0703 20:26:14.474328 36200 target.go:111] Terraform output is in /tmp/test2832902382/out --- PASS: TestPrivateDns1 (1.51s) === RUN TestPrivateDns2 I0703 20:26:14.479299 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:14.479491 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:14.479529 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:14.479570 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:14.479605 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:14.479648 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:14.479683 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:14.479708 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:14.479744 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:14.479769 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:14.510004 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:14.510078 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:14.510125 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:15.953036 36200 executor.go:111] Tasks: 0 done / 132 total; 45 can run I0703 20:26:15.956485 36200 executor.go:111] Tasks: 45 done / 132 total; 26 can run I0703 20:26:15.956655 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "private.example.com" I0703 20:26:15.956683 36200 zones.go:40] GetHostedZone { Id: "/hostedzone/Z3AFAKE1ZOMORE" } I0703 20:26:15.956762 36200 dnszone.go:248] Existing zone "private.example.com." found; will configure TF to reuse I0703 20:26:15.956781 36200 dnszone.go:262] VPC "vpc-12345678" already associated with zone "private.example.com." I0703 20:26:15.956833 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:26:15.957095 36200 executor.go:111] Tasks: 71 done / 132 total; 39 can run I0703 20:26:15.957555 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:15.957690 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:15.959518 36200 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0703 20:26:15.959663 36200 api.go:53] PageSize not implemented W0703 20:26:15.959802 36200 api.go:53] PageSize not implemented I0703 20:26:15.968793 36200 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0703 20:26:15.969121 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:15.969322 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:15.969506 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:15.969940 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:15.970031 36200 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0703 20:26:15.970287 36200 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0703 20:26:15.970588 36200 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0703 20:26:15.977882 36200 target.go:111] Terraform output is in /tmp/test3959091248/out --- PASS: TestPrivateDns2 (1.50s) === RUN TestDiscoveryFeatureGate I0703 20:26:15.982702 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:15.982884 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:15.982919 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:15.982957 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:15.982989 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:15.983032 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:15.983102 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:15.983127 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:15.983158 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:15.983182 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:16.003728 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:26:16.006294 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:16.006358 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:17.260004 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:17.438108 36200 executor.go:111] Tasks: 0 done / 113 total; 52 can run I0703 20:26:17.439443 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:17.439479 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:17.439563 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:17.440964 36200 executor.go:111] Tasks: 52 done / 113 total; 28 can run I0703 20:26:17.446424 36200 executor.go:111] Tasks: 80 done / 113 total; 25 can run I0703 20:26:17.446676 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:17.446928 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:17.447106 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:17.447488 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:17.447612 36200 executor.go:111] Tasks: 105 done / 113 total; 2 can run I0703 20:26:17.447869 36200 executor.go:111] Tasks: 107 done / 113 total; 6 can run I0703 20:26:17.448180 36200 executor.go:111] Tasks: 113 done / 113 total; 0 can run I0703 20:26:17.454796 36200 target.go:111] Terraform output is in /tmp/test3290820560/out --- PASS: TestDiscoveryFeatureGate (1.48s) === RUN TestVFSServiceAccountIssuerDiscovery I0703 20:26:17.460558 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:17.460754 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:17.460793 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:17.460854 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:17.460892 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:17.460935 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:17.460973 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:17.460997 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:17.461028 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:17.461053 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:17.485343 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:17.488221 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:17.488319 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:18.721978 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:18.870897 36200 executor.go:111] Tasks: 0 done / 104 total; 47 can run I0703 20:26:18.872059 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:18.872089 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:18.872188 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:18.874443 36200 executor.go:111] Tasks: 47 done / 104 total; 24 can run I0703 20:26:18.879974 36200 executor.go:111] Tasks: 71 done / 104 total; 25 can run I0703 20:26:18.880419 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:18.880601 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:18.880898 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:18.882309 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:18.882548 36200 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0703 20:26:18.883255 36200 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0703 20:26:18.883840 36200 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0703 20:26:18.891940 36200 target.go:111] Terraform output is in /tmp/test2596291247/out --- PASS: TestVFSServiceAccountIssuerDiscovery (1.44s) === RUN TestAWSLBController I0703 20:26:18.897349 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:18.897558 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:18.897596 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:18.897654 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:18.897692 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:18.897734 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:18.897772 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:18.897796 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:18.897830 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:18.897854 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:18.918914 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:18.921718 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:18.921791 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:20.177305 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:20.777607 36200 executor.go:111] Tasks: 0 done / 116 total; 54 can run I0703 20:26:20.779393 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:20.779408 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:20.779456 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:20.787707 36200 executor.go:111] Tasks: 54 done / 116 total; 29 can run I0703 20:26:20.793257 36200 executor.go:111] Tasks: 83 done / 116 total; 25 can run I0703 20:26:20.793624 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:20.793907 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:20.794585 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:20.794715 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:20.794854 36200 executor.go:111] Tasks: 108 done / 116 total; 2 can run I0703 20:26:20.795130 36200 executor.go:111] Tasks: 110 done / 116 total; 6 can run I0703 20:26:20.795379 36200 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0703 20:26:20.804055 36200 target.go:111] Terraform output is in /tmp/test1185589102/out --- PASS: TestAWSLBController (1.92s) === RUN TestManyAddons I0703 20:26:20.817725 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:20.817926 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:20.817967 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:20.818008 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:20.818042 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:20.818083 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:20.818120 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:20.818142 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:20.818172 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:20.818195 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:20.842562 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:20.845698 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:20.845771 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:22.115050 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:22.824897 36200 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0703 20:26:22.825807 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:22.825838 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:22.825925 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:22.828838 36200 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0703 20:26:22.833432 36200 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0703 20:26:22.833603 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:22.833854 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:22.833991 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:22.834445 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:22.834545 36200 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0703 20:26:22.834814 36200 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0703 20:26:22.835072 36200 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0703 20:26:22.847411 36200 target.go:111] Terraform output is in /tmp/test2980236427/out --- PASS: TestManyAddons (2.04s) === RUN TestManyAddonsCCMIRSA I0703 20:26:22.858347 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:22.858550 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:22.858593 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:22.858641 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:22.858678 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:22.858721 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:22.858759 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:22.858782 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:22.858820 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:22.858844 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:22.881022 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:22.883892 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:22.883960 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:24.149874 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:24.893637 36200 executor.go:111] Tasks: 0 done / 123 total; 59 can run I0703 20:26:24.895567 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:24.895600 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:24.895686 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:24.898233 36200 executor.go:111] Tasks: 59 done / 123 total; 30 can run I0703 20:26:24.909482 36200 executor.go:111] Tasks: 89 done / 123 total; 26 can run I0703 20:26:24.910030 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:24.910281 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:24.910638 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:24.910708 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:24.910775 36200 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0703 20:26:24.911073 36200 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0703 20:26:24.911314 36200 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0703 20:26:24.920494 36200 target.go:111] Terraform output is in /tmp/test516941171/out --- PASS: TestManyAddonsCCMIRSA (2.07s) === RUN TestManyAddonsCCMIRSA23 I0703 20:26:24.932485 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:24.932687 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:24.932725 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:24.932767 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:24.932803 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:24.932846 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:24.932883 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:24.932907 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:24.932940 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:24.932963 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:24.955606 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0703 20:26:24.958853 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:24.958926 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:26.221423 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:26.980460 36200 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0703 20:26:26.985195 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:26.985246 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:26.985387 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:26.991281 36200 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0703 20:26:26.995881 36200 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0703 20:26:26.996152 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:26.996722 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:26.996939 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:26.997340 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:26.997438 36200 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0703 20:26:26.997721 36200 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0703 20:26:26.997966 36200 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0703 20:26:27.006872 36200 target.go:111] Terraform output is in /tmp/test2960995437/out --- PASS: TestManyAddonsCCMIRSA23 (2.09s) === RUN TestManyAddonsCCMIRSA24 I0703 20:26:27.021858 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:27.022060 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:27.022099 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:27.022142 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:27.022175 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:27.022219 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:27.022256 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:27.022279 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:27.022311 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:27.022336 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:27.048299 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:26:27.051522 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:27.051594 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:28.292525 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:29.040044 36200 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0703 20:26:29.042510 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:29.042549 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:29.042647 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:29.045073 36200 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0703 20:26:29.049731 36200 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0703 20:26:29.049919 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:29.050147 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:29.050286 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:29.050824 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:29.050954 36200 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0703 20:26:29.051237 36200 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0703 20:26:29.051491 36200 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0703 20:26:29.060345 36200 target.go:111] Terraform output is in /tmp/test3658385114/out --- PASS: TestManyAddonsCCMIRSA24 (2.05s) === RUN TestManyAddonsCCMIRSA25 I0703 20:26:29.076337 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:29.076545 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:29.076581 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:29.076624 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:29.076657 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:29.076700 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:29.076735 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:29.076757 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:29.076788 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:29.076811 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:29.098558 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0703 20:26:29.101856 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:29.101924 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:30.341813 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:31.059380 36200 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0703 20:26:31.061559 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:31.061597 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:31.061680 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:31.069845 36200 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0703 20:26:31.075433 36200 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0703 20:26:31.075767 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:31.075891 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:31.076317 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:31.076370 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:31.076469 36200 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0703 20:26:31.076730 36200 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0703 20:26:31.076949 36200 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0703 20:26:31.086400 36200 target.go:111] Terraform output is in /tmp/test4198380819/out --- PASS: TestManyAddonsCCMIRSA25 (2.02s) === RUN TestManyAddonsCCMIRSA26 I0703 20:26:31.098330 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:31.098514 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:31.098551 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:31.098589 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:31.098621 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:31.098662 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:31.098700 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:31.098723 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:31.098755 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:31.098778 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:31.129289 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0703 20:26:31.132605 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:31.132686 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:32.385658 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:33.100035 36200 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0703 20:26:33.106873 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:33.106894 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:33.106937 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:33.109260 36200 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0703 20:26:33.114777 36200 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0703 20:26:33.115177 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:33.115371 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:33.115741 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:33.115812 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:33.115874 36200 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0703 20:26:33.116100 36200 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0703 20:26:33.116375 36200 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0703 20:26:33.125503 36200 target.go:111] Terraform output is in /tmp/test1186469228/out --- PASS: TestManyAddonsCCMIRSA26 (2.04s) === RUN TestManyAddonsGCE I0703 20:26:33.140019 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:26:35.191779 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:26:35.191836 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:26:35.191904 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/main" W0703 20:26:35.191920 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/events" W0703 20:26:35.191931 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com" W0703 20:26:35.191967 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0703 20:26:35.192748 36200 executor.go:111] Tasks: 0 done / 67 total; 44 can run I0703 20:26:35.201266 36200 executor.go:111] Tasks: 44 done / 67 total; 17 can run I0703 20:26:35.205757 36200 executor.go:111] Tasks: 61 done / 67 total; 4 can run I0703 20:26:35.206650 36200 executor.go:111] Tasks: 65 done / 67 total; 2 can run I0703 20:26:35.206814 36200 executor.go:111] Tasks: 67 done / 67 total; 0 can run I0703 20:26:35.212273 36200 target.go:111] Terraform output is in /tmp/test3774366824/out --- PASS: TestManyAddonsGCE (2.08s) === RUN TestCCM I0703 20:26:35.220196 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:35.220381 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:35.220419 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:35.220463 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:35.220495 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:35.220536 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:35.220570 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:35.220592 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:35.220623 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:35.220646 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:35.242291 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:35.245348 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:35.245419 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:36.512839 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:37.222245 36200 executor.go:111] Tasks: 0 done / 110 total; 51 can run I0703 20:26:37.223705 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:37.223727 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:37.223790 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:37.230896 36200 executor.go:111] Tasks: 51 done / 110 total; 24 can run I0703 20:26:37.235439 36200 executor.go:111] Tasks: 75 done / 110 total; 27 can run I0703 20:26:37.235633 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:37.235827 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:37.236198 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:37.236428 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:37.236535 36200 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0703 20:26:37.236771 36200 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0703 20:26:37.236954 36200 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0703 20:26:37.244230 36200 target.go:111] Terraform output is in /tmp/test1859073779/out --- PASS: TestCCM (2.03s) === RUN TestExternalDNS I0703 20:26:37.253062 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:37.253257 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:37.253295 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:37.253334 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:37.253368 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:37.253410 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:37.253447 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:37.253470 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:37.253503 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:37.253525 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:37.273601 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:37.276073 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:37.276138 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:38.504715 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:38.665958 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:26:38.666343 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:38.666374 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:38.666461 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:38.669290 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:26:38.674104 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:26:38.674452 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:38.674688 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:38.674844 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:38.675306 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:38.675409 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:26:38.675685 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:26:38.675926 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:26:38.681501 36200 target.go:111] Terraform output is in /tmp/test269982677/out --- PASS: TestExternalDNS (1.43s) === RUN TestExternalDNSIRSA I0703 20:26:38.686114 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:38.686301 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:38.686340 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:38.686383 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:38.686420 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:38.686463 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:38.686500 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:38.686523 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:38.686555 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:38.686579 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:38.712591 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:38.715327 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:38.715401 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:39.969607 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:40.153871 36200 executor.go:111] Tasks: 0 done / 112 total; 51 can run I0703 20:26:40.154418 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:40.154469 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:40.154583 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:40.157233 36200 executor.go:111] Tasks: 51 done / 112 total; 28 can run I0703 20:26:40.162344 36200 executor.go:111] Tasks: 79 done / 112 total; 25 can run I0703 20:26:40.162499 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:40.162788 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:40.163005 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:40.163383 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:40.163488 36200 executor.go:111] Tasks: 104 done / 112 total; 2 can run I0703 20:26:40.163739 36200 executor.go:111] Tasks: 106 done / 112 total; 6 can run I0703 20:26:40.163951 36200 executor.go:111] Tasks: 112 done / 112 total; 0 can run I0703 20:26:40.170607 36200 target.go:111] Terraform output is in /tmp/test2845346275/out --- PASS: TestExternalDNSIRSA (1.49s) === RUN TestKarpenter I0703 20:26:40.176304 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:40.176478 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:40.176512 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:40.176553 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:40.176585 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:40.176626 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:40.176660 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:40.176684 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:40.176713 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:40.176735 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:40.207389 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:26:40.210707 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:40.210776 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:40.210823 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.456246 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:41.614517 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.614608 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.614683 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0703 20:26:41.737413 36200 pruning.go:115] manifest includes an object of GroupKind Secret, which will not be pruned W0703 20:26:41.737481 36200 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0703 20:26:41.737511 36200 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned W0703 20:26:41.737524 36200 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0703 20:26:41.737532 36200 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned I0703 20:26:41.758430 36200 executor.go:111] Tasks: 0 done / 122 total; 54 can run I0703 20:26:41.760690 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:41.760728 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:41.761820 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:41.765999 36200 executor.go:111] Tasks: 54 done / 122 total; 31 can run I0703 20:26:41.770918 36200 executor.go:111] Tasks: 85 done / 122 total; 29 can run I0703 20:26:41.771273 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.771472 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.771685 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.771883 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.772093 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.772188 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.772347 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.772419 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.772486 36200 executor.go:111] Tasks: 114 done / 122 total; 2 can run I0703 20:26:41.772762 36200 executor.go:111] Tasks: 116 done / 122 total; 6 can run I0703 20:26:41.773025 36200 executor.go:111] Tasks: 122 done / 122 total; 0 can run I0703 20:26:41.781234 36200 target.go:111] Terraform output is in /tmp/test2249966026/out --- PASS: TestKarpenter (1.61s) === RUN TestSharedSubnet I0703 20:26:41.788669 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:41.788852 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:41.788890 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:41.788932 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:41.788966 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:41.789007 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:41.789042 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:41.789064 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:41.789094 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:41.789116 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:41.813155 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:41.816735 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:41.816810 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:43.055878 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:43.212821 36200 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0703 20:26:43.213832 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:43.213863 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:43.213939 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:43.215979 36200 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0703 20:26:43.216281 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:26:43.220671 36200 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0703 20:26:43.220870 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:43.221180 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:43.221511 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:43.221589 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:43.221662 36200 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0703 20:26:43.221905 36200 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0703 20:26:43.222171 36200 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0703 20:26:43.227553 36200 target.go:111] Terraform output is in /tmp/test4163358152/out --- PASS: TestSharedSubnet (1.45s) === RUN TestSharedVPC I0703 20:26:43.236113 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:43.236313 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:43.236350 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:43.236393 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:43.236426 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:43.236467 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:43.236502 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:43.236526 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:43.236557 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:43.236580 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:43.257015 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:43.259664 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:43.259731 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:44.496250 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:44.647345 36200 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0703 20:26:44.648578 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:44.648612 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:44.648696 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:44.655615 36200 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0703 20:26:44.655933 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:26:44.660892 36200 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0703 20:26:44.661088 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:44.661293 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:44.661468 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:44.661937 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:44.662024 36200 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0703 20:26:44.662260 36200 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0703 20:26:44.662539 36200 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0703 20:26:44.668364 36200 target.go:111] Terraform output is in /tmp/test3483179680/out --- PASS: TestSharedVPC (1.44s) === RUN TestSharedVPCIPv6 I0703 20:26:44.672956 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:44.673137 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:44.673173 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:44.673213 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:44.673245 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:44.673285 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:44.673318 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:44.673342 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:44.673374 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:44.673398 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:44.675141 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:26:44.675192 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:26:44.697592 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:26:44.697638 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0703 20:26:44.697722 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:26:44.701045 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:44.701111 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:45.956842 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:46.116550 36200 executor.go:111] Tasks: 0 done / 133 total; 45 can run I0703 20:26:46.118626 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:46.118658 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:46.118741 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:46.120064 36200 executor.go:111] Tasks: 45 done / 133 total; 29 can run I0703 20:26:46.120276 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:26:46.120389 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:26:46.122694 36200 executor.go:111] Tasks: 74 done / 133 total; 37 can run I0703 20:26:46.123480 36200 executor.go:111] Tasks: 111 done / 133 total; 6 can run I0703 20:26:46.123529 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:26:46.123588 36200 loadbalancers.go:35] PageSize not implemented I0703 20:26:46.123738 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:26:46.123808 36200 loadbalancers.go:35] PageSize not implemented I0703 20:26:46.127810 36200 executor.go:111] Tasks: 117 done / 133 total; 8 can run I0703 20:26:46.127969 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:46.128100 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:46.128511 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:46.128576 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:46.128701 36200 executor.go:111] Tasks: 125 done / 133 total; 2 can run I0703 20:26:46.128981 36200 executor.go:111] Tasks: 127 done / 133 total; 6 can run I0703 20:26:46.129277 36200 executor.go:111] Tasks: 133 done / 133 total; 0 can run I0703 20:26:46.135995 36200 target.go:111] Terraform output is in /tmp/test2988058240/out --- PASS: TestSharedVPCIPv6 (1.47s) === RUN TestExistingIAM I0703 20:26:46.140787 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:46.141012 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:46.141053 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:46.141099 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:46.141132 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:46.141191 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:46.141227 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:46.141257 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:46.141297 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:46.141320 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:46.173804 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:46.177069 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:46.177145 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:46.177194 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:46.177236 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.425428 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:47.580240 36200 executor.go:111] Tasks: 0 done / 117 total; 51 can run I0703 20:26:47.584529 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:47.584576 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:47.584721 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:47.588477 36200 executor.go:111] Tasks: 51 done / 117 total; 19 can run I0703 20:26:47.593608 36200 executor.go:111] Tasks: 70 done / 117 total; 31 can run I0703 20:26:47.594059 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.594238 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.594452 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.594643 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.594822 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.594900 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.594949 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.595078 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.595193 36200 executor.go:111] Tasks: 101 done / 117 total; 4 can run I0703 20:26:47.595512 36200 executor.go:111] Tasks: 105 done / 117 total; 12 can run I0703 20:26:47.595804 36200 executor.go:111] Tasks: 117 done / 117 total; 0 can run I0703 20:26:47.603514 36200 target.go:111] Terraform output is in /tmp/test2159106397/out --- PASS: TestExistingIAM (1.47s) === RUN TestPhaseNetwork I0703 20:26:47.608739 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:47.608929 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:47.608968 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:47.609015 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:47.609049 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:47.609093 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:47.609128 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:47.609151 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:47.609182 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:47.609206 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:47.636826 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:47.640544 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.640620 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:47.640666 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:48.905898 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:49.067351 36200 executor.go:111] Tasks: 0 done / 135 total; 47 can run I0703 20:26:49.068099 36200 executor.go:111] Tasks: 47 done / 135 total; 30 can run I0703 20:26:49.068672 36200 executor.go:111] Tasks: 77 done / 135 total; 36 can run I0703 20:26:49.069002 36200 executor.go:111] Tasks: 113 done / 135 total; 6 can run I0703 20:26:49.069210 36200 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0703 20:26:49.069439 36200 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0703 20:26:49.069513 36200 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0703 20:26:49.069585 36200 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0703 20:26:49.070524 36200 target.go:111] Terraform output is in /tmp/test665985259/out --- PASS: TestPhaseNetwork (1.46s) === RUN TestExternalLoadBalancer I0703 20:26:49.071177 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:49.071369 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:49.071408 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:49.071453 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:49.071489 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:49.071531 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:49.071570 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:49.071594 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:49.071627 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:49.071653 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:49.091876 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:49.094581 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:49.094661 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.336772 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:50.488823 36200 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0703 20:26:50.489349 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:50.489378 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:50.489465 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:50.491591 36200 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0703 20:26:50.496574 36200 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0703 20:26:50.496928 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.497170 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.497564 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.497647 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.497736 36200 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0703 20:26:50.497981 36200 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0703 20:26:50.498211 36200 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0703 20:26:50.503696 36200 target.go:111] Terraform output is in /tmp/test501179397/out --- PASS: TestExternalLoadBalancer (1.44s) === RUN TestPhaseIAM integration_test.go:1062: unable to test w/o allowing failed validation --- SKIP: TestPhaseIAM (0.00s) === RUN TestPhaseCluster integration_test.go:1070: unable to test w/o allowing failed validation --- SKIP: TestPhaseCluster (0.00s) === RUN TestMixedInstancesASG I0703 20:26:50.508435 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:50.508621 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:50.508657 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:50.508724 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:50.508760 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:50.508799 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:50.508839 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:50.508864 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:50.508896 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:50.508920 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:50.540312 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:50.543372 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.543452 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.543496 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.543535 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.543571 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.543604 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:50.543680 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:51.804790 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:51.961190 36200 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0703 20:26:51.968452 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:51.968486 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:51.968568 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:51.970176 36200 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0703 20:26:51.974942 36200 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0703 20:26:51.975252 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:51.975420 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:51.975654 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:51.975855 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:51.976048 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:51.976130 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:51.976207 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:51.976340 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:51.976442 36200 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0703 20:26:51.976764 36200 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0703 20:26:51.977077 36200 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0703 20:26:51.984564 36200 target.go:111] Terraform output is in /tmp/test3687294849/out --- PASS: TestMixedInstancesASG (1.49s) === RUN TestMixedInstancesSpotASG I0703 20:26:51.994308 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:51.994502 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:51.994538 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:51.994581 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:51.994614 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:51.994657 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:51.994692 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:51.994714 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:51.994744 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:51.994769 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:52.020823 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:52.023228 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:52.023283 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:52.023319 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:52.023350 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:52.023382 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:52.023408 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:52.023435 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.259687 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:53.426559 36200 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0703 20:26:53.426960 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:53.426992 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:53.427083 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:53.429484 36200 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0703 20:26:53.439251 36200 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0703 20:26:53.439557 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.439761 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.439929 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.440149 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.440251 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.440378 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.440453 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.440631 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.440729 36200 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0703 20:26:53.440989 36200 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0703 20:26:53.441321 36200 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0703 20:26:53.448950 36200 target.go:111] Terraform output is in /tmp/test1996405832/out --- PASS: TestMixedInstancesSpotASG (1.46s) === RUN TestAdditionalObjects I0703 20:26:53.454505 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:53.454690 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:53.454727 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:53.454767 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:53.454799 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:53.454840 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:53.454873 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:53.454896 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:53.454927 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:53.454950 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:53.476650 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0703 20:26:53.479297 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:53.479361 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:54.716086 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:54.863544 36200 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0703 20:26:54.867934 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:54.868026 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:54.868157 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:54.871507 36200 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0703 20:26:54.876390 36200 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0703 20:26:54.876697 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:54.876957 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:54.877273 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:54.877521 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:54.877657 36200 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0703 20:26:54.877943 36200 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0703 20:26:54.878221 36200 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0703 20:26:54.884089 36200 target.go:111] Terraform output is in /tmp/test396450077/out --- PASS: TestAdditionalObjects (1.43s) === RUN TestContainerd I0703 20:26:54.888848 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:54.889035 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:54.889074 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:54.889120 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:54.889157 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:54.889203 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:54.889240 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:54.889264 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:54.889297 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:54.889320 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:54.909944 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:54.912665 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:54.912761 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:56.155493 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:56.312403 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:26:56.312754 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:56.312782 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:56.312849 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:56.316254 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:26:56.320813 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:26:56.321003 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:56.321375 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:56.321537 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:56.322054 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:56.322190 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:26:56.322479 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:26:56.322773 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:26:56.328308 36200 target.go:111] Terraform output is in /tmp/test3530890721/out --- PASS: TestContainerd (1.44s) === RUN TestContainerdCustom I0703 20:26:56.333029 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:56.333229 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:56.333267 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:56.333307 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:56.333340 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:56.333384 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:56.333422 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:56.333446 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:56.333482 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:56.333508 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:56.358262 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:56.361611 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:56.361685 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:56.867462 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:57.018017 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:26:57.019609 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:57.019645 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:57.019748 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:57.021341 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:26:57.026231 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:26:57.026615 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.026835 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.027048 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.027443 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.027565 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:26:57.027877 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:26:57.028135 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:26:57.038625 36200 target.go:111] Terraform output is in /tmp/test2166194679/out --- PASS: TestContainerdCustom (0.71s) === RUN TestDockerCustom I0703 20:26:57.043647 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:57.043836 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:57.043873 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:57.043916 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:57.043950 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:57.043993 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:57.044027 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:57.044050 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:57.044081 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:57.044105 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:57.064857 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0703 20:26:57.067780 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.067850 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.543175 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:57.686371 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:26:57.688711 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:57.688739 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:57.688810 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:57.689313 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:26:57.693851 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:26:57.694152 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.694414 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.694808 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.694886 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.694965 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:26:57.695218 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:26:57.695495 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:26:57.705064 36200 target.go:111] Terraform output is in /tmp/test1873679620/out --- PASS: TestDockerCustom (0.67s) === RUN TestAPIServerNodes I0703 20:26:57.710382 36200 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0703 20:26:57.710405 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:57.710592 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:57.710629 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:57.710674 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:57.710711 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:57.710754 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:57.710794 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:57.710818 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:57.710876 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:57.710902 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:57.732904 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0703 20:26:57.735663 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.735728 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:57.735771 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:59.030381 36200 zones.go:93] ListHostedZonesPages { } I0703 20:26:59.177608 36200 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0703 20:26:59.177974 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:26:59.178007 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:26:59.178101 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:26:59.183931 36200 executor.go:111] Tasks: 47 done / 114 total; 28 can run I0703 20:26:59.191194 36200 executor.go:111] Tasks: 75 done / 114 total; 27 can run I0703 20:26:59.191560 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:59.191757 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:59.191969 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:59.192432 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:59.192547 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:59.192695 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:59.192782 36200 executor.go:111] Tasks: 102 done / 114 total; 3 can run I0703 20:26:59.193089 36200 executor.go:111] Tasks: 105 done / 114 total; 9 can run I0703 20:26:59.193390 36200 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0703 20:26:59.199539 36200 target.go:111] Terraform output is in /tmp/test1473946597/out I0703 20:26:59.204429 36200 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestAPIServerNodes (1.49s) === RUN TestNTHIMDSProcessor I0703 20:26:59.204526 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:26:59.204736 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:26:59.204772 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:26:59.204811 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:26:59.204860 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:26:59.204901 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:26:59.204938 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:26:59.204962 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:26:59.204994 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:26:59.205017 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:26:59.224970 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:26:59.227759 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:26:59.227830 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:00.491271 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:00.640954 36200 executor.go:111] Tasks: 0 done / 90 total; 44 can run I0703 20:27:00.644730 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:27:00.644787 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:00.644978 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:27:00.647336 36200 executor.go:111] Tasks: 44 done / 90 total; 19 can run I0703 20:27:00.653410 36200 executor.go:111] Tasks: 63 done / 90 total; 21 can run I0703 20:27:00.653712 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:00.653883 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:00.654199 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:00.654493 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:00.654590 36200 executor.go:111] Tasks: 84 done / 90 total; 2 can run I0703 20:27:00.654858 36200 executor.go:111] Tasks: 86 done / 90 total; 4 can run I0703 20:27:00.655067 36200 executor.go:111] Tasks: 90 done / 90 total; 0 can run I0703 20:27:00.660432 36200 target.go:111] Terraform output is in /tmp/test2425302639/out --- PASS: TestNTHIMDSProcessor (1.46s) === RUN TestNTHIMDSProcessorIRSA I0703 20:27:00.664554 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:00.664745 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:00.664783 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:00.664823 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:00.664854 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:00.664896 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:00.664932 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:00.664955 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:00.664985 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:00.665008 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:27:00.685960 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:00.688820 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:00.688894 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:01.913638 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:02.102463 36200 executor.go:111] Tasks: 0 done / 101 total; 50 can run I0703 20:27:02.102994 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:27:02.103029 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:02.103113 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:27:02.105758 36200 executor.go:111] Tasks: 50 done / 101 total; 24 can run I0703 20:27:02.114797 36200 executor.go:111] Tasks: 74 done / 101 total; 21 can run I0703 20:27:02.115094 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:02.115323 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:02.115628 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:02.115957 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:02.116051 36200 executor.go:111] Tasks: 95 done / 101 total; 2 can run I0703 20:27:02.116602 36200 executor.go:111] Tasks: 97 done / 101 total; 4 can run I0703 20:27:02.116915 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:27:02.124089 36200 target.go:111] Terraform output is in /tmp/test2496120286/out --- PASS: TestNTHIMDSProcessorIRSA (1.46s) === RUN TestCustomIRSA I0703 20:27:02.129474 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:02.129667 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:02.129706 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:02.129750 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:02.129786 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:02.129829 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:02.129867 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:02.129892 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:02.129925 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:02.129949 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:27:02.153224 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:02.156296 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:02.156364 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:03.405838 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:03.934174 36200 executor.go:111] Tasks: 0 done / 114 total; 52 can run I0703 20:27:03.934565 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:27:03.934580 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:03.934625 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:27:03.942005 36200 executor.go:111] Tasks: 52 done / 114 total; 29 can run I0703 20:27:03.947070 36200 executor.go:111] Tasks: 81 done / 114 total; 25 can run I0703 20:27:03.947412 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:03.947666 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:03.948075 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:03.948163 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:03.948261 36200 executor.go:111] Tasks: 106 done / 114 total; 2 can run I0703 20:27:03.948564 36200 executor.go:111] Tasks: 108 done / 114 total; 6 can run I0703 20:27:03.948853 36200 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0703 20:27:03.955789 36200 target.go:111] Terraform output is in /tmp/test4262078043/out --- PASS: TestCustomIRSA (1.83s) === RUN TestClusterNameDigit I0703 20:27:03.963353 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:03.963531 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:03.963567 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:03.963612 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:03.963648 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:03.963690 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:03.963726 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:03.963749 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:03.963780 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:03.963805 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:27:03.989301 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:03.992239 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:03.992311 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:05.238921 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:05.396095 36200 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0703 20:27:05.396498 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:27:05.396539 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:05.396669 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:27:05.399652 36200 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0703 20:27:05.404120 36200 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0703 20:27:05.404426 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:05.404603 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:05.404953 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:05.405002 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:05.405103 36200 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0703 20:27:05.406245 36200 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0703 20:27:05.406876 36200 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0703 20:27:05.415984 36200 target.go:111] Terraform output is in /tmp/test3783012240/out --- PASS: TestClusterNameDigit (1.46s) === RUN TestCASPriorityExpander I0703 20:27:05.421071 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:05.421394 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:05.421453 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:05.421527 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:05.421587 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:05.421662 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:05.421731 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:05.421775 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:05.421831 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:05.421854 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:27:05.443822 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0703 20:27:05.446182 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:05.446235 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:05.446267 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:05.446297 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0703 20:27:07.471863 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:07.643977 36200 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0703 20:27:07.644562 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:27:07.644597 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:07.644685 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:27:07.647831 36200 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0703 20:27:07.652447 36200 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0703 20:27:07.652761 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.653038 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.653255 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.653479 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.653683 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.653793 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.654026 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.654102 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.654200 36200 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0703 20:27:07.654519 36200 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0703 20:27:07.654825 36200 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0703 20:27:07.661722 36200 target.go:111] Terraform output is in /tmp/test616588330/out --- PASS: TestCASPriorityExpander (2.25s) === RUN TestCASPriorityExpanderCustom I0703 20:27:07.666919 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:07.667102 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:07.667139 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:07.667178 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:07.667211 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:07.667252 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:07.667287 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:07.667311 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:07.667344 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:07.667366 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:27:07.698107 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0703 20:27:07.700710 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.700779 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.700817 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:07.700883 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0703 20:27:08.936155 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:09.105318 36200 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0703 20:27:09.105572 36200 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0703 20:27:09.105604 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:09.105697 36200 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0703 20:27:09.108465 36200 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0703 20:27:09.113448 36200 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0703 20:27:09.113676 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:09.113945 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:09.114193 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:09.114416 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:09.114503 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:09.114675 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:09.114760 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:09.115057 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:09.115145 36200 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0703 20:27:09.115557 36200 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0703 20:27:09.115919 36200 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0703 20:27:09.122744 36200 target.go:111] Terraform output is in /tmp/test2974696963/out --- PASS: TestCASPriorityExpanderCustom (1.46s) === RUN TestLifecycleMinimalAWS I0703 20:27:09.128097 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:09.128341 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:09.128381 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:09.128431 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:09.128466 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:09.128514 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:09.128553 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:09.128584 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:09.128620 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:09.128642 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0703 20:27:09.148841 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0703 20:27:09.151357 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:09.151425 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0703 20:27:10.440339 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:10.588351 36200 iamrole.go:89] ListRoles: { } I0703 20:27:10.589661 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:27:10.590079 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:10.590238 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:10.590334 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0703 20:27:10.590359 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:10.590487 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0703 20:27:10.590566 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:10.590813 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0703 20:27:10.590951 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0703 20:27:10.590949 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.591193 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:10.591383 36200 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.591385 36200 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0703 20:27:10.591533 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:10.591587 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:10.591713 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:10.591750 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:10.591905 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:10.592021 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:10.592086 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0703 20:27:10.592136 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0703 20:27:10.592159 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:10.592231 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:10.592976 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:27:10.593142 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:10.593267 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:10.593445 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0703 20:27:10.593376 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0703 20:27:10.593501 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0703 20:27:10.593535 36200 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0703 20:27:10.593586 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0703 20:27:10.593621 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0703 20:27:10.593777 36200 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.593852 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:10.593804 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0703 20:27:10.593909 36200 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0703 20:27:10.593952 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:10.594128 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], VpcId: "vpc-1" } I0703 20:27:10.594139 36200 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0703 20:27:10.594278 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0703 20:27:10.594465 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:10.594551 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:10.594600 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:10.594641 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0703 20:27:10.594778 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0703 20:27:10.594857 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:10.594955 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:10.594919 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0703 20:27:10.595008 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:10.595060 36200 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0703 20:27:10.595131 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:10.595195 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:10.595235 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:10.595220 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0703 20:27:10.597798 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:27:10.598123 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.598330 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0703 20:27:10.598535 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.598661 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.598766 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0703 20:27:10.598939 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.599120 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.599327 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:10.599416 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0703 20:27:10.599588 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:10.599740 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:27:10.599817 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:10.599883 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.600009 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.600129 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:10.600191 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:10.600235 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" }] }] } I0703 20:27:10.600421 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:27:10.600482 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:10.600578 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:10.600663 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0703 20:27:10.600845 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.600975 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:27:10.601090 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0703 20:27:10.601131 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0703 20:27:10.601246 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:27:10.601512 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:27:10.601803 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:27:10.601846 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:10.601882 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:10.601948 36200 dns.go:235] Pre-creating DNS records I0703 20:27:10.601980 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:10.611460 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0703 20:27:10.614909 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:10.615041 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0703 20:27:11.925998 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:12.076301 36200 iamrole.go:89] ListRoles: { } I0703 20:27:12.077514 36200 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0703 20:27:12.078155 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:12.078330 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.078484 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.078609 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.078895 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:12.079179 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0703 20:27:12.079282 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:12.079313 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:12.079372 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:12.080185 36200 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0703 20:27:12.080299 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0703 20:27:12.080346 36200 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0703 20:27:12.080518 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.080654 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0703 20:27:12.080791 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:12.080863 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.081022 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0703 20:27:12.081174 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:12.081245 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:12.081329 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:12.081394 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.081501 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:12.084814 36200 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0703 20:27:12.084962 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:12.085100 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:12.085315 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:12.085465 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:12.085602 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:12.085737 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:12.085913 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:12.086638 36200 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0703 20:27:12.086870 36200 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0703 20:27:12.087031 36200 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0703 20:27:12.089132 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:27:12.089188 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:12.089221 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:27:12.089248 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:27:12.089272 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:27:12.089296 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:27:12.089318 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:12.089349 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:27:12.089374 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:27:12.089401 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:27:12.089433 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:27:12.089456 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:27:12.089478 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:12.089504 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:27:12.089525 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:12.089549 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:12.089574 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:12.089599 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:12.089621 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:27:12.089642 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:27:12.089663 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:12.089689 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:12.089715 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:12.089740 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:27:12.090793 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:27:12.090884 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:27:12.090906 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:27:12.090940 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.090980 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0703 20:27:12.091023 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.091069 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.091104 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.091146 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.091179 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.091209 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0703 20:27:12.091247 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.091287 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:27:12.091320 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0703 20:27:12.091356 36200 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0703 20:27:12.091388 36200 api.go:53] PageSize not implemented I0703 20:27:12.091407 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:12.091429 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:12.091445 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:27:12.091487 36200 targetgroups.go:35] PageSize not implemented I0703 20:27:12.091503 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0703 20:27:12.091544 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:27:12.091577 36200 iamrole.go:89] ListRoles: { } I0703 20:27:12.091610 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:12.091631 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:12.091668 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:27:12.091704 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:12.091733 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:12.092189 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-2 ok autoscaling-group:nodes.minimal.example.com ok I0703 20:27:12.092291 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } I0703 20:27:12.092276 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0703 20:27:12.092331 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } volume:vol-2 ok autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0703 20:27:12.092348 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0703 20:27:12.092422 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0703 20:27:12.092494 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0703 20:27:12.092348 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } iam-instance-profile:nodes.minimal.example.com ok route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.minimal.example.com. ok I0703 20:27:12.092381 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0703 20:27:12.092593 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:12.092614 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0703 20:27:12.092644 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:12.092681 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0703 20:27:12.092769 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:12.092791 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-1 ok I0703 20:27:12.092841 36200 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0703 20:27:12.092915 36200 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0703 20:27:12.092967 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0703 20:27:12.093065 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0703 20:27:12.093110 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0703 20:27:12.093083 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0703 20:27:12.093125 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0703 20:27:12.093163 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0703 20:27:12.093194 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0703 20:27:12.093227 36200 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0703 20:27:12.093239 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0703 20:27:12.093261 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0703 20:27:12.093315 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0703 20:27:12.093383 36200 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0703 20:27:12.093446 36200 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleMinimalAWS (2.97s) === RUN TestLifecycleMinimalOpenstack I0703 20:27:12.094026 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster minimal-openstack.k8s.local I0703 20:27:12.102256 36200 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:27:13.506428 36200 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0703 20:27:13.506467 36200 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0703 20:27:13.520578 36200 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2024/07/03 20:27:13 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:13 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0703 20:27:13.526279 36200 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0703 20:27:13.539055 36200 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0703 20:27:13.542198 36200 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2024/07/03 20:27:13 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:13 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:13 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0703 20:27:13.544444 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0703 20:27:13.544560 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0703 20:27:13.544690 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0703 20:27:14.548985 36200 executor.go:111] Tasks: 92 done / 92 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:27:15.921421 36200 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0703 20:27:15.921450 36200 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0703 20:27:15.940844 36200 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2024/07/03 20:27:15 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:15 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0703 20:27:15.945734 36200 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0703 20:27:15.955320 36200 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0703 20:27:15.958332 36200 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2024/07/03 20:27:15 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:15 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:15 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0703 20:27:15.960692 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0703 20:27:15.961345 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0703 20:27:15.961467 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0703 20:27:15.961763 36200 executor.go:111] Tasks: 92 done / 92 total; 0 can run I0703 20:27:15.963019 36200 delete_cluster.go:128] Looking for cloud resources to delete 2024/07/03 20:27:15 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) SSHKey:kubernetes-minimal-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Network:e7ae8e90-3975-476d-b18c-fd3b58cf0d54 ok Subnet:1356f3a2-4a0e-4ffa-8d5f-29f82544a9f9 ok Instance:5e58e6c1-e1e9-4a10-a913-d97caf7006cf ok ServerGroup:b6b32eb7-296c-4a68-93e5-da8abc33d497 ok SecurityGroup:f209ece3-d8a1-4b30-bdb0-47433302889e ok Instance:0c426642-1352-4c52-8f68-eff0acc879c3 ok Port:85df7d66-c458-4cc5-a320-618b6a5207fc ok SecurityGroup:9f228c45-50d6-49b4-a1f1-3294da280832 ok Port:d7dd36c5-1c1f-4cc7-bd7e-c0d2881d7c71 ok ServerGroup:3771c562-c714-442d-b613-a201438aff2c ok Port:26a0f2c2-a5d4-4488-ba1a-a0c6913dee5f ok SecurityGroup:aa064c88-a6ec-46be-b95e-ba01d5ac2697 ok Instance:e7d155b0-0282-4d16-8d76-8d91bf462714 ok --- PASS: TestLifecycleMinimalOpenstack (4.98s) === RUN TestLifecycleMinimalGCE I0703 20:27:17.073462 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:479: running lifecycle test for cluster minimal-gce.example.com I0703 20:27:17.075066 36200 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:27:18.671331 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:27:18.671415 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:27:18.671490 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0703 20:27:18.671510 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0703 20:27:18.671524 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0703 20:27:18.671571 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0703 20:27:18.675374 36200 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0703 20:27:18.680993 36200 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0703 20:27:18.686857 36200 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0703 20:27:18.687659 36200 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0703 20:27:18.687832 36200 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0703 20:27:18.687919 36200 dns.go:235] Pre-creating DNS records ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:27:20.334344 36200 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0703 20:27:20.334426 36200 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0703 20:27:20.334516 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0703 20:27:20.334538 36200 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0703 20:27:20.334559 36200 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0703 20:27:20.334627 36200 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0703 20:27:20.335880 36200 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0703 20:27:20.338810 36200 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0703 20:27:20.343110 36200 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0703 20:27:20.344141 36200 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0703 20:27:20.344326 36200 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0703 20:27:20.345620 36200 delete_cluster.go:128] Looking for cloud resources to delete I0703 20:27:20.345673 36200 gce.go:99] Scanning zones: [us-test1-a] I0703 20:27:20.345973 36200 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" I0703 20:27:20.345991 36200 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" FirewallRule:master-to-node-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-master-us-test1-a-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-ipv6-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/node-minimal-gce-example-com@testproject.iam.gserviceaccount.com ok Disk:a-etcd-main-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/control-plane-minimal-g-fu1mg6@testproject.iam.gserviceaccount.com ok FirewallRule:nodeport-external-to-node-minimal-gce-example-com ok FirewallRule:node-to-master-minimal-gce-example-com ok FirewallRule:node-to-node-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-minimal-gce-example-com ok Disk:a-etcd-events-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-nodes-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-ipv6-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-ipv6-minimal-gce-example-com ok FirewallRule:master-to-master-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-ipv6-minimal-gce-example-com ok InstanceTemplate:master-us-test1-a-minimal-do16cp-1720038438 ok InstanceTemplate:nodes-minimal-gce-example-com-1720038438 ok Subnet:us-test1-minimal-gce-example-com ok Network:minimal-gce-example-com ok --- PASS: TestLifecycleMinimalGCE (3.27s) === RUN TestLifecycleFloatingIPOpenstack I0703 20:27:20.347334 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster floatingip-openstack.k8s.local I0703 20:27:20.353776 36200 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:27:21.736602 36200 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0703 20:27:21.736638 36200 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0703 20:27:21.751034 36200 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2024/07/03 20:27:21 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:21 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0703 20:27:21.755527 36200 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0703 20:27:21.768402 36200 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0703 20:27:21.770814 36200 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2024/07/03 20:27:21 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:21 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:21 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0703 20:27:21.772706 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0703 20:27:21.772914 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0703 20:27:22.776735 36200 executor.go:111] Tasks: 94 done / 94 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0703 20:27:24.132732 36200 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0703 20:27:24.132767 36200 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0703 20:27:24.148828 36200 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2024/07/03 20:27:24 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:24 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0703 20:27:24.158166 36200 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0703 20:27:24.164793 36200 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0703 20:27:24.166581 36200 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2024/07/03 20:27:24 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:24 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/07/03 20:27:24 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0703 20:27:24.169418 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0703 20:27:24.169554 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0703 20:27:24.169771 36200 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0703 20:27:24.170065 36200 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0703 20:27:24.171407 36200 delete_cluster.go:128] Looking for cloud resources to delete 2024/07/03 20:27:24 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) Router-IF:fe2e7715-dc36-478f-b86a-d202938d8ac2 ok SecurityGroup:08761e16-8cfa-45fc-9fa4-7925ae8dcec9 ok Router:3627b13f-29f6-4d70-8ae0-2fb146e460d1 ok Port:d14e8e1c-5418-4e2f-b19e-57c6c610ab06 ok SecurityGroup:325fd64d-5fe3-48a7-9111-15f4bbf496d1 ok Port:51d08bf6-6bad-4f92-9bb1-80523bb93119 ok SecurityGroup:4d19a4cf-9f46-4526-a081-51132af3f4f1 ok Port:269db6bd-ee1f-4f5a-9a72-b41dfbcd3657 ok Instance:226656e1-3ee3-49a6-9f34-c2108a2b5b8a ok ServerGroup:50d40fc4-a9a3-4180-afef-d8d10c13a99c ok Network:c5604ce5-f81b-4e15-8156-292d1b7d9c6e ok ServerGroup:d9a3c618-2ae9-4ba4-a01f-d2f802de3f16 ok Instance:6a59a5a0-e159-436d-8e02-2a44cd35e04e ok Instance:94bbb169-6fd5-4495-aad4-fca9174f9cfb ok SSHKey:kubernetes-floatingip-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Subnet:fe2e7715-dc36-478f-b86a-d202938d8ac2 ok Port:43ebf8b7-4c80-4a46-bb63-4451bec48afb ok --- PASS: TestLifecycleFloatingIPOpenstack (4.93s) === RUN TestLifecyclePrivateCalico I0703 20:27:25.280078 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:25.280488 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:25.280586 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:25.280664 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:25.280750 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:25.280868 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:25.280967 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:25.281025 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:25.281104 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:25.281151 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatecalico.example.com I0703 20:27:25.309616 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:27:25.312761 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:25.312840 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:25.312885 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:26.538873 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:26.888831 36200 iamrole.go:89] ListRoles: { } I0703 20:27:26.890086 36200 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0703 20:27:26.890345 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:26.890454 36200 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.890524 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:26.890495 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:26.890574 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:26.890683 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } I0703 20:27:26.890742 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.890780 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", Tags: [{ Key: "Name", Value: "bastions.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0703 20:27:26.890946 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } I0703 20:27:26.892575 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:26.891004 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0703 20:27:26.893902 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } I0703 20:27:26.893761 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:26.894034 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] } I0703 20:27:26.894228 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:26.894661 36200 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.894570 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:26.894908 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:26.894998 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-main.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:26.895403 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:26.895565 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0703 20:27:26.895620 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0703 20:27:26.895699 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:26.896314 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:26.897660 36200 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0703 20:27:26.897804 36200 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0703 20:27:26.897808 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0703 20:27:26.897807 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:26.897943 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0703 20:27:26.897937 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:26.897990 36200 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatecalico-exa-hocohm", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatecalico-exa-hocohm" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0703 20:27:26.898053 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0703 20:27:26.898091 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0703 20:27:26.898099 36200 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0703 20:27:26.898141 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0703 20:27:26.898103 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0703 20:27:26.898164 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], VpcId: "vpc-1" } I0703 20:27:26.898251 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:26.898224 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0703 20:27:26.898313 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0703 20:27:26.898348 36200 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0703 20:27:26.898378 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0703 20:27:26.898306 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["privatecalico.example.com"] }] } I0703 20:27:26.898462 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0703 20:27:26.898528 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0703 20:27:26.898625 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0703 20:27:26.898724 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:26.898803 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:26.898843 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:26.898876 36200 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" } ] } I0703 20:27:26.898948 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:26.899014 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:26.899045 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:26.899072 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:26.899217 36200 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0703 20:27:26.899251 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0703 20:27:26.899337 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] }] } I0703 20:27:26.899414 36200 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.899476 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:26.899516 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.privatecalico.example.com" } ] }], VpcId: "vpc-1" } I0703 20:27:26.899545 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0703 20:27:26.899639 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:26.899703 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:27:26.899742 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:26.899826 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:27:26.899680 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.privatecalico.example.com" } ] }], VpcId: "vpc-1" } I0703 20:27:26.899899 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:27:26.899964 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:26.900068 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0703 20:27:26.900145 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:27:26.900206 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:26.900259 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:26.899958 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatecalico.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0703 20:27:26.900316 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:26.900360 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:26.900404 36200 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0703 20:27:26.900488 36200 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0703 20:27:26.900532 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:26.900608 36200 executor.go:111] Tasks: 79 done / 142 total; 41 can run W0703 20:27:26.900936 36200 api.go:53] PageSize not implemented I0703 20:27:26.900807 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0703 20:27:26.901012 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:26.901026 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:26.901097 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:26.901154 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0703 20:27:26.901200 36200 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatecalico-exa-hocohm", SubnetMappings: [{ SubnetId: "subnet-1" }], Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.privatecalico.example.com" }], Type: "network" } I0703 20:27:26.901074 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:26.901297 36200 tags.go:74] AddTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"], Tags: [{ Key: "Name", Value: "api.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0703 20:27:26.901272 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.901380 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:26.901412 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:26.901407 36200 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0703 20:27:26.901456 36200 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0703 20:27:26.901472 36200 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1", Port: 22, Protocol: "TCP" } W0703 20:27:26.901553 36200 api.go:53] PageSize not implemented I0703 20:27:26.901571 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:26.901612 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0703 20:27:26.901758 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:26.901898 36200 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.901904 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0703 20:27:26.902005 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.902188 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.902309 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.902419 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-4003to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0703 20:27:26.902569 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:26.902630 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:26.902692 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-2382to4000-masters.privatecalico.example.com" }] }] } I0703 20:27:26.902804 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.902917 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:26.902984 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.903094 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-::/0" }] }] } I0703 20:27:26.903199 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0703 20:27:26.903275 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0703 20:27:26.903393 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" }] }] } I0703 20:27:26.903500 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:27:26.903571 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.903670 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-udp-1to65535-masters.privatecalico.example.com" }] }] } I0703 20:27:26.903774 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.903875 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:26.903961 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:26.904036 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.904212 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0703 20:27:26.904306 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-4-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.904415 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-1to2379-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.904522 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:27:26.904599 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0703 20:27:26.904640 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0703 20:27:26.904676 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0703 20:27:26.904706 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.904809 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-nodes.privatecalico.example.com" }] }] } I0703 20:27:26.904928 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.905043 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.905145 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0703 20:27:26.905242 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0703 20:27:26.905278 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0703 20:27:26.905333 36200 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0703 20:27:26.905387 36200 api.go:53] PageSize not implemented I0703 20:27:26.905407 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:26.905445 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:26.905450 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:26.905536 36200 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-1"] }] } W0703 20:27:26.905606 36200 api.go:53] PageSize not implemented I0703 20:27:26.905508 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:26.905659 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:26.905663 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:26.905642 36200 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-1", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0703 20:27:26.905739 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0703 20:27:26.905773 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:26.905732 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:26.905805 36200 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0703 20:27:26.910345 36200 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0703 20:27:26.910478 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:26.910668 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0703 20:27:26.910740 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:26.910849 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:26.910927 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:26.911028 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:26.911666 36200 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0703 20:27:26.911896 36200 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0703 20:27:26.912098 36200 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0703 20:27:26.912142 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:26.912174 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:26.912234 36200 dns.go:235] Pre-creating DNS records I0703 20:27:26.912255 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:26.917725 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:27:26.920847 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:26.920919 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:26.920963 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:28.157417 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:28.543187 36200 iamrole.go:89] ListRoles: { } I0703 20:27:28.545060 36200 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0703 20:27:28.545283 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.545421 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.545551 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:28.545582 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:28.545628 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:28.545673 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.545812 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.545928 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:28.546303 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:28.547978 36200 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0703 20:27:28.548213 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0703 20:27:28.548267 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.548398 36200 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0703 20:27:28.548404 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:28.548462 36200 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0703 20:27:28.548462 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0703 20:27:28.548522 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0703 20:27:28.548555 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0703 20:27:28.548495 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0703 20:27:28.548668 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:28.548718 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:28.548796 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.548901 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.548999 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] }] } I0703 20:27:28.549102 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:28.549129 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0703 20:27:28.549246 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:28.549282 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0703 20:27:28.549388 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:28.549423 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.549521 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:28.549550 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0703 20:27:28.549662 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:27:28.549774 36200 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0703 20:27:28.549886 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:28.549949 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:28.549968 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0703 20:27:28.549966 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:28.550004 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } W0703 20:27:28.550060 36200 api.go:53] PageSize not implemented I0703 20:27:28.550083 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0703 20:27:28.550128 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0703 20:27:28.550091 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:28.550093 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:28.550160 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0703 20:27:28.550179 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:28.550193 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:28.550212 36200 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatecalico-example-0uch4k" } W0703 20:27:28.550303 36200 api.go:53] PageSize not implemented I0703 20:27:28.550320 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:28.550329 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:28.550591 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:28.550934 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:28.551012 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0703 20:27:28.551048 36200 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0703 20:27:28.551080 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0703 20:27:28.551165 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:28.551327 36200 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0703 20:27:28.551397 36200 api.go:53] PageSize not implemented I0703 20:27:28.551439 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:28.551408 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:28.551509 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0703 20:27:28.551437 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0703 20:27:28.551567 36200 api.go:53] PageSize not implemented I0703 20:27:28.551616 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:28.551647 36200 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0703 20:27:28.551657 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:28.551602 36200 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0703 20:27:28.551731 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:28.551819 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:28.555838 36200 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0703 20:27:28.555961 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:28.556093 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:28.556180 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:28.556323 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:28.556375 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:28.556708 36200 executor.go:111] Tasks: 134 done / 142 total; 2 can run W0703 20:27:28.556812 36200 api.go:53] PageSize not implemented I0703 20:27:28.556835 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:28.557018 36200 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0703 20:27:28.557216 36200 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0703 20:27:28.559974 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:27:28.560028 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:28.560059 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:27:28.560084 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0703 20:27:28.560116 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:27:28.560141 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:27:28.560162 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:27:28.560186 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:28.560211 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:27:28.560233 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:27:28.560260 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:27:28.560291 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0703 20:27:28.560317 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0703 20:27:28.560343 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:27:28.560366 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:27:28.560390 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:28.560415 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:27:28.560437 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:27:28.560462 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:28.560486 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:28.560509 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:27:28.560533 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0703 20:27:28.560557 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:28.560583 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:28.560605 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:27:28.560631 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:27:28.560653 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:27:28.560676 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:28.560701 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:28.560727 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:28.560751 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:27:28.562049 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:27:28.562111 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:27:28.562127 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:27:28.562163 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.562213 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0703 20:27:28.562272 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.562322 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.562357 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.562399 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.562432 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.562466 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0703 20:27:28.562509 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.562549 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:28.562571 36200 natgateway.go:117] DescribeNatGateways: { } I0703 20:27:28.562600 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0703 20:27:28.562632 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } W0703 20:27:28.562672 36200 api.go:53] PageSize not implemented I0703 20:27:28.562687 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0703 20:27:28.562718 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:28.562738 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:28.562751 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0703 20:27:28.562781 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:27:28.562800 36200 targetgroups.go:35] PageSize not implemented I0703 20:27:28.562813 36200 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" ] } I0703 20:27:28.562865 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:27:28.562898 36200 iamrole.go:89] ListRoles: { } I0703 20:27:28.562936 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:28.562959 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:28.562994 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:27:28.563033 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:28.563068 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1"] } I0703 20:27:28.563097 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0703 20:27:28.563126 36200 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } autoscaling-config:lt-3 ok I0703 20:27:28.563687 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok I0703 20:27:28.563748 36200 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0703 20:27:28.563795 36200 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0703 20:27:28.563798 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0703 20:27:28.563815 36200 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0703 20:27:28.563834 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } autoscaling-group:bastion.privatecalico.example.com ok I0703 20:27:28.563872 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } autoscaling-config:lt-2 ok target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4 ok I0703 20:27:28.563886 36200 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatecalico-example-0uch4k" } load-balancer:api-privatecalico-example-0uch4k ok autoscaling-group:nodes.privatecalico.example.com ok I0703 20:27:28.563941 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } autoscaling-group:master-us-test-1a.masters.privatecalico.example.com ok I0703 20:27:28.563949 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0703 20:27:28.564016 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } iam-instance-profile:bastions.privatecalico.example.com ok I0703 20:27:28.563745 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:28.564032 36200 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.privatecalico.example.com. ok I0703 20:27:28.564048 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1 ok I0703 20:27:28.564100 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } iam-instance-profile:masters.privatecalico.example.com ok iam-instance-profile:nodes.privatecalico.example.com ok volume:vol-1 ok I0703 20:27:28.564001 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0703 20:27:28.564269 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:28.564292 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0703 20:27:28.564330 36200 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0703 20:27:28.564382 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:28.564425 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } W0703 20:27:28.564538 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:28.564562 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0703 20:27:28.564597 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0703 20:27:28.564649 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:28.564689 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 } ] } W0703 20:27:28.564844 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:28.564856 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0703 20:27:28.564956 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:28.564968 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatecalico.example.com" } I0703 20:27:28.565037 36200 iamrole.go:180] ListAttachedRolePolicies: masters.privatecalico.example.com I0703 20:27:28.565061 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0703 20:27:28.565105 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.privatecalico.example.com" } iam-role:masters.privatecalico.example.com ok I0703 20:27:28.565149 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatecalico.example.com" } I0703 20:27:28.565036 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 } ] } W0703 20:27:28.565243 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:28.565260 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0703 20:27:28.565213 36200 iamrole.go:180] ListAttachedRolePolicies: bastions.privatecalico.example.com I0703 20:27:28.565306 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0703 20:27:28.565310 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0703 20:27:28.565358 36200 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatecalico.example.com" } iam-role:bastions.privatecalico.example.com ok I0703 20:27:28.565373 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0703 20:27:28.565391 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatecalico.example.com" } I0703 20:27:28.565458 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.privatecalico.example.com I0703 20:27:28.565479 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0703 20:27:28.565517 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatecalico.example.com" } iam-role:nodes.privatecalico.example.com ok I0703 20:27:28.565458 36200 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0703 20:27:28.565603 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0703 20:27:28.565687 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0703 20:27:28.565775 36200 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0703 20:27:28.565852 36200 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateCalico (3.29s) === RUN TestLifecyclePrivateKopeio I0703 20:27:28.566386 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:28.566611 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:28.566647 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:28.566682 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:28.566715 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:28.566752 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:28.566785 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:28.566807 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:28.566838 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:28.566862 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatekopeio.example.com I0703 20:27:28.590292 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:28.593264 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:28.593330 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:28.593376 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:29.808842 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:29.972374 36200 iamrole.go:89] ListRoles: { } I0703 20:27:29.974400 36200 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0703 20:27:29.975094 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.975249 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:29.975295 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:29.975424 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:29.975472 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] }] } I0703 20:27:29.975452 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } I0703 20:27:29.975559 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:29.975577 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "bastions.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0703 20:27:29.975715 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.975756 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } I0703 20:27:29.975862 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0703 20:27:29.975849 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.975933 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } I0703 20:27:29.976001 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0703 20:27:29.976008 36200 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.976040 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatekopeio.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:29.976281 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:29.976359 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.976604 36200 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" }] }] } I0703 20:27:29.976760 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:29.976832 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0703 20:27:29.976883 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0703 20:27:29.976923 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:29.976977 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:29.977475 36200 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0703 20:27:29.977631 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0703 20:27:29.977749 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0703 20:27:29.977681 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0703 20:27:29.977899 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0703 20:27:29.977964 36200 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0703 20:27:29.977871 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.977858 36200 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatekopeio-exa-d8ef8e", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatekopeio-exa-d8ef8e" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0703 20:27:29.978023 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:29.978061 36200 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0703 20:27:29.978009 36200 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0703 20:27:29.978125 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0703 20:27:29.978188 36200 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0703 20:27:29.978212 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0703 20:27:29.978262 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0703 20:27:29.978260 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.978292 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0703 20:27:29.978345 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0703 20:27:29.978444 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0703 20:27:29.978514 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:29.978552 36200 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatekopeio.example.com" } ] } I0703 20:27:29.978630 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.978730 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0703 20:27:29.978812 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0703 20:27:29.978798 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.978843 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0703 20:27:29.978932 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:27:29.978969 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0703 20:27:29.979138 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:29.979222 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:29.979262 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:29.979305 36200 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.979394 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:29.979438 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.979625 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.979627 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0703 20:27:29.979793 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:27:29.979853 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:29.979887 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.8.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1b.privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0703 20:27:29.979967 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.privatekopeio.example.com" }] }], VpcId: "vpc-1" } I0703 20:27:29.980074 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.980032 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatekopeio.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0703 20:27:29.980174 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0703 20:27:29.980306 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0703 20:27:29.980349 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0703 20:27:29.980491 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:29.980608 36200 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" } ] } I0703 20:27:29.980733 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:29.980808 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0703 20:27:29.980887 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:29.980923 36200 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0703 20:27:29.980970 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:29.981024 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:29.981069 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0703 20:27:29.981115 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0703 20:27:29.981147 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:29.981237 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:27:29.981284 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:29.981333 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:29.981437 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0703 20:27:29.981488 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:27:29.981530 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0703 20:27:29.981703 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:29.981677 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] }], VpcId: "vpc-1" } I0703 20:27:29.981773 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:29.981825 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0703 20:27:29.981862 36200 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" } ] } I0703 20:27:29.981967 36200 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0703 20:27:29.982090 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } W0703 20:27:29.982180 36200 api.go:53] PageSize not implemented I0703 20:27:29.982234 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0703 20:27:29.982317 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:29.982378 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:29.982469 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:29.982437 36200 tags.go:74] AddTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"], Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "api.privatekopeio.example.com" }] } I0703 20:27:29.982345 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-udp-1to65535-masters.privatekopeio.example.com" }] }] } I0703 20:27:29.982512 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:29.982571 36200 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatekopeio-exa-d8ef8e", SubnetMappings: [{ SubnetId: "subnet-4" },{ SubnetId: "subnet-3" }], Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], Type: "network" } I0703 20:27:29.982586 36200 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0703 20:27:29.982654 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0703 20:27:29.982692 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:29.982680 36200 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0703 20:27:29.982732 36200 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1", Port: 22, Protocol: "TCP" } W0703 20:27:29.982802 36200 api.go:53] PageSize not implemented I0703 20:27:29.982820 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:29.982804 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-1to2379-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.983056 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.983203 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:29.983333 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0703 20:27:29.983380 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:29.983451 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.983566 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:29.983623 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:27:29.983659 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:29.983721 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }] } I0703 20:27:29.983799 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:29.983867 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0703 20:27:29.983997 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:29.984066 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:27:29.984107 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.984323 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-2" } I0703 20:27:29.984376 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0703 20:27:29.984510 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0703 20:27:29.984638 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0703 20:27:29.984687 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0703 20:27:29.984725 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.984854 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0703 20:27:29.984971 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.985095 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.985213 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.985338 36200 tags.go:42] CreateTags { Resources: ["nat-b2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0703 20:27:29.985394 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0703 20:27:29.985437 36200 tags.go:42] CreateTags { Resources: ["subnet-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0703 20:27:29.985484 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0703 20:27:29.985551 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-3" } I0703 20:27:29.985592 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:27:29.985640 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0703 20:27:29.985764 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0703 20:27:29.985809 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-4" } I0703 20:27:29.985847 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.985979 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:29.986077 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:29.986163 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.986304 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-4003to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.986438 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0703 20:27:29.986536 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.986656 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0703 20:27:29.986754 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:27:29.986847 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:27:29.986903 36200 tags.go:42] CreateTags { Resources: ["nat-a2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0703 20:27:29.986962 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.8.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.987096 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:27:29.987192 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-2382to4000-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.987316 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0703 20:27:29.987438 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0703 20:27:29.987516 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0703 20:27:29.987571 36200 tags.go:42] CreateTags { Resources: ["subnet-4"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0703 20:27:29.987602 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:27:29.987632 36200 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0703 20:27:29.987688 36200 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0703 20:27:29.987745 36200 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0703 20:27:29.987851 36200 api.go:53] PageSize not implemented I0703 20:27:29.987848 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:29.987834 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:29.987891 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:29.987939 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0703 20:27:29.988002 36200 api.go:53] PageSize not implemented I0703 20:27:29.988054 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:29.988057 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-a2345678", RouteTableId: "rtb-2" } I0703 20:27:29.988110 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-b2345678", RouteTableId: "rtb-3" } I0703 20:27:29.987972 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:29.988167 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:29.988249 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:29.995568 36200 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0703 20:27:29.995754 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:29.995858 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:29.996956 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:29.997065 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:29.997459 36200 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0703 20:27:29.997741 36200 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0703 20:27:29.998037 36200 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0703 20:27:29.998086 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:29.998119 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:29.998181 36200 dns.go:235] Pre-creating DNS records I0703 20:27:29.998203 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:30.003491 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:30.006483 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:30.006554 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:30.006602 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:31.225218 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:31.384842 36200 iamrole.go:89] ListRoles: { } I0703 20:27:31.386183 36200 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0703 20:27:31.387896 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.388554 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:31.389104 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.389478 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.389766 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:31.389814 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:31.389921 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:31.390195 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:31.392025 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.393849 36200 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0703 20:27:31.393962 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.394140 36200 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0703 20:27:31.394095 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0703 20:27:31.394252 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0703 20:27:31.394273 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:31.394369 36200 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0703 20:27:31.394326 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.394491 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:31.394530 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.394639 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:31.394631 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0703 20:27:31.394709 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0703 20:27:31.394670 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0703 20:27:31.394748 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0703 20:27:31.394819 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:31.394867 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.394980 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0703 20:27:31.395096 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:27:31.395136 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:31.395208 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:31.395273 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.395375 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] }] } I0703 20:27:31.395481 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0703 20:27:31.395514 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.395617 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:31.395647 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0703 20:27:31.395756 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:31.395824 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.396023 36200 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0703 20:27:31.396110 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0703 20:27:31.396198 36200 api.go:53] PageSize not implemented I0703 20:27:31.396226 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:31.396304 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:31.396249 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:31.396336 36200 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0703 20:27:31.396312 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:31.396389 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:31.396407 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0703 20:27:31.396384 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:31.396444 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0703 20:27:31.396477 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0703 20:27:31.396508 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0703 20:27:31.396492 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0703 20:27:31.396537 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0703 20:27:31.396576 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0703 20:27:31.396608 36200 api.go:53] PageSize not implemented I0703 20:27:31.396641 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0703 20:27:31.396658 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:31.396943 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:31.397040 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:31.397144 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:31.397602 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:31.397754 36200 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0703 20:27:31.397855 36200 api.go:53] PageSize not implemented I0703 20:27:31.397861 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:31.397876 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:31.397928 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:31.397952 36200 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0703 20:27:31.397951 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:31.398057 36200 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0703 20:27:31.398027 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:31.398012 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } W0703 20:27:31.398163 36200 api.go:53] PageSize not implemented I0703 20:27:31.398199 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:31.398269 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:31.402561 36200 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0703 20:27:31.402679 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:31.402787 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:31.402920 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:31.402978 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:31.403515 36200 executor.go:111] Tasks: 136 done / 144 total; 2 can run W0703 20:27:31.403613 36200 api.go:53] PageSize not implemented I0703 20:27:31.403638 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:31.403829 36200 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0703 20:27:31.404042 36200 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0703 20:27:31.406796 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:27:31.406850 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:31.406882 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:27:31.406907 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:27:31.406934 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:27:31.406957 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:27:31.406984 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:31.407010 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:27:31.407038 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:27:31.407066 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:27:31.407095 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0703 20:27:31.407128 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:27:31.407157 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:27:31.407186 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:31.407215 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:27:31.407240 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:27:31.407271 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0703 20:27:31.407299 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:31.407327 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:31.407355 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:27:31.407383 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0703 20:27:31.407411 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:31.407439 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:31.407464 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:27:31.407514 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0703 20:27:31.407549 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0703 20:27:31.407578 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:27:31.407604 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:27:31.407625 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:31.407655 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:31.407682 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:31.407709 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:27:31.409090 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:27:31.409153 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:27:31.409171 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:27:31.409208 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.409259 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0703 20:27:31.409314 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.409366 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.409402 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.409445 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.409480 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.409521 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0703 20:27:31.409574 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.409629 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:31.409658 36200 natgateway.go:117] DescribeNatGateways: { } I0703 20:27:31.409689 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0703 20:27:31.409721 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } W0703 20:27:31.409767 36200 api.go:53] PageSize not implemented I0703 20:27:31.409782 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0703 20:27:31.409813 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:31.409832 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:31.409844 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0703 20:27:31.409873 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:27:31.409892 36200 targetgroups.go:35] PageSize not implemented I0703 20:27:31.409906 36200 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" ] } I0703 20:27:31.410401 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:27:31.410441 36200 iamrole.go:89] ListRoles: { } I0703 20:27:31.410483 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:31.410505 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:31.410540 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:27:31.410584 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:31.410629 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1","rtb-3"] } I0703 20:27:31.410665 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0703 20:27:31.410691 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } autoscaling-config:lt-2 ok I0703 20:27:31.411283 36200 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4 ok I0703 20:27:31.411318 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:31.411387 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0703 20:27:31.411450 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } iam-instance-profile:bastions.privatekopeio.example.com ok autoscaling-group:nodes.privatekopeio.example.com ok autoscaling-group:bastion.privatekopeio.example.com ok I0703 20:27:31.411488 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } autoscaling-group:master-us-test-1a.masters.privatekopeio.example.com ok I0703 20:27:31.411477 36200 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1 ok I0703 20:27:31.411370 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } I0703 20:27:31.411521 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } iam-instance-profile:nodes.privatekopeio.example.com ok W0703 20:27:31.411570 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:31.411538 36200 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } load-balancer:api-privatekopeio-example-tl2bv8 ok I0703 20:27:31.411586 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0703 20:27:31.411598 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:31.411372 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.privatekopeio.example.com. ok I0703 20:27:31.411636 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } iam-instance-profile:masters.privatekopeio.example.com ok I0703 20:27:31.411676 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } W0703 20:27:31.411782 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:31.411797 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0703 20:27:31.411834 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0703 20:27:31.411913 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-1 ok I0703 20:27:31.411973 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:31.412023 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 } ] } W0703 20:27:31.412186 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:31.412208 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0703 20:27:31.412237 36200 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0703 20:27:31.412284 36200 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-3 ok I0703 20:27:31.412323 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0703 20:27:31.412362 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0703 20:27:31.412493 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0703 20:27:31.412506 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatekopeio.example.com" } I0703 20:27:31.412534 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:27:31.412551 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatekopeio.example.com" } I0703 20:27:31.412588 36200 iamrole.go:180] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0703 20:27:31.412603 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0703 20:27:31.412632 36200 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatekopeio.example.com" } iam-role:bastions.privatekopeio.example.com ok I0703 20:27:31.412586 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } W0703 20:27:31.412673 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:31.412657 36200 iamrole.go:180] ListAttachedRolePolicies: masters.privatekopeio.example.com I0703 20:27:31.412693 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0703 20:27:31.412713 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0703 20:27:31.412729 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0703 20:27:31.412762 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.privatekopeio.example.com" } iam-role:masters.privatekopeio.example.com ok I0703 20:27:31.412781 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0703 20:27:31.412797 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatekopeio.example.com" } I0703 20:27:31.412821 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0703 20:27:31.412838 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0703 20:27:31.412866 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0703 20:27:31.412901 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatekopeio.example.com" } iam-role:nodes.privatekopeio.example.com ok I0703 20:27:31.412980 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0703 20:27:31.413026 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0703 20:27:31.413072 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0703 20:27:31.413132 36200 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0703 20:27:31.413194 36200 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateKopeio (2.85s) === RUN TestLifecycleIPv6 I0703 20:27:31.413719 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:31.413941 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:31.413976 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:31.414010 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:31.414043 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:31.414084 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:31.414118 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:31.414143 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:31.414197 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:31.414222 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal-ipv6.example.com I0703 20:27:31.438473 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:27:31.441732 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:31.441803 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:32.681198 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:32.837963 36200 iamrole.go:89] ListRoles: { } I0703 20:27:32.839845 36200 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0703 20:27:32.840168 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.840332 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:32.840355 36200 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.840399 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } I0703 20:27:32.840528 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.840551 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] } I0703 20:27:32.840721 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:32.840800 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } I0703 20:27:32.840885 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:32.840896 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] } I0703 20:27:32.840934 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:32.840976 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.841118 36200 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.841195 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0703 20:27:32.841226 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0703 20:27:32.841251 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:32.841282 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:32.841314 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:32.841449 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.841587 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.841728 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:32.841832 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:32.842495 36200 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0703 20:27:32.842589 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0703 20:27:32.842672 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0703 20:27:32.842717 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0703 20:27:32.842712 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.842796 36200 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0703 20:27:32.842819 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.842888 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0703 20:27:32.842910 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0703 20:27:32.843157 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:32.843223 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0703 20:27:32.843123 36200 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-minimal-ipv6-example--bne5ih", Port: 443, Protocol: "TCP", Tags: [{ Key: "Name", Value: "tcp-minimal-ipv6-example--bne5ih" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0703 20:27:32.843347 36200 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0703 20:27:32.843343 36200 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0703 20:27:32.843400 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:32.843547 36200 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0703 20:27:32.843606 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0703 20:27:32.843807 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:32.843900 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.844009 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.844109 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.844238 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:32.844352 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0703 20:27:32.844465 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0703 20:27:32.844539 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal-ipv6.example.com" }] }], VpcId: "vpc-1" } I0703 20:27:32.844656 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:32.844364 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal-ipv6.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0703 20:27:32.844728 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:32.844653 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] }], VpcId: "vpc-1" } I0703 20:27:32.844784 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:32.844845 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:32.844875 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0703 20:27:32.844982 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0703 20:27:32.845004 36200 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.845099 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:32.845145 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:32.845218 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:27:32.845254 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:32.845289 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0703 20:27:32.845429 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:32.845411 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0703 20:27:32.845473 36200 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0703 20:27:32.845556 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:27:32.845632 36200 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal-ipv6.example.com" } ] } I0703 20:27:32.845700 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0703 20:27:32.845742 36200 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0703 20:27:32.845861 36200 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0703 20:27:32.845972 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:32.846059 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:32.846179 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] }] } I0703 20:27:32.846267 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-3" } I0703 20:27:32.846334 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", Ipv6CidrBlock: "2001:db8:0:111::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0703 20:27:32.846319 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-1to2379-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.846566 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-2382to4000-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.846745 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0703 20:27:32.846858 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.847023 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.847140 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.847295 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", Ipv6CidrBlock: "2001:db8:0:114::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "dualstack-us-test-1b.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0703 20:27:32.847302 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:32.847450 36200 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0703 20:27:32.847521 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0703 20:27:32.847660 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.847812 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:32.847888 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.847964 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.848041 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.848028 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", Ipv6CidrBlock: "2001:db8:0:112::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0703 20:27:32.848121 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:32.848118 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.4.0/22", Ipv6CidrBlock: "2001:db8:0:116::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0703 20:27:32.848192 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:32.848186 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", Ipv6CidrBlock: "2001:db8:0:113::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "dualstack-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0703 20:27:32.848258 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:32.848269 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.0.0/22", Ipv6CidrBlock: "2001:db8:0:115::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0703 20:27:32.848351 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:27:32.848352 36200 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" }] }] } I0703 20:27:32.848405 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0703 20:27:32.848530 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:32.848575 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:32.848606 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:32.848635 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.848752 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-::/0" }] }] } I0703 20:27:32.848872 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-4003to65535-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.848985 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:27:32.849059 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-udp-1to65535-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.849167 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.849276 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0703 20:27:32.849323 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-::/0" }] }] } I0703 20:27:32.849435 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.849550 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0703 20:27:32.849585 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:32.849620 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0703 20:27:32.849768 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.849882 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.849988 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0703 20:27:32.850069 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.850200 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0703 20:27:32.850245 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0703 20:27:32.850308 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-1" } I0703 20:27:32.850357 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0703 20:27:32.850394 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0703 20:27:32.850444 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0703 20:27:32.850521 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0703 20:27:32.850592 36200 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0703 20:27:32.850670 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:32.850724 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0703 20:27:32.850738 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0703 20:27:32.850785 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:32.850800 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0703 20:27:32.850856 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-3" } I0703 20:27:32.850890 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0703 20:27:32.850920 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0703 20:27:32.850912 36200 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "dualstack", Name: "api-minimal-ipv6-example--jhj9te", SubnetMappings: [{ SubnetId: "subnet-6" },{ SubnetId: "subnet-4" }], Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "api.minimal-ipv6.example.com" }], Type: "network" } I0703 20:27:32.850949 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:32.851028 36200 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-6"] }] } I0703 20:27:32.851137 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:32.851136 36200 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-6", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.851214 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0703 20:27:32.851248 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:32.851350 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0703 20:27:32.851378 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-1" } I0703 20:27:32.851404 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-6"] }] } I0703 20:27:32.851436 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-6" } I0703 20:27:32.851461 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:32.851520 36200 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-4"] }] } I0703 20:27:32.851582 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:32.851615 36200 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-2", SubnetId: "subnet-4", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0703 20:27:32.851690 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0703 20:27:32.851724 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0703 20:27:32.851757 36200 tags.go:42] CreateTags { Resources: ["subnet-4"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-2" }] } I0703 20:27:32.851798 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0703 20:27:32.851864 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-4" } I0703 20:27:32.851906 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0703 20:27:32.851937 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0703 20:27:32.851980 36200 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1", Port: 443, Protocol: "TCP" } I0703 20:27:32.852005 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0703 20:27:32.852056 36200 tags.go:42] CreateTags { Resources: ["subnet-6"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0703 20:27:32.852047 36200 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "false" },{ Key: "access_logs.s3.enabled", Value: "false" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } W0703 20:27:32.852109 36200 api.go:53] PageSize not implemented I0703 20:27:32.852092 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:32.852193 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-5"] }] } I0703 20:27:32.852222 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-5" } I0703 20:27:32.852282 36200 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0703 20:27:32.852355 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:32.852362 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:32.852439 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:32.852436 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:32.852335 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:32.852583 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:32.852587 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-2", RouteTableId: "rtb-1" } I0703 20:27:32.852550 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:32.852607 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0703 20:27:32.852639 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:32.852714 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:32.852759 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:32.852776 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0703 20:27:32.852741 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-3" } I0703 20:27:32.852744 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:32.852869 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-1", RouteTableId: "rtb-3" } I0703 20:27:32.852917 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:32.853029 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-2", RouteTableId: "rtb-1" } I0703 20:27:32.857009 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:27:32.857171 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:32.857272 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:32.857349 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:32.857459 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:32.857899 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:27:32.858127 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:27:32.858365 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:27:32.858411 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:32.858445 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:32.858507 36200 dns.go:235] Pre-creating DNS records I0703 20:27:32.858529 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:32.864061 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0703 20:27:32.868027 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:32.868140 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:34.121223 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:34.275406 36200 iamrole.go:89] ListRoles: { } I0703 20:27:34.276823 36200 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0703 20:27:34.276998 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:34.277076 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.277222 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.277377 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:34.278057 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.278182 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:34.279890 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:34.280055 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:34.280134 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] }] } I0703 20:27:34.282305 36200 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0703 20:27:34.282613 36200 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0703 20:27:34.283081 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0703 20:27:34.283138 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.283785 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0703 20:27:34.283225 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0703 20:27:34.283851 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.283955 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0703 20:27:34.283994 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0703 20:27:34.284125 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:34.284185 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0703 20:27:34.284343 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:34.284401 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:34.285002 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.285562 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0703 20:27:34.285702 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:34.285756 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.285894 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:34.285964 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.286090 36200 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0703 20:27:34.286250 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:34.286432 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.286625 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0703 20:27:34.286695 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:34.286825 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:34.286899 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.287013 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:34.287046 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:34.287207 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.287321 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0703 20:27:34.287374 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:34.287439 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0703 20:27:34.287472 36200 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0703 20:27:34.287560 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.287717 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:34.287811 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.287931 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0703 20:27:34.287963 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:34.288031 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0703 20:27:34.288066 36200 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0703 20:27:34.288098 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0703 20:27:34.288142 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] }] } I0703 20:27:34.288246 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0703 20:27:34.288287 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:34.288389 36200 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0703 20:27:34.288463 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:34.288524 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:34.288516 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:34.288594 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:34.288612 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0703 20:27:34.288608 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:34.288644 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0703 20:27:34.288673 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0703 20:27:34.288706 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0703 20:27:34.288735 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0703 20:27:34.288677 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } W0703 20:27:34.288812 36200 api.go:53] PageSize not implemented I0703 20:27:34.288810 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:34.288905 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:34.288974 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:34.289029 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:34.289086 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:34.289138 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0703 20:27:34.289208 36200 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0703 20:27:34.289266 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:34.289278 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0703 20:27:34.289337 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0703 20:27:34.289383 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:34.289353 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:34.289422 36200 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0703 20:27:34.289405 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:34.289469 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:34.289498 36200 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0703 20:27:34.289408 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0703 20:27:34.289515 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0703 20:27:34.289600 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:34.289646 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0703 20:27:34.289724 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:34.289776 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:34.289799 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0703 20:27:34.289876 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:34.289900 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0703 20:27:34.294193 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:27:34.294289 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:34.294412 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:34.294465 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:34.294602 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:34.294998 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:27:34.295183 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:27:34.295351 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:27:34.298163 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:27:34.298218 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:34.298252 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:27:34.298279 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-2"] }] } I0703 20:27:34.298307 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0703 20:27:34.298336 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:27:34.298362 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0703 20:27:34.298390 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:27:34.298412 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:27:34.298438 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:34.298463 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:27:34.298489 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:27:34.298520 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:27:34.298550 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0703 20:27:34.298576 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0703 20:27:34.298600 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:27:34.298624 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:27:34.298647 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:34.298673 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:27:34.298695 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:27:34.298722 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0703 20:27:34.298749 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:34.298777 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:34.298802 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:27:34.298831 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:34.298858 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:34.298883 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:27:34.298908 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0703 20:27:34.298934 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0703 20:27:34.298962 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0703 20:27:34.298990 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0703 20:27:34.299016 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:27:34.299040 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:27:34.299063 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:34.299091 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:34.299116 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:34.299140 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:27:34.300887 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:27:34.300944 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:27:34.300960 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:27:34.300997 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.301044 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0703 20:27:34.301097 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.301149 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.301191 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.301233 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.301274 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.301315 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0703 20:27:34.301373 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.301440 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:34.301468 36200 natgateway.go:117] DescribeNatGateways: { } I0703 20:27:34.301506 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0703 20:27:34.301539 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } W0703 20:27:34.301583 36200 api.go:53] PageSize not implemented I0703 20:27:34.301601 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:34.301654 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:34.301668 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0703 20:27:34.301700 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:27:34.301720 36200 targetgroups.go:35] PageSize not implemented I0703 20:27:34.301736 36200 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" ] } I0703 20:27:34.301786 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:27:34.301818 36200 iamrole.go:89] ListRoles: { } I0703 20:27:34.301856 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:34.301878 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:34.301911 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:27:34.301950 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:34.301992 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1","rtb-3"] } I0703 20:27:34.302029 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0703 20:27:34.302061 36200 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0703 20:27:34.302090 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0703 20:27:34.302118 36200 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0703 20:27:34.302694 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:34.302725 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0703 20:27:34.302784 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } autoscaling-group:nodes.minimal-ipv6.example.com ok security-group:sg-3 ok autoscaling-group:master-us-test-1a.masters.minimal-ipv6.example.com ok I0703 20:27:34.302817 36200 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0703 20:27:34.302833 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4 ok subnet:subnet-4 ok I0703 20:27:34.302794 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } iam-instance-profile:nodes.minimal-ipv6.example.com ok I0703 20:27:34.302918 36200 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-2" } nat-gateway:nat-2 ok I0703 20:27:34.302912 36200 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1 ok I0703 20:27:34.302926 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0703 20:27:34.302992 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } iam-instance-profile:masters.minimal-ipv6.example.com ok I0703 20:27:34.302982 36200 egressonlyinternetgateways.go:171] DeleteEgressOnlyInternetGateway: { EgressOnlyInternetGatewayId: "eigw-2" } egress-only-internet-gateway:eigw-2 ok I0703 20:27:34.302781 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:34.303044 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.internal.minimal-ipv6.example.com. ok volume:vol-1 ok I0703 20:27:34.303087 36200 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0703 20:27:34.303131 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:34.303180 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0703 20:27:34.303335 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:34.303355 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0703 20:27:34.303384 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0703 20:27:34.303428 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-2 ok I0703 20:27:34.303481 36200 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0703 20:27:34.303531 36200 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0703 20:27:34.303558 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-6" } subnet:subnet-6 ok I0703 20:27:34.303597 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:34.303640 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 } ] } W0703 20:27:34.303896 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:34.303913 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-1 ok I0703 20:27:34.303945 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0703 20:27:34.304037 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0703 20:27:34.304054 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal-ipv6.example.com" } I0703 20:27:34.304110 36200 iamrole.go:180] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0703 20:27:34.304083 36200 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0703 20:27:34.304124 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0703 20:27:34.304201 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal-ipv6.example.com" } iam-role:masters.minimal-ipv6.example.com ok I0703 20:27:34.304194 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-5" } subnet:subnet-5 ok I0703 20:27:34.304236 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal-ipv6.example.com" } I0703 20:27:34.304247 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } I0703 20:27:34.304274 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com subnet:subnet-3 ok I0703 20:27:34.304290 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0703 20:27:34.304312 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal-ipv6.example.com" } iam-role:nodes.minimal-ipv6.example.com ok I0703 20:27:34.304298 36200 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-2" } elastic-ip:eipalloc-2 ok I0703 20:27:34.304347 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0703 20:27:34.304423 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0703 20:27:34.304470 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0703 20:27:34.304534 36200 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0703 20:27:34.304601 36200 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleIPv6 (2.89s) === RUN TestLifecycleSharedVPC I0703 20:27:34.305138 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:34.305357 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:34.305390 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:34.305422 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:34.305456 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:34.305496 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:34.305528 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:34.305551 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:34.305581 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:34.305604 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedvpc.example.com I0703 20:27:34.325651 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:34.328490 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:34.328563 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:35.565210 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:35.713561 36200 iamrole.go:89] ListRoles: { } I0703 20:27:35.714928 36200 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0703 20:27:35.715379 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } I0703 20:27:35.715468 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0703 20:27:35.715500 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:35.715683 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:35.715900 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:35.716048 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:35.716110 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0703 20:27:35.716164 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:35.716264 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:27:35.716346 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0703 20:27:35.716377 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0703 20:27:35.716439 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:35.716669 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:35.716863 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:35.717043 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } I0703 20:27:35.717130 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] } I0703 20:27:35.718545 36200 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0703 20:27:35.718689 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0703 20:27:35.718758 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0703 20:27:35.718817 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:35.719034 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0703 20:27:35.718987 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" } ] }], VpcId: "vpc-12345678" } I0703 20:27:35.719028 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0703 20:27:35.719135 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:35.719142 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0703 20:27:35.719192 36200 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0703 20:27:35.719182 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:35.719217 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0703 20:27:35.719244 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0703 20:27:35.719429 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0703 20:27:35.719519 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:35.719569 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:35.719602 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:27:35.719696 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:35.719768 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0703 20:27:35.719861 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:35.719863 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-12345678" } I0703 20:27:35.719914 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:35.719960 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:35.719999 36200 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" } ] } I0703 20:27:35.721628 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedvpc.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0703 20:27:35.724421 36200 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0703 20:27:35.724605 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0703 20:27:35.724811 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:35.724995 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0703 20:27:35.725219 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-4003to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0703 20:27:35.725344 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:35.725477 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0703 20:27:35.725512 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0703 20:27:35.725602 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0703 20:27:35.725794 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:35.725885 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:35.725944 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0703 20:27:35.726050 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:35.726123 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0703 20:27:35.726234 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0703 20:27:35.726348 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0703 20:27:35.726463 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedvpc.example.com" }] }] } I0703 20:27:35.726589 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0703 20:27:35.726701 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0703 20:27:35.726746 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0703 20:27:35.726853 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:35.726995 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0703 20:27:35.727068 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:35.727208 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-udp-1to65535-masters.sharedvpc.example.com" }] }] } I0703 20:27:35.727396 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-2382to4000-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0703 20:27:35.727557 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-1to2379-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0703 20:27:35.727751 36200 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0703 20:27:35.727974 36200 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0703 20:27:35.728204 36200 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0703 20:27:35.728243 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:35.728275 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:35.728331 36200 dns.go:235] Pre-creating DNS records I0703 20:27:35.728356 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:35.733191 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:35.735976 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:35.736049 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:36.979711 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:37.132142 36200 iamrole.go:89] ListRoles: { } I0703 20:27:37.133268 36200 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0703 20:27:37.133455 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] }] } I0703 20:27:37.133593 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:27:37.133760 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0703 20:27:37.133809 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0703 20:27:37.133875 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.134092 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:37.134116 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:37.136400 36200 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0703 20:27:37.136587 36200 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0703 20:27:37.136520 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0703 20:27:37.136620 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0703 20:27:37.136672 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:37.136732 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.136844 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:37.136876 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:27:37.136958 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] },{ Name: "tag:Name", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.137054 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0703 20:27:37.137168 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:37.140973 36200 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0703 20:27:37.141146 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:37.141258 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:37.141394 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:37.141509 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:37.141670 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:37.141837 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:37.142020 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:37.142177 36200 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0703 20:27:37.142347 36200 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0703 20:27:37.142502 36200 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0703 20:27:37.144238 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:27:37.144284 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:27:37.144304 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:27:37.144322 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:27:37.144339 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:27:37.144356 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:27:37.144377 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:27:37.144398 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:27:37.144424 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:27:37.144446 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:27:37.144463 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:37.144483 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:27:37.144502 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:37.144521 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:37.144539 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:37.144559 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:37.144575 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:27:37.144591 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:27:37.144607 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:37.144626 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:37.144645 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:27:37.145481 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:27:37.145528 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:27:37.145557 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:27:37.145584 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.145617 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0703 20:27:37.145653 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.145692 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.145717 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.145741 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.145766 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.145790 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0703 20:27:37.145819 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.145854 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0703 20:27:37.145876 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } W0703 20:27:37.145905 36200 api.go:53] PageSize not implemented I0703 20:27:37.145920 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:37.145938 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:37.145951 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:27:37.145967 36200 targetgroups.go:35] PageSize not implemented I0703 20:27:37.145982 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0703 20:27:37.146016 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:27:37.146043 36200 iamrole.go:89] ListRoles: { } I0703 20:27:37.146071 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:37.146090 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:37.146124 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:27:37.146149 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:37.146166 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-config:lt-1 ok autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com ok I0703 20:27:37.146472 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0703 20:27:37.146537 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:37.146451 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } autoscaling-group:nodes.sharedvpc.example.com ok route53-record:Z1AFAKE1ZON3YO/A/api.internal.sharedvpc.example.com. ok I0703 20:27:37.146653 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0703 20:27:37.146725 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } iam-instance-profile:masters.sharedvpc.example.com ok I0703 20:27:37.146602 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0703 20:27:37.146756 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } W0703 20:27:37.146787 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:37.146790 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } iam-instance-profile:nodes.sharedvpc.example.com ok I0703 20:27:37.146812 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-config:lt-2 ok I0703 20:27:37.146885 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0703 20:27:37.146944 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:37.146991 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0703 20:27:37.147167 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:37.147186 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0703 20:27:37.147220 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0703 20:27:37.147303 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedvpc.example.com" } I0703 20:27:37.147348 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0703 20:27:37.147327 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0703 20:27:37.147368 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedvpc.example.com" } I0703 20:27:37.147423 36200 iamrole.go:180] ListAttachedRolePolicies: masters.sharedvpc.example.com I0703 20:27:37.147436 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0703 20:27:37.147462 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedvpc.example.com" } iam-role:masters.sharedvpc.example.com ok I0703 20:27:37.147488 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0703 20:27:37.147533 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedvpc.example.com" } iam-role:nodes.sharedvpc.example.com ok I0703 20:27:37.147590 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok --- PASS: TestLifecycleSharedVPC (2.84s) === RUN TestLifecycleComplex I0703 20:27:37.148082 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:37.148299 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:37.148335 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:37.148368 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:37.148401 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:37.148440 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:37.148477 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:37.148501 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:37.148529 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:37.148551 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster complex.example.com I0703 20:27:37.177123 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:37.180369 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:37.180440 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:38.404400 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:38.574584 36200 iamrole.go:89] ListRoles: { } I0703 20:27:38.576548 36200 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0703 20:27:38.577001 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0703 20:27:38.577099 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } I0703 20:27:38.577183 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] } I0703 20:27:38.577179 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:38.577261 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } I0703 20:27:38.577320 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", Tags: [ { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0703 20:27:38.577292 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:38.577448 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:38.577634 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:38.577695 36200 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0703 20:27:38.577818 36200 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" } ] }] } I0703 20:27:38.577941 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:38.577989 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:38.578085 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0703 20:27:38.578122 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } W0703 20:27:38.578183 36200 api.go:53] PageSize not implemented I0703 20:27:38.578194 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0703 20:27:38.578221 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:38.578256 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:38.578288 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:38.578443 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:38.578661 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "k8s.io/etcd/events", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-events.complex.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:38.578815 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:38.578859 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/main", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-main.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:38.578964 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:38.579378 36200 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0703 20:27:38.579521 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:38.579519 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:38.579552 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:38.579628 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:38.579769 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:38.579718 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:38.579727 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0703 20:27:38.579877 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0703 20:27:38.579882 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:38.579980 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0703 20:27:38.579914 36200 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-complex-example-com-vpjolq", Port: 443, Protocol: "TCP", Tags: [ { Key: "Name", Value: "tcp-complex-example-com-vpjolq" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0703 20:27:38.580055 36200 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:38.580075 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.96.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-east-1a-utility.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0703 20:27:38.580097 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:38.580120 36200 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tls-complex-example-com-5nursn", Port: 443, Protocol: "TLS", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "tls-complex-example-com-5nursn" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0703 20:27:38.580204 36200 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:38.580209 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0703 20:27:38.580294 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:38.580354 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:38.580336 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0703 20:27:38.580313 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0703 20:27:38.580394 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:38.580513 36200 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0703 20:27:38.580560 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:38.580715 36200 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.2.0.0/16", VpcId: "vpc-1" } I0703 20:27:38.580765 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:38.580921 36200 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0703 20:27:38.581011 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:38.581121 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0703 20:27:38.581202 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:38.581263 36200 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0703 20:27:38.581296 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:38.581392 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:38.581495 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:38.581560 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0703 20:27:38.581552 36200 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0703 20:27:38.581388 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/complex.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0703 20:27:38.582514 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:38.582878 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0703 20:27:38.583272 36200 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.1.0.0/16", VpcId: "vpc-1" } I0703 20:27:38.583368 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "api-elb.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0703 20:27:38.583346 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0703 20:27:38.583538 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:38.583618 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:38.583667 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:27:38.583730 36200 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] } I0703 20:27:38.583827 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0703 20:27:38.583946 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:27:38.584012 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:38.584138 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:27:38.584337 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:38.584422 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:38.584524 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:38.584698 36200 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0703 20:27:38.584946 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:38.585184 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:38.585460 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0703 20:27:38.585520 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0703 20:27:38.585662 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0703 20:27:38.586191 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.0/24-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0703 20:27:38.586820 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:38.586917 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:38.587035 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", RouteTableId: "rtb-2", TransitGatewayId: "tgw-123456" } I0703 20:27:38.587079 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-1to2379-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0703 20:27:38.587212 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:27:38.587253 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:38.587406 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.1.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-private.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0703 20:27:38.587434 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0703 20:27:38.587588 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:38.587689 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0703 20:27:38.587716 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0703 20:27:38.588496 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0703 20:27:38.588595 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0703 20:27:38.588710 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0703 20:27:38.588789 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0703 20:27:38.588870 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:38.588965 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:27:38.589008 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-4003to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0703 20:27:38.589100 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-2382to4000-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" } ] }] } I0703 20:27:38.589200 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0703 20:27:38.589333 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }] } I0703 20:27:38.589424 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }] } I0703 20:27:38.589505 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-udp-1to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0703 20:27:38.589640 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "192.168.1.10/32", RouteTableId: "rtb-2", TransitGatewayId: "tgw-0123456" } I0703 20:27:38.589685 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-nodes.complex.example.com" } ] }] } I0703 20:27:38.589808 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0703 20:27:38.589927 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0703 20:27:38.590042 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0703 20:27:38.590117 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }] } I0703 20:27:38.590193 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0703 20:27:38.590249 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:38.590283 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0703 20:27:38.590403 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0703 20:27:38.590518 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }] } I0703 20:27:38.590636 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0703 20:27:38.590710 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0703 20:27:38.590847 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0703 20:27:38.590975 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }] } I0703 20:27:38.591051 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0703 20:27:38.591203 36200 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0703 20:27:38.591269 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:38.591297 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:38.591375 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:38.591381 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0703 20:27:38.591417 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-3" } I0703 20:27:38.591465 36200 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "api-complex-example-com-vd3t5n", SubnetMappings: [{ AllocationId: "eipalloc-012345a678b9cdefa", SubnetId: "subnet-2" }], Tags: [ { Key: "Name", Value: "api.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], Type: "network" } I0703 20:27:38.591615 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:38.591664 36200 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-test-1:000000000000:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0703 20:27:38.591740 36200 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0703 20:27:38.591800 36200 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "true" },{ Key: "access_logs.s3.enabled", Value: "true" },{ Key: "access_logs.s3.bucket", Value: "access-log-example" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0703 20:27:38.591860 36200 api.go:53] PageSize not implemented I0703 20:27:38.591901 36200 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0703 20:27:38.591966 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:38.591970 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:38.592034 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:38.592053 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:38.592055 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:38.592216 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0703 20:27:38.592223 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } W0703 20:27:38.592284 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:38.592310 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:38.592382 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:38.597579 36200 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0703 20:27:38.597743 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:38.597846 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:38.597923 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:38.598031 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:38.598646 36200 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0703 20:27:38.598878 36200 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0703 20:27:38.599106 36200 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0703 20:27:38.599152 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:38.599184 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:38.599243 36200 dns.go:235] Pre-creating DNS records I0703 20:27:38.599266 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:38.606135 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:38.609737 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:38.609820 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:39.854423 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:40.025662 36200 iamrole.go:89] ListRoles: { } I0703 20:27:40.027421 36200 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0703 20:27:40.027822 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } W0703 20:27:40.028087 36200 api.go:53] PageSize not implemented I0703 20:27:40.028033 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:40.028190 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:40.028235 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:40.028309 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0703 20:27:40.028481 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:40.028643 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:40.028753 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:40.028791 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:40.028871 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:40.028961 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:40.029084 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:40.030486 36200 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0703 20:27:40.030619 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:40.030805 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:40.030754 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:40.030883 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:40.030787 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:40.030942 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:40.030995 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:40.031001 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:40.031000 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:40.031115 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:40.031145 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:40.031112 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:40.031252 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:40.031314 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:40.031389 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:40.031453 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:40.031582 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:40.031620 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:40.031718 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:40.031752 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:40.031815 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:40.031927 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:40.031957 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:40.032074 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:40.032125 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0703 20:27:40.032576 36200 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0703 20:27:40.032735 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:40.032922 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:40.033001 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:40.033093 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] }] } I0703 20:27:40.033212 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:40.033544 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:40.033641 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:40.033701 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:40.033880 36200 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0703 20:27:40.033948 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:40.034004 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:40.034018 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:40.033976 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:40.034050 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:40.034076 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:40.034107 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:40.034131 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:40.034175 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0703 20:27:40.034256 36200 api.go:53] PageSize not implemented I0703 20:27:40.034297 36200 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0703 20:27:40.034358 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:40.034393 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:40.034376 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:40.034454 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:40.034477 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:40.034547 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:40.034481 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:40.034877 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:40.034921 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:40.035041 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:40.035092 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:40.035121 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:40.035615 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:40.035648 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:40.039737 36200 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0703 20:27:40.039894 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:40.040060 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:40.040200 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:40.040338 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:40.040761 36200 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0703 20:27:40.040985 36200 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0703 20:27:40.041218 36200 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.sslCertificate=arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678] I0703 20:27:40.046448 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:40.049605 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:40.060200 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:40.063895 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:40.063973 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:41.286030 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:41.452892 36200 iamrole.go:89] ListRoles: { } I0703 20:27:41.454721 36200 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0703 20:27:41.455137 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:41.455180 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:41.455349 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0703 20:27:41.455500 36200 api.go:53] PageSize not implemented I0703 20:27:41.455573 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:41.455674 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:41.455790 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:41.455894 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:41.455920 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:41.455983 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:41.456021 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0703 20:27:41.456100 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:41.456650 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0703 20:27:41.458038 36200 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0703 20:27:41.458181 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:41.458243 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:41.458258 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:41.458207 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:41.458392 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0703 20:27:41.458468 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:41.458511 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:41.458522 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:41.458550 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:41.458635 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:41.458649 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:41.458666 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:41.458685 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:41.458762 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:41.458892 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:41.458932 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:41.459001 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:41.459105 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:41.459134 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:41.459207 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:41.459336 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:41.459385 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:41.459528 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:41.459609 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:41.459713 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:41.459935 36200 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0703 20:27:41.460051 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:41.460142 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:41.460431 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:41.460574 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:41.460771 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:41.460929 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:41.461049 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:41.461335 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:41.461440 36200 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0703 20:27:41.461497 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:41.461522 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:41.461600 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:41.461616 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:41.461664 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:41.461696 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:41.461782 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:41.461814 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:41.461839 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:41.462006 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { Names: ["api-complex-example-com-vd3t5n"] } I0703 20:27:41.462037 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:41.462071 36200 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/1" } I0703 20:27:41.462095 36200 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/2" } I0703 20:27:41.462116 36200 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0703 20:27:41.462211 36200 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0703 20:27:41.462268 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:41.462309 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } W0703 20:27:41.462345 36200 api.go:53] PageSize not implemented I0703 20:27:41.462393 36200 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0703 20:27:41.462465 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:41.462506 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:41.462488 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0703 20:27:41.462529 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0703 20:27:41.462544 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:41.462554 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:41.462558 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:41.462638 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:41.462696 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:41.462712 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:41.462743 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:41.462831 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:41.462980 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:41.463009 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:41.467198 36200 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0703 20:27:41.467312 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:41.467471 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:41.467642 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:41.467768 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:41.468169 36200 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0703 20:27:41.468394 36200 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0703 20:27:41.468625 36200 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0703 20:27:41.468669 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:41.468703 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:41.468770 36200 dns.go:235] Pre-creating DNS records I0703 20:27:41.475466 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:41.479111 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:41.479189 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:42.745369 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:42.907025 36200 iamrole.go:89] ListRoles: { } I0703 20:27:42.908727 36200 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0703 20:27:42.908909 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } W0703 20:27:42.909114 36200 api.go:53] PageSize not implemented I0703 20:27:42.909159 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.909478 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.910665 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0703 20:27:42.910794 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.910896 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:42.910969 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:42.911012 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:42.911095 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:42.911198 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:42.911236 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:42.911589 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.912785 36200 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0703 20:27:42.912889 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:42.912907 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:42.912967 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:42.913001 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:42.912940 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:42.913065 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:42.913017 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.913116 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:42.913137 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:42.913178 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:42.913292 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:42.913352 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:42.913396 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:42.913541 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:42.913580 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:42.913619 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:42.913690 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:42.913809 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:42.913882 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.914056 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:42.914096 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.914220 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:42.914298 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:42.914367 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.914458 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.914641 36200 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0703 20:27:42.914752 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:42.914820 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:42.914897 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.915038 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:42.915225 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:42.915300 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:42.915487 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:42.915775 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:42.915989 36200 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0703 20:27:42.916045 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:42.916059 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:42.916132 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:42.916148 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:42.916186 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:42.916213 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:42.916244 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:42.916269 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:42.916292 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0703 20:27:42.916366 36200 api.go:53] PageSize not implemented I0703 20:27:42.916409 36200 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0703 20:27:42.916450 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:42.916488 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:42.916506 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:42.916500 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:42.916547 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:42.916567 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:42.916562 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:42.916609 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:42.916587 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:42.916666 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:42.916704 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:42.916716 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:42.916788 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:42.916832 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:42.920903 36200 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0703 20:27:42.921001 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:42.921132 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:42.921209 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:42.921351 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:42.921779 36200 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0703 20:27:42.921974 36200 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0703 20:27:42.922206 36200 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.additionalSecurityGroups=sg-123456] I0703 20:27:42.925153 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:42.928337 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:42.939039 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:42.942769 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:42.942846 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:44.187720 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:44.354961 36200 iamrole.go:89] ListRoles: { } I0703 20:27:44.356862 36200 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0703 20:27:44.357165 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0703 20:27:44.357330 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:44.357551 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:44.357685 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } W0703 20:27:44.357708 36200 api.go:53] PageSize not implemented I0703 20:27:44.357713 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:44.357760 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:44.357828 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:44.357884 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0703 20:27:44.357986 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] }] } I0703 20:27:44.358109 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:44.358209 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:44.358338 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:44.358416 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0703 20:27:44.360132 36200 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0703 20:27:44.360293 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:44.360428 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:44.360490 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:44.360511 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:44.360552 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:44.360575 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:44.360455 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:44.360600 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:44.360665 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:44.360696 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:44.360671 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:44.360814 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:44.360895 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:44.360977 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] }] } I0703 20:27:44.361097 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:44.361129 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:44.361273 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:44.361381 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:44.361530 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:44.361566 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:44.361637 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:44.361766 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:44.361804 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:44.361869 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:44.361933 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:44.362081 36200 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0703 20:27:44.362286 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:44.362386 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:44.362495 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:44.362628 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:44.362744 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:44.362870 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:44.363123 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:44.363285 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:44.363488 36200 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0703 20:27:44.363562 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:44.363619 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:44.363588 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:44.363638 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:44.363730 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:44.363771 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:44.363804 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:44.363833 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:44.363861 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0703 20:27:44.363941 36200 api.go:53] PageSize not implemented I0703 20:27:44.363999 36200 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0703 20:27:44.364070 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:44.364111 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:44.364098 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:44.364139 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:44.364135 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:44.364179 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:44.364178 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:44.364263 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:44.364340 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:44.364366 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:44.364446 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:44.364479 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:44.364564 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:44.364605 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:44.368842 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:27:44.368941 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:44.369109 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:44.369311 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:44.369455 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:44.370108 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:44.370162 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:44.370302 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:27:44.370538 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:27:44.370765 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:27:44.370808 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:44.370861 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:44.370927 36200 dns.go:235] Pre-creating DNS records I0703 20:27:44.377512 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:44.381272 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:44.381350 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:45.626629 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:45.791570 36200 iamrole.go:89] ListRoles: { } I0703 20:27:45.793314 36200 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0703 20:27:45.793532 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:45.793583 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:45.793667 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:45.793841 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:45.793948 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:45.793978 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:45.794030 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:45.794081 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:45.794298 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:45.794758 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0703 20:27:45.795123 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } W0703 20:27:45.795308 36200 api.go:53] PageSize not implemented I0703 20:27:45.795587 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0703 20:27:45.796347 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:45.797247 36200 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0703 20:27:45.797396 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:45.797382 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:45.797440 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:45.797452 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:45.797367 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:45.797488 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:45.797571 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:45.797658 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:45.797734 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:45.797682 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:45.797760 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:45.797850 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:45.797897 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] }] } I0703 20:27:45.798067 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:45.798102 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:45.798242 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:45.798291 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:45.798420 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:45.798542 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:45.798583 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:45.798704 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:45.798777 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:45.798844 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:45.798907 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:45.799037 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:45.799297 36200 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0703 20:27:45.799433 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:45.799520 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:45.799653 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:45.799878 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:45.800058 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:45.800142 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:45.800424 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:45.800543 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:45.800656 36200 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0703 20:27:45.800718 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:45.800725 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:45.800784 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:45.800800 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:45.800850 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:45.800882 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:45.800912 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:45.800938 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:45.800961 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0703 20:27:45.801036 36200 api.go:53] PageSize not implemented I0703 20:27:45.801074 36200 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0703 20:27:45.801138 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:45.801122 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:45.801170 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:45.801173 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:45.801191 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:45.801186 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:45.801209 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:45.801257 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:45.801290 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:45.801335 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:45.801407 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:45.801571 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:45.801626 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:45.801650 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:45.806137 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:27:45.806248 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:45.806400 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:45.806479 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:45.806641 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:45.807303 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:27:45.807542 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:27:45.807761 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t3.large] I0703 20:27:45.811910 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:45.815025 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:45.815097 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:45.823437 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:45.827195 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:45.827270 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:45.827319 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:47.060138 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:47.223894 36200 iamrole.go:89] ListRoles: { } I0703 20:27:47.225762 36200 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0703 20:27:47.226077 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:47.226069 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:47.226242 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:47.226301 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } W0703 20:27:47.226332 36200 api.go:53] PageSize not implemented I0703 20:27:47.226381 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0703 20:27:47.226539 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:47.226631 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] }] } I0703 20:27:47.226774 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0703 20:27:47.226854 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:47.226927 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:47.226972 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:47.227078 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0703 20:27:47.227153 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:47.228417 36200 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0703 20:27:47.228598 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:47.228597 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:47.228672 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:47.228757 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:47.228794 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:47.228818 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:47.228716 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] }] } I0703 20:27:47.228866 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:47.228924 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:47.228946 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:47.228898 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:47.229043 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:47.229089 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:47.229256 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:47.229313 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:47.229349 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:47.229470 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:47.229547 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:47.229610 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:47.229710 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:47.229775 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:47.229839 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:47.229956 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:47.229993 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:47.230099 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:47.230218 36200 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0703 20:27:47.230420 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:47.230526 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:47.230817 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:47.231054 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:47.231188 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:47.231291 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:47.231460 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:47.231578 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:47.231669 36200 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0703 20:27:47.231738 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:47.231740 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:47.231837 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:47.231854 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:47.231886 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:47.231916 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:47.231948 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:47.231974 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:47.231999 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0703 20:27:47.232081 36200 api.go:53] PageSize not implemented I0703 20:27:47.232133 36200 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0703 20:27:47.232197 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:47.232234 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:47.232190 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:47.232264 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:47.232265 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:47.232308 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:47.232279 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:47.232361 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:47.232408 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:47.232526 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:47.232548 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:47.232615 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:47.232656 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:47.232670 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:47.237457 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:27:47.237612 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:47.237773 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:47.237901 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:47.238046 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:47.238503 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:27:47.238784 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:27:47.238994 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:27:47.239035 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:47.239066 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:47.239125 36200 dns.go:235] Pre-creating DNS records I0703 20:27:47.245809 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:47.249521 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:47.249599 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:47.249703 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.502025 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:48.667924 36200 iamrole.go:89] ListRoles: { } I0703 20:27:48.669776 36200 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0703 20:27:48.670049 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0703 20:27:48.670256 36200 api.go:53] PageSize not implemented I0703 20:27:48.670235 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:48.670417 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:48.670975 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:48.671141 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0703 20:27:48.671242 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:48.671247 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:48.671364 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:48.671394 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:48.671438 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0703 20:27:48.671541 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0703 20:27:48.671620 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:48.671659 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:48.672456 36200 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0703 20:27:48.672549 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:48.672641 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:48.672644 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:48.672716 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:48.672749 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:48.672807 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:48.672761 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:48.672836 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:48.672962 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:48.672851 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:48.673013 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:48.672943 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:48.673130 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:48.673171 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:48.673309 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:48.673354 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:48.673424 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:48.673543 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:48.673571 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:48.673635 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:48.673737 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:48.673764 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:48.673837 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:48.673961 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:48.674020 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:48.674239 36200 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0703 20:27:48.674426 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] }] } I0703 20:27:48.674551 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:48.674769 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:48.674910 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:48.675061 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:48.675251 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:48.675348 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:48.675462 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:48.675598 36200 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0703 20:27:48.675668 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:48.675724 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:48.675680 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:48.675742 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:48.675778 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:48.675807 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:48.675837 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:48.675863 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:48.675889 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0703 20:27:48.675964 36200 api.go:53] PageSize not implemented I0703 20:27:48.676005 36200 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0703 20:27:48.676048 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:48.676085 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:48.676113 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:48.676166 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:48.676194 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:48.676098 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:48.676225 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:48.676243 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:48.676266 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:48.676358 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:48.676401 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:48.676422 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:48.676508 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:48.676549 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:48.680851 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:27:48.680980 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.681124 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.681189 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.681334 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.681956 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:27:48.682166 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:27:48.682387 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t2.medium] I0703 20:27:48.684855 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:48.687743 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.687816 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.687860 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.696164 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:48.699780 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.699852 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.699896 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:48.699932 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:49.987976 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:50.157434 36200 iamrole.go:89] ListRoles: { } I0703 20:27:50.159205 36200 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0703 20:27:50.159528 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:50.159750 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:50.159881 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0703 20:27:50.159960 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:50.160319 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] }] } W0703 20:27:50.161001 36200 api.go:53] PageSize not implemented I0703 20:27:50.161388 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:50.161840 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:50.162101 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:50.162209 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:50.162237 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:50.162292 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:50.162325 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0703 20:27:50.162409 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0703 20:27:50.162849 36200 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0703 20:27:50.162953 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:50.162995 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:50.162976 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:50.163018 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:50.163080 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:50.163112 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:50.163098 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:50.163171 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:50.163222 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:50.163242 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:50.163245 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:50.163382 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:50.163449 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:50.163628 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:50.163668 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:50.163758 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:50.163827 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:50.163942 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:50.164026 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:50.164139 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:50.164190 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:50.164323 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:50.164394 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:50.164514 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:50.164550 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0703 20:27:50.165025 36200 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0703 20:27:50.165265 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:50.165402 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:50.165676 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:50.165813 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:50.165907 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:50.166179 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:50.166334 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:50.166400 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:50.166499 36200 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0703 20:27:50.166554 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:50.166607 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:50.166687 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:50.166707 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:50.166746 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:50.166777 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:50.166809 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:50.166836 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:50.166862 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0703 20:27:50.166946 36200 api.go:53] PageSize not implemented I0703 20:27:50.167004 36200 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0703 20:27:50.167076 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:50.167063 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:50.167112 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:50.167116 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:50.167129 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:50.167138 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:50.167202 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:50.167209 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:50.167276 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:50.167295 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:50.167369 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:50.167398 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:50.167476 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:50.167526 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:50.171618 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:27:50.171743 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:50.171894 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:50.171955 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:50.172094 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:50.172577 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:27:50.172880 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:27:50.173128 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:27:50.173166 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:50.173197 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:50.173257 36200 dns.go:235] Pre-creating DNS records I0703 20:27:50.184105 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0703 20:27:50.187874 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:50.187957 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:50.188003 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:50.188043 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:51.432440 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:51.596618 36200 iamrole.go:89] ListRoles: { } I0703 20:27:51.598344 36200 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0703 20:27:51.598716 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } W0703 20:27:51.598853 36200 api.go:53] PageSize not implemented I0703 20:27:51.598874 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0703 20:27:51.599041 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:51.598992 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.599183 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.599305 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0703 20:27:51.599442 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.599562 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:51.599591 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:51.599613 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0703 20:27:51.599702 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:51.599738 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0703 20:27:51.599811 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.601152 36200 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0703 20:27:51.601295 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0703 20:27:51.601322 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:51.601427 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:51.601370 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:51.601527 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:51.601532 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0703 20:27:51.601506 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0703 20:27:51.601631 36200 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:51.601606 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0703 20:27:51.601670 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:51.601699 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0703 20:27:51.601698 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:51.601738 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:51.601858 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.601978 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.602093 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.602211 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:27:51.602242 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.602338 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.602443 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:51.602474 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:51.602540 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0703 20:27:51.602664 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:51.602701 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0703 20:27:51.602815 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:51.603092 36200 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0703 20:27:51.603281 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:51.603509 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.603676 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0703 20:27:51.603846 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:51.603964 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:51.604033 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:51.604277 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:51.604422 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:51.604664 36200 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0703 20:27:51.604723 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:27:51.604749 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:51.604815 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:51.604832 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:51.604865 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:51.604893 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:51.604923 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0703 20:27:51.604950 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0703 20:27:51.604973 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0703 20:27:51.605050 36200 api.go:53] PageSize not implemented I0703 20:27:51.605095 36200 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0703 20:27:51.605138 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:51.605175 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:51.605164 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:51.605204 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:51.605187 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:51.605282 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:51.605340 36200 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0703 20:27:51.605346 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:51.605417 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:51.605442 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:51.605530 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:51.605567 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:51.605646 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0703 20:27:51.605671 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:51.609629 36200 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0703 20:27:51.609798 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:51.609948 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:51.610079 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:51.610216 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:51.610700 36200 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0703 20:27:51.610903 36200 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0703 20:27:51.611068 36200 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0703 20:27:51.611232 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:27:51.611283 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:51.611316 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:27:51.611342 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:27:51.611368 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:27:51.611392 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:27:51.611414 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:51.611443 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:27:51.611480 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:27:51.611512 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:27:51.611535 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:27:51.611559 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:51.611586 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:27:51.611611 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:27:51.611640 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:51.611671 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:51.611700 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:27:51.611728 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:51.611756 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:51.611782 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:27:51.611809 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0703 20:27:51.611837 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:27:51.611863 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:27:51.611887 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:51.611916 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:51.611946 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:51.611972 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:27:51.614262 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:27:51.614320 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:27:51.614339 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:27:51.614370 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.614419 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0703 20:27:51.614470 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.614517 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.614553 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.614601 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.614636 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.614673 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0703 20:27:51.614717 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.614772 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0703 20:27:51.614825 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } W0703 20:27:51.614868 36200 api.go:53] PageSize not implemented I0703 20:27:51.614885 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:51.614905 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:51.614918 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0703 20:27:51.614951 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:27:51.614970 36200 targetgroups.go:35] PageSize not implemented I0703 20:27:51.614985 36200 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" ] } I0703 20:27:51.615038 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:27:51.615070 36200 iamrole.go:89] ListRoles: { } I0703 20:27:51.615108 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:51.615131 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:51.615163 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:27:51.615206 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:51.615243 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0703 20:27:51.615712 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } I0703 20:27:51.615724 36200 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5 ok autoscaling-group:nodes.complex.example.com ok I0703 20:27:51.615779 36200 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } autoscaling-group:master-us-test-1a.masters.complex.example.com ok I0703 20:27:51.615815 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } volume:vol-1 ok I0703 20:27:51.615846 36200 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0703 20:27:51.615808 36200 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } autoscaling-config:lt-1 ok target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4 ok I0703 20:27:51.615879 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } iam-instance-profile:masters.complex.example.com ok I0703 20:27:51.615911 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0703 20:27:51.615924 36200 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0703 20:27:51.615928 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1 ok I0703 20:27:51.615975 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } iam-instance-profile:nodes.complex.example.com ok I0703 20:27:51.615968 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:51.615822 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.complex.example.com. ok I0703 20:27:51.616014 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0703 20:27:51.616069 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:51.616123 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }, { FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 } ] } W0703 20:27:51.617392 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:51.617420 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok autoscaling-config:lt-2 ok I0703 20:27:51.617480 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:51.617556 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 } ] } W0703 20:27:51.617821 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:51.617844 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } I0703 20:27:51.617889 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } I0703 20:27:51.617924 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } volume:vol-2 ok security-group:sg-1 ok subnet:subnet-3 ok I0703 20:27:51.618130 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.complex.example.com" } I0703 20:27:51.618253 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.complex.example.com I0703 20:27:51.618206 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0703 20:27:51.618278 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0703 20:27:51.618322 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0703 20:27:51.618345 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.complex.example.com" } iam-role:nodes.complex.example.com ok I0703 20:27:51.618395 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.complex.example.com" } I0703 20:27:51.618473 36200 iamrole.go:180] ListAttachedRolePolicies: masters.complex.example.com I0703 20:27:51.618493 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0703 20:27:51.618535 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.complex.example.com" } iam-role:masters.complex.example.com ok I0703 20:27:51.618636 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0703 20:27:51.618749 36200 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0703 20:27:51.618891 36200 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleComplex (14.47s) === RUN TestLifecycleExternalLB I0703 20:27:51.619902 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:51.620252 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:51.620304 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:51.620366 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:51.620438 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:51.620702 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:51.621062 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:51.621105 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:51.621138 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:51.621164 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster externallb.example.com I0703 20:27:51.643916 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:51.646770 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:51.646849 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:52.891624 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:53.038597 36200 iamrole.go:89] ListRoles: { } I0703 20:27:53.040029 36200 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0703 20:27:53.040373 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0703 20:27:53.040480 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } W0703 20:27:53.040517 36200 api.go:53] PageSize not implemented I0703 20:27:53.040515 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } W0703 20:27:53.040627 36200 api.go:53] PageSize not implemented I0703 20:27:53.040658 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } W0703 20:27:53.040756 36200 api.go:53] PageSize not implemented I0703 20:27:53.040693 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } I0703 20:27:53.040744 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0703 20:27:53.040675 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] }] } I0703 20:27:53.040860 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0703 20:27:53.040820 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0703 20:27:53.040722 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:53.040923 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:53.041037 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } I0703 20:27:53.041015 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0703 20:27:53.041133 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0703 20:27:53.041174 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0703 20:27:53.041200 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0703 20:27:53.041189 36200 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0703 20:27:53.041286 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:53.041491 36200 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.041612 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:53.041662 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:53.041804 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.041945 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:53.042070 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:53.042127 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:53.042371 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0703 20:27:53.042424 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0703 20:27:53.042457 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:53.042508 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:53.042543 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:53.042674 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:53.042776 36200 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0703 20:27:53.042874 36200 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0703 20:27:53.042978 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0703 20:27:53.042954 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0703 20:27:53.043035 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0703 20:27:53.043106 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0703 20:27:53.043097 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["externallb.example.com"] }] } I0703 20:27:53.043185 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0703 20:27:53.043239 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:53.043291 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0703 20:27:53.043341 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] }] } I0703 20:27:53.043548 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0703 20:27:53.043543 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["externallb.example.com"] }] } I0703 20:27:53.043547 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0703 20:27:53.043668 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:53.043711 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:53.043747 36200 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.043821 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:53.043859 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:53.043980 36200 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0703 20:27:53.044026 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:53.044062 36200 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0703 20:27:53.044130 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0703 20:27:53.044315 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "masters.externallb.example.com" }] }], VpcId: "vpc-1" } I0703 20:27:53.044394 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:53.044440 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:53.044473 36200 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0703 20:27:53.044518 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:27:53.044593 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:53.044639 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:53.044574 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/externallb.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0703 20:27:53.047551 36200 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0703 20:27:53.047765 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-udp-1to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.047940 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:53.048058 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:27:53.048114 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.049349 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.049609 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:53.050058 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.050277 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.externallb.example.com" }] }] } I0703 20:27:53.050518 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0703 20:27:53.050682 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:53.050904 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0703 20:27:53.050985 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:53.051157 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-2382to4000-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.051404 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.051630 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0703 20:27:53.051708 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:27:53.051777 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-4003to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.052031 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-::/0" }] }] } I0703 20:27:53.052339 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-1to2379-masters.externallb.example.com" }] }] } I0703 20:27:53.052745 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:53.052913 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0703 20:27:53.053441 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:53.053543 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:53.053811 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.externallb.example.com" }] }] } I0703 20:27:53.054024 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0703 20:27:53.055057 36200 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0703 20:27:53.055329 36200 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0703 20:27:53.055675 36200 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0703 20:27:53.055730 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:53.055763 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:53.055826 36200 dns.go:235] Pre-creating DNS records I0703 20:27:53.055882 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:53.061032 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:53.063705 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:53.063782 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:54.300621 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:54.447729 36200 iamrole.go:89] ListRoles: { } I0703 20:27:54.449170 36200 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0703 20:27:54.449365 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0703 20:27:54.449448 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0703 20:27:54.449418 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0703 20:27:54.449504 36200 api.go:53] PageSize not implemented I0703 20:27:54.449480 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } W0703 20:27:54.449722 36200 api.go:53] PageSize not implemented W0703 20:27:54.449921 36200 api.go:53] PageSize not implemented I0703 20:27:54.449870 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.449857 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0703 20:27:54.450053 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0703 20:27:54.450089 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0703 20:27:54.450148 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.450165 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0703 20:27:54.450305 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0703 20:27:54.450334 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0703 20:27:54.450290 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.450417 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:27:54.450447 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:27:54.450504 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:54.450554 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:54.450974 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.451893 36200 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0703 20:27:54.452018 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:54.452185 36200 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0703 20:27:54.452132 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.452320 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0703 20:27:54.452340 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.452520 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0703 20:27:54.452703 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:54.452754 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0703 20:27:54.452910 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:54.452973 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:27:54.453099 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.453229 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:27:54.456568 36200 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0703 20:27:54.456777 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:54.456881 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:54.457116 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:54.457253 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:54.457408 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:27:54.457619 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:54.457749 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:54.458357 36200 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0703 20:27:54.458624 36200 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0703 20:27:54.458850 36200 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0703 20:27:54.461343 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:27:54.461397 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:27:54.461428 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:27:54.461452 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:27:54.461481 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:27:54.461504 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:27:54.461530 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:27:54.461556 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:27:54.461582 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:27:54.461614 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:27:54.461644 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:27:54.461668 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:27:54.461694 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:27:54.461721 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:27:54.461746 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:54.461772 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:54.461799 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:27:54.461828 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:54.461851 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:27:54.461872 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:27:54.461895 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:54.461925 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:54.461953 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:27:54.461979 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:27:54.463067 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:27:54.463121 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:27:54.463138 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:27:54.463176 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.463218 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0703 20:27:54.463263 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.463311 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.463347 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.463392 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.463427 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.463457 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0703 20:27:54.463495 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.463538 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0703 20:27:54.463569 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } W0703 20:27:54.463613 36200 api.go:53] PageSize not implemented I0703 20:27:54.463633 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:54.463655 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:54.463674 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:27:54.463695 36200 targetgroups.go:35] PageSize not implemented I0703 20:27:54.463710 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0703 20:27:54.463750 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:27:54.463787 36200 iamrole.go:89] ListRoles: { } I0703 20:27:54.463825 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:54.463849 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:54.463888 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:27:54.463926 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:54.463953 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-group:master-us-test-1a.masters.externallb.example.com ok I0703 20:27:54.464398 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } autoscaling-group:nodes.externallb.example.com ok I0703 20:27:54.464455 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0703 20:27:54.464375 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:54.464557 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.externallb.example.com. ok iam-instance-profile:nodes.externallb.example.com ok I0703 20:27:54.464590 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0703 20:27:54.464476 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0703 20:27:54.464662 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:54.464650 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } iam-instance-profile:masters.externallb.example.com ok I0703 20:27:54.464682 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-config:lt-1 ok autoscaling-config:lt-2 ok I0703 20:27:54.464753 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0703 20:27:54.464808 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0703 20:27:54.464862 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0703 20:27:54.464903 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:54.464944 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0703 20:27:54.465041 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:54.465058 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0703 20:27:54.465081 36200 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0703 20:27:54.465157 36200 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0703 20:27:54.465259 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.externallb.example.com" } I0703 20:27:54.465262 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0703 20:27:54.465314 36200 iamrole.go:180] ListAttachedRolePolicies: masters.externallb.example.com I0703 20:27:54.465349 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0703 20:27:54.465379 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.externallb.example.com" } iam-role:masters.externallb.example.com ok I0703 20:27:54.465417 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.externallb.example.com" } I0703 20:27:54.465455 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.externallb.example.com I0703 20:27:54.465466 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0703 20:27:54.465497 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.externallb.example.com" } iam-role:nodes.externallb.example.com ok I0703 20:27:54.465570 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0703 20:27:54.465671 36200 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0703 20:27:54.465753 36200 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleExternalLB (2.85s) === RUN TestLifecycleSharedSubnet I0703 20:27:54.466325 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:54.466573 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:54.466613 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:54.466659 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:54.466693 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:54.466757 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:54.466794 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:54.466821 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:54.466866 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:54.466891 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedsubnet.example.com I0703 20:27:54.491135 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:54.494368 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:54.494441 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:55.734401 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:55.884469 36200 iamrole.go:89] ListRoles: { } I0703 20:27:55.885714 36200 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0703 20:27:55.885901 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:27:55.885998 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0703 20:27:55.886032 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0703 20:27:55.886157 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } I0703 20:27:55.886259 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0703 20:27:55.886412 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:55.886458 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:55.886666 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } I0703 20:27:55.886732 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:55.886802 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0703 20:27:55.886918 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:55.886976 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:55.887174 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:55.887357 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:55.887523 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:55.887583 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0703 20:27:55.888762 36200 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0703 20:27:55.888964 36200 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0703 20:27:55.889001 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0703 20:27:55.888920 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:27:55.889116 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0703 20:27:55.889104 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0703 20:27:55.889272 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0703 20:27:55.889214 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0703 20:27:55.889331 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:55.889386 36200 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "shared" }, { Key: "SubnetType", Value: "Public" } ] } I0703 20:27:55.889472 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0703 20:27:55.889648 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0703 20:27:55.889731 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:55.889705 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0703 20:27:55.889772 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:55.889844 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedsubnet.example.com" }] }], VpcId: "vpc-12345678" } I0703 20:27:55.889963 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:55.890034 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:55.890670 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedsubnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0703 20:27:55.893384 36200 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0703 20:27:55.893582 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0703 20:27:55.893815 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-1to2379-masters.sharedsubnet.example.com" }] }] } I0703 20:27:55.893948 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0703 20:27:55.894117 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0703 20:27:55.894317 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0703 20:27:55.894491 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0703 20:27:55.894661 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0703 20:27:55.894779 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-2382to4000-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0703 20:27:55.894891 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-udp-1to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0703 20:27:55.894998 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0703 20:27:55.895105 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:55.895189 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:55.895262 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0703 20:27:55.895472 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:55.895566 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0703 20:27:55.895737 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:55.895868 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-4003to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0703 20:27:55.896046 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" }] }] } I0703 20:27:55.896231 36200 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0703 20:27:55.896465 36200 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0703 20:27:55.896671 36200 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0703 20:27:55.896706 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:55.896737 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:55.896798 36200 dns.go:235] Pre-creating DNS records I0703 20:27:55.896824 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:55.906224 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:55.909856 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:55.909933 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:57.145366 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:57.293650 36200 iamrole.go:89] ListRoles: { } I0703 20:27:57.294756 36200 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0703 20:27:57.295291 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:57.295450 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:27:57.295551 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0703 20:27:57.295588 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0703 20:27:57.295532 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:57.295631 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.295765 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.297444 36200 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0703 20:27:57.297627 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0703 20:27:57.297770 36200 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0703 20:27:57.297743 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0703 20:27:57.297835 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0703 20:27:57.297914 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:57.297961 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0703 20:27:57.298076 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:57.298122 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:27:57.302030 36200 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0703 20:27:57.302209 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:57.302333 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:57.302519 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:57.302675 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:57.303110 36200 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0703 20:27:57.303317 36200 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0703 20:27:57.303473 36200 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0703 20:27:57.305616 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:27:57.305675 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:27:57.305701 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:27:57.305725 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:27:57.305749 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:27:57.305773 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:27:57.305818 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:27:57.305847 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:27:57.305883 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:27:57.305908 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:27:57.305930 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:27:57.305953 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:57.305979 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:57.306006 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:57.306032 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:27:57.306054 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:27:57.306075 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:57.306101 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:57.306127 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:27:57.307253 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:27:57.307311 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:27:57.307325 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:27:57.307360 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.307406 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0703 20:27:57.307452 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.307523 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.307565 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.307602 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.307639 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.307668 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0703 20:27:57.307699 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.307732 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0703 20:27:57.307757 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } W0703 20:27:57.307799 36200 api.go:53] PageSize not implemented I0703 20:27:57.307819 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:57.307841 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:57.307858 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:27:57.307879 36200 targetgroups.go:35] PageSize not implemented I0703 20:27:57.307897 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0703 20:27:57.307938 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:27:57.307972 36200 iamrole.go:89] ListRoles: { } I0703 20:27:57.308011 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:57.308036 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:57.308075 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:27:57.308108 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:27:57.308416 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0703 20:27:57.308467 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } iam-instance-profile:nodes.sharedsubnet.example.com ok I0703 20:27:57.308469 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } autoscaling-group:master-us-test-1a.masters.sharedsubnet.example.com ok keypair:key-1 ok I0703 20:27:57.308524 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } autoscaling-group:nodes.sharedsubnet.example.com ok I0703 20:27:57.308471 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:57.308611 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.sharedsubnet.example.com. ok I0703 20:27:57.308575 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0703 20:27:57.308677 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } iam-instance-profile:masters.sharedsubnet.example.com ok W0703 20:27:57.308688 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:57.308727 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-config:lt-1 ok I0703 20:27:57.308782 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0703 20:27:57.308836 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0703 20:27:57.308875 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:57.308921 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0703 20:27:57.309098 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:27:57.309115 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0703 20:27:57.309183 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedsubnet.example.com" } I0703 20:27:57.309229 36200 iamrole.go:180] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0703 20:27:57.309244 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedsubnet.example.com" } I0703 20:27:57.309293 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0703 20:27:57.309307 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0703 20:27:57.309334 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedsubnet.example.com" } iam-role:nodes.sharedsubnet.example.com ok I0703 20:27:57.309361 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0703 20:27:57.309384 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedsubnet.example.com" } iam-role:masters.sharedsubnet.example.com ok --- PASS: TestLifecycleSharedSubnet (2.84s) === RUN TestLifecyclePrivateSharedSubnet I0703 20:27:57.309880 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:27:57.310083 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:27:57.310117 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:27:57.310151 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:27:57.310184 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:27:57.310223 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:27:57.310258 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:27:57.310282 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:27:57.310315 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:27:57.310336 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-subnet.example.com I0703 20:27:57.333169 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:57.339325 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:57.339403 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:57.339449 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:58.573879 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:58.722749 36200 iamrole.go:89] ListRoles: { } I0703 20:27:58.724475 36200 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0703 20:27:58.724863 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } I0703 20:27:58.724899 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:27:58.724962 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0703 20:27:58.725085 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.725175 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } I0703 20:27:58.725236 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0703 20:27:58.725230 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] }] } I0703 20:27:58.725397 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:58.725523 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:27:58.725569 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:27:58.725630 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0703 20:27:58.725655 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0703 20:27:58.725703 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:27:58.725731 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] }] } I0703 20:27:58.725832 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } I0703 20:27:58.725895 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0703 20:27:58.725894 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:27:58.726016 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:27:58.727434 36200 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0703 20:27:58.727601 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0703 20:27:58.727781 36200 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0703 20:27:58.727712 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0703 20:27:58.727816 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0703 20:27:58.727807 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0703 20:27:58.727892 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:27:58.727875 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0703 20:27:58.728027 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0703 20:27:58.728019 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0703 20:27:58.728041 36200 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-su-5ol32q", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-private-shared-su-5ol32q" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0703 20:27:58.728154 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:27:58.728163 36200 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0703 20:27:58.728221 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:27:58.728240 36200 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0703 20:27:58.728257 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0703 20:27:58.728345 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0703 20:27:58.728389 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0703 20:27:58.728438 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0703 20:27:58.728612 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0703 20:27:58.728692 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:27:58.728737 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:27:58.728778 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0703 20:27:58.728977 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0703 20:27:58.729139 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0703 20:27:58.729307 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0703 20:27:58.729390 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:27:58.729432 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:27:58.729469 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:27:58.729514 36200 tags.go:42] CreateTags { Resources: ["subnet-abcdef"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Utility" },{ Key: "kubernetes.io/role/elb", Value: "1" }] } I0703 20:27:58.729581 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0703 20:27:58.729658 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0703 20:27:58.729696 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:27:58.729733 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:27:58.729772 36200 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Private" },{ Key: "kubernetes.io/role/internal-elb", Value: "1" }] } I0703 20:27:58.729668 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-subnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0703 20:27:58.729969 36200 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0703 20:27:58.730114 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } W0703 20:27:58.730310 36200 api.go:53] PageSize not implemented I0703 20:27:58.730274 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:27:58.730349 36200 loadbalancers.go:35] PageSize not implemented I0703 20:27:58.730224 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0703 20:27:58.730386 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-udp-1to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.730428 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:27:58.730454 36200 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-su-5ol32q", SubnetMappings: [{ SubnetId: "subnet-abcdef" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], Type: "network" } I0703 20:27:58.730504 36200 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"], Tags: [{ Key: "Name", Value: "api.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0703 20:27:58.730538 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0703 20:27:58.730559 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:27:58.730587 36200 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0703 20:27:58.730585 36200 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1", Port: 22, Protocol: "TCP" } I0703 20:27:58.730634 36200 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } W0703 20:27:58.730706 36200 api.go:53] PageSize not implemented I0703 20:27:58.730725 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:27:58.730645 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.730994 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:27:58.731160 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.731344 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0703 20:27:58.731473 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.731578 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-1to2379-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0703 20:27:58.731716 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0703 20:27:58.731796 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0703 20:27:58.731892 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.732005 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.732112 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.732212 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-2382to4000-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.732350 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-4003to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.732457 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.732555 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.732652 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.732749 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0703 20:27:58.732854 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:27:58.732924 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0703 20:27:58.733022 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-::/0" }] }] } I0703 20:27:58.733123 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:58.733207 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:58.733290 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0703 20:27:58.733469 36200 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0703 20:27:58.733522 36200 api.go:53] PageSize not implemented I0703 20:27:58.733558 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:27:58.733567 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0703 20:27:58.733642 36200 api.go:53] PageSize not implemented I0703 20:27:58.733678 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:27:58.733654 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:58.733781 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:58.733907 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:27:58.737985 36200 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0703 20:27:58.738230 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:58.738341 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:58.738428 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:58.738533 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:58.738971 36200 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0703 20:27:58.739183 36200 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0703 20:27:58.739396 36200 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0703 20:27:58.739438 36200 zones.go:93] ListHostedZonesPages { } I0703 20:27:58.739473 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:58.739531 36200 dns.go:235] Pre-creating DNS records I0703 20:27:58.739552 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:27:58.744702 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:27:58.747553 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:58.747623 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:27:58.747667 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:00.088961 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:00.239735 36200 iamrole.go:89] ListRoles: { } I0703 20:28:00.241285 36200 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0703 20:28:00.241551 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:28:00.242113 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:28:00.242327 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:28:00.242420 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0703 20:28:00.242449 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0703 20:28:00.242487 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] }] } I0703 20:28:00.242698 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0703 20:28:00.244277 36200 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0703 20:28:00.244408 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0703 20:28:00.244552 36200 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0703 20:28:00.244516 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0703 20:28:00.244598 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0703 20:28:00.244645 36200 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0703 20:28:00.244651 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0703 20:28:00.244699 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0703 20:28:00.244587 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:28:00.244793 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0703 20:28:00.245014 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:28:00.245077 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0703 20:28:00.245230 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:28:00.245279 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0703 20:28:00.245417 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:28:00.245479 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0703 20:28:00.245665 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:28:00.245745 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0703 20:28:00.246137 36200 executor.go:111] Tasks: 72 done / 123 total; 31 can run W0703 20:28:00.246310 36200 api.go:53] PageSize not implemented I0703 20:28:00.246324 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:28:00.246402 36200 loadbalancers.go:35] PageSize not implemented I0703 20:28:00.246348 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:28:00.246421 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0703 20:28:00.246462 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0703 20:28:00.246471 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:28:00.246496 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0703 20:28:00.246521 36200 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0703 20:28:00.246447 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:00.246530 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0703 20:28:00.246601 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0703 20:28:00.246613 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0703 20:28:00.246695 36200 api.go:53] PageSize not implemented I0703 20:28:00.246712 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:28:00.246942 36200 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0703 20:28:00.246994 36200 api.go:53] PageSize not implemented I0703 20:28:00.247041 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:28:00.247040 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:28:00.247115 36200 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0703 20:28:00.247146 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:28:00.247189 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:28:00.247266 36200 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" W0703 20:28:00.247291 36200 api.go:53] PageSize not implemented I0703 20:28:00.247351 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:28:00.247408 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:28:00.251509 36200 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0703 20:28:00.251655 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:00.251811 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:00.251949 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:00.252076 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:00.252476 36200 executor.go:111] Tasks: 115 done / 123 total; 2 can run W0703 20:28:00.252580 36200 api.go:53] PageSize not implemented I0703 20:28:00.252603 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:28:00.252774 36200 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0703 20:28:00.252969 36200 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0703 20:28:00.255629 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:28:00.255684 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:28:00.255711 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:28:00.255734 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:28:00.255757 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:28:00.255781 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:28:00.255809 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:28:00.255837 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:28:00.255870 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0703 20:28:00.255899 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:28:00.255925 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:28:00.255948 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:28:00.255971 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:28:00.255994 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:28:00.256020 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:28:00.256046 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0703 20:28:00.256068 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:28:00.256094 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:28:00.256119 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:28:00.256142 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:28:00.256167 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:28:00.256194 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:28:00.257466 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:28:00.257548 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:28:00.257568 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:28:00.257604 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0703 20:28:00.257652 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0703 20:28:00.257707 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0703 20:28:00.257760 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0703 20:28:00.257794 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0703 20:28:00.257826 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0703 20:28:00.257860 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0703 20:28:00.257886 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0703 20:28:00.257912 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0703 20:28:00.257946 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0703 20:28:00.257972 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } W0703 20:28:00.258010 36200 api.go:53] PageSize not implemented I0703 20:28:00.258026 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0703 20:28:00.258058 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:28:00.258078 36200 loadbalancers.go:35] PageSize not implemented I0703 20:28:00.258093 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0703 20:28:00.258123 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:28:00.258141 36200 targetgroups.go:35] PageSize not implemented I0703 20:28:00.258155 36200 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" ] } I0703 20:28:00.258204 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:28:00.258240 36200 iamrole.go:89] ListRoles: { } I0703 20:28:00.258280 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:00.258303 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:28:00.258339 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:28:00.258373 36200 routetable.go:53] DescribeRouteTables: { } autoscaling-config:lt-2 ok autoscaling-group:bastion.private-shared-subnet.example.com ok autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com ok autoscaling-config:lt-1 ok I0703 20:28:00.258864 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0703 20:28:00.258887 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0703 20:28:00.258927 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:28:00.258952 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } autoscaling-group:nodes.private-shared-subnet.example.com ok iam-instance-profile:bastions.private-shared-subnet.example.com ok I0703 20:28:00.258920 36200 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } load-balancer:api-private-shared-subnet-n2f8ak ok I0703 20:28:00.258954 36200 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0703 20:28:00.258974 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4 ok I0703 20:28:00.258997 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0703 20:28:00.259060 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } iam-instance-profile:masters.private-shared-subnet.example.com ok I0703 20:28:00.259047 36200 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1 ok I0703 20:28:00.259057 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 } ] } I0703 20:28:00.259183 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } W0703 20:28:00.259229 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:00.259230 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } iam-instance-profile:nodes.private-shared-subnet.example.com ok I0703 20:28:00.259247 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0703 20:28:00.259139 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.private-shared-subnet.example.com. ok I0703 20:28:00.259276 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0703 20:28:00.259466 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:00.259488 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0703 20:28:00.259516 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:28:00.259559 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0703 20:28:00.259650 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:00.259669 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0703 20:28:00.259701 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0703 20:28:00.259746 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-3 ok I0703 20:28:00.259840 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-subnet.example.com" } I0703 20:28:00.259881 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:28:00.259885 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-subnet.example.com" } I0703 20:28:00.259961 36200 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0703 20:28:00.259987 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0703 20:28:00.259935 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } W0703 20:28:00.260032 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:00.260024 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0703 20:28:00.260045 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0703 20:28:00.260064 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-subnet.example.com" } iam-role:nodes.private-shared-subnet.example.com ok I0703 20:28:00.260091 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-subnet.example.com" } I0703 20:28:00.260137 36200 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0703 20:28:00.260150 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0703 20:28:00.260178 36200 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-subnet.example.com" } iam-role:bastions.private-shared-subnet.example.com ok I0703 20:28:00.260204 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0703 20:28:00.260227 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-subnet.example.com" } iam-role:masters.private-shared-subnet.example.com ok --- PASS: TestLifecyclePrivateSharedSubnet (2.95s) === RUN TestLifecyclePrivateSharedIP I0703 20:28:00.260731 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:28:00.260979 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:28:00.261015 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:28:00.261053 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:28:00.261088 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:28:00.261128 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:28:00.261164 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:28:00.261188 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:28:00.261218 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:28:00.261240 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-ip.example.com I0703 20:28:00.283688 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:28:00.287018 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:00.287085 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:00.287132 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:01.508008 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:01.658260 36200 iamrole.go:89] ListRoles: { } I0703 20:28:01.660016 36200 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0703 20:28:01.660412 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } I0703 20:28:01.660443 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:01.660518 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0703 20:28:01.660612 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:28:01.661198 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:28:01.661284 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:28:01.661372 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0703 20:28:01.661407 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0703 20:28:01.661672 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:28:01.661833 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.662584 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } I0703 20:28:01.662663 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.private-shared-ip.example.com" }] } I0703 20:28:01.662851 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:01.663005 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:28:01.663124 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:28:01.663364 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:28:01.663571 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } I0703 20:28:01.663650 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0703 20:28:01.664587 36200 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0703 20:28:01.664746 36200 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0703 20:28:01.664712 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:01.664802 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0703 20:28:01.664895 36200 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0703 20:28:01.664873 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0703 20:28:01.664886 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:01.664912 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-12345678" } I0703 20:28:01.665001 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0703 20:28:01.664998 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:01.665013 36200 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-ip-eepmph", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-private-shared-ip-eepmph" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0703 20:28:01.665095 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0703 20:28:01.665111 36200 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0703 20:28:01.665075 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" } ] }], VpcId: "vpc-12345678" } I0703 20:28:01.665140 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0703 20:28:01.665194 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:28:01.665238 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:28:01.665235 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0703 20:28:01.665200 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-12345678" } I0703 20:28:01.665283 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0703 20:28:01.665320 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0703 20:28:01.665280 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0703 20:28:01.665448 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }], VpcId: "vpc-12345678" } I0703 20:28:01.665465 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0703 20:28:01.665528 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:28:01.665615 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:28:01.665670 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0703 20:28:01.665929 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0703 20:28:01.666163 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0703 20:28:01.666260 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0703 20:28:01.666388 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:28:01.666484 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:28:01.666521 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:01.666632 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0703 20:28:01.666730 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:28:01.666710 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" } ] }], VpcId: "vpc-12345678" } I0703 20:28:01.666779 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:28:01.666849 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:28:01.666910 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:28:01.666944 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0703 20:28:01.667038 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0703 20:28:01.667078 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:28:01.667133 36200 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] } I0703 20:28:01.667271 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:28:01.667350 36200 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" } ] } I0703 20:28:01.667456 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:28:01.667536 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:28:01.667298 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-ip.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0703 20:28:01.667778 36200 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0703 20:28:01.667904 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:28:01.667980 36200 loadbalancers.go:35] PageSize not implemented I0703 20:28:01.667978 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0703 20:28:01.668087 36200 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-ip-eepmph", SubnetMappings: [{ SubnetId: "subnet-2" }], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }], Type: "network" } W0703 20:28:01.668167 36200 api.go:53] PageSize not implemented I0703 20:28:01.668154 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:28:01.668302 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:01.668384 36200 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"], Tags: [{ Key: "Name", Value: "api.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0703 20:28:01.668320 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-2382to4000-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0703 20:28:01.668439 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:01.668469 36200 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0703 20:28:01.668465 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" }] }] } I0703 20:28:01.668521 36200 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0703 20:28:01.668583 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:28:01.668665 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-::/0" }] }] } I0703 20:28:01.668847 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.669025 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-udp-1to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.669190 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0703 20:28:01.669279 36200 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0703 20:28:01.669362 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:28:01.669451 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:28:01.669483 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:28:01.669545 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:01.669595 36200 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1", Port: 22, Protocol: "TCP" } W0703 20:28:01.669685 36200 api.go:53] PageSize not implemented I0703 20:28:01.669671 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:01.669706 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:01.669747 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:01.669823 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-2" } I0703 20:28:01.669867 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.670008 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:28:01.670130 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0703 20:28:01.670245 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-masters.private-shared-ip.example.com" }] }] } I0703 20:28:01.670366 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.670479 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-4003to65535-masters.private-shared-ip.example.com" }] }] } I0703 20:28:01.670587 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.670700 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.670805 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.670923 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:28:01.671000 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-1to2379-masters.private-shared-ip.example.com" }] }] } I0703 20:28:01.671112 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-2" } I0703 20:28:01.671157 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.671264 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0703 20:28:01.671367 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0703 20:28:01.671543 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.671651 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.671750 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0703 20:28:01.671791 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0703 20:28:01.671823 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0703 20:28:01.671925 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:28:01.671962 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0703 20:28:01.671999 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0703 20:28:01.672028 36200 tags.go:42] CreateTags { Resources: ["eipalloc-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "shared" }] } I0703 20:28:01.672095 36200 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0703 20:28:01.672140 36200 api.go:53] PageSize not implemented I0703 20:28:01.672173 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:01.672179 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:28:01.672230 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:01.672321 36200 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:28:01.672270 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:28:01.672382 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0703 20:28:01.672353 36200 api.go:53] PageSize not implemented I0703 20:28:01.672465 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:01.672434 36200 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-12345678", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0703 20:28:01.672514 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0703 20:28:01.672463 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:28:01.672551 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:28:01.672585 36200 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0703 20:28:01.676910 36200 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0703 20:28:01.677044 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:01.677175 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0703 20:28:01.677229 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:01.677315 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:01.677403 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:01.677525 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:01.677924 36200 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0703 20:28:01.678148 36200 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0703 20:28:01.678367 36200 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0703 20:28:01.678410 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:01.678444 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:28:01.678505 36200 dns.go:235] Pre-creating DNS records I0703 20:28:01.678529 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:28:01.683778 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:28:01.686686 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:01.686758 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:01.686806 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:02.900871 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:03.045366 36200 iamrole.go:89] ListRoles: { } I0703 20:28:03.046639 36200 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0703 20:28:03.048571 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] }] } I0703 20:28:03.050145 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0703 20:28:03.050253 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0703 20:28:03.050283 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0703 20:28:03.050963 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] }] } I0703 20:28:03.051128 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:28:03.051246 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:28:03.054077 36200 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0703 20:28:03.054238 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0703 20:28:03.054224 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0703 20:28:03.054393 36200 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0703 20:28:03.054346 36200 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0703 20:28:03.054417 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:28:03.054440 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0703 20:28:03.054493 36200 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0703 20:28:03.054475 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.054599 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0703 20:28:03.054743 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:28:03.054790 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:28:03.054827 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.054934 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.054987 36200 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0703 20:28:03.055028 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0703 20:28:03.055152 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:28:03.055190 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0703 20:28:03.055293 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:28:03.055340 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0703 20:28:03.055421 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.055520 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0703 20:28:03.056482 36200 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0703 20:28:03.056645 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:28:03.056732 36200 loadbalancers.go:35] PageSize not implemented W0703 20:28:03.056763 36200 api.go:53] PageSize not implemented I0703 20:28:03.056747 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:03.056752 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0703 20:28:03.056805 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:03.056905 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:03.056894 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0703 20:28:03.056903 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:03.056946 36200 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0703 20:28:03.056942 36200 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0703 20:28:03.056984 36200 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0703 20:28:03.057016 36200 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0703 20:28:03.057023 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0703 20:28:03.057085 36200 api.go:53] PageSize not implemented I0703 20:28:03.057100 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:03.057106 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:28:03.057214 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0703 20:28:03.057282 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:03.057517 36200 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0703 20:28:03.057593 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:28:03.057733 36200 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0703 20:28:03.057783 36200 api.go:53] PageSize not implemented I0703 20:28:03.057814 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:03.057842 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:28:03.057817 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:03.057884 36200 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0703 20:28:03.057903 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0703 20:28:03.057903 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } W0703 20:28:03.057979 36200 api.go:53] PageSize not implemented I0703 20:28:03.057981 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0703 20:28:03.058013 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:03.058040 36200 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0703 20:28:03.058066 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:03.062588 36200 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0703 20:28:03.062739 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:03.062884 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:03.062956 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:03.063098 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:03.063145 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:03.063669 36200 executor.go:111] Tasks: 124 done / 132 total; 2 can run W0703 20:28:03.063757 36200 api.go:53] PageSize not implemented I0703 20:28:03.063774 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:03.063938 36200 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0703 20:28:03.064099 36200 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0703 20:28:03.066667 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:28:03.066718 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:28:03.066745 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:28:03.066773 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:28:03.066796 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:28:03.066821 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:28:03.066848 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:28:03.066875 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:28:03.066900 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0703 20:28:03.066930 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0703 20:28:03.066955 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:28:03.066977 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:28:03.066998 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:28:03.067026 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:28:03.067047 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0703 20:28:03.067070 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:28:03.067093 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:28:03.067114 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0703 20:28:03.067138 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0703 20:28:03.067161 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:28:03.067185 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:28:03.067207 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0703 20:28:03.067230 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:28:03.067251 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:28:03.067274 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:28:03.067299 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:28:03.067325 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:28:03.068551 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:28:03.068613 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:28:03.068629 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:28:03.068661 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.068707 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0703 20:28:03.068760 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.068810 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.068844 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.068877 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.068909 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.068942 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0703 20:28:03.068984 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.069022 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:28:03.069043 36200 natgateway.go:117] DescribeNatGateways: { } I0703 20:28:03.069078 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0703 20:28:03.069105 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } W0703 20:28:03.069138 36200 api.go:53] PageSize not implemented I0703 20:28:03.069153 36200 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0703 20:28:03.069183 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:28:03.069203 36200 loadbalancers.go:35] PageSize not implemented I0703 20:28:03.069219 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0703 20:28:03.069247 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:28:03.069265 36200 targetgroups.go:35] PageSize not implemented I0703 20:28:03.069279 36200 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" ] } I0703 20:28:03.069325 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:28:03.069357 36200 iamrole.go:89] ListRoles: { } I0703 20:28:03.069394 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:03.069416 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:28:03.069453 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:28:03.069488 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:28:03.069515 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1"] } I0703 20:28:03.069544 36200 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0703 20:28:03.069570 36200 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } autoscaling-group:master-us-test-1a.masters.private-shared-ip.example.com ok I0703 20:28:03.070055 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0703 20:28:03.070104 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } autoscaling-config:lt-2 ok iam-instance-profile:masters.private-shared-ip.example.com ok autoscaling-group:nodes.private-shared-ip.example.com ok I0703 20:28:03.070143 36200 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } I0703 20:28:03.070170 36200 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } nat-gateway:nat-1 ok autoscaling-config:lt-1 ok I0703 20:28:03.070180 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0703 20:28:03.070241 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } iam-instance-profile:bastions.private-shared-ip.example.com ok autoscaling-config:lt-3 ok I0703 20:28:03.070244 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } autoscaling-group:bastion.private-shared-ip.example.com ok I0703 20:28:03.070269 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0703 20:28:03.070317 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } iam-instance-profile:nodes.private-shared-ip.example.com ok I0703 20:28:03.070321 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0703 20:28:03.070342 36200 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4 ok load-balancer:api-private-shared-ip-exa-ohatqj ok I0703 20:28:03.070375 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:28:03.070418 36200 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1 ok keypair:key-1 ok I0703 20:28:03.070277 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.private-shared-ip.example.com ok I0703 20:28:03.070423 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 } ] } W0703 20:28:03.070559 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:03.070574 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0703 20:28:03.070610 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:28:03.070683 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0703 20:28:03.070882 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:03.070902 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0703 20:28:03.070953 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0703 20:28:03.070999 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0703 20:28:03.071037 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0703 20:28:03.071130 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:03.071144 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0703 20:28:03.071221 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0703 20:28:03.071235 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-ip.example.com" } I0703 20:28:03.071278 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0703 20:28:03.071291 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0703 20:28:03.071259 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0703 20:28:03.071323 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-ip.example.com" } iam-role:nodes.private-shared-ip.example.com ok W0703 20:28:03.071338 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:03.071352 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0703 20:28:03.071351 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-ip.example.com" } I0703 20:28:03.071382 36200 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0703 20:28:03.071393 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0703 20:28:03.071384 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } I0703 20:28:03.071418 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-ip.example.com" } subnet:subnet-2 ok iam-role:masters.private-shared-ip.example.com ok I0703 20:28:03.071435 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-ip.example.com" } I0703 20:28:03.071467 36200 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0703 20:28:03.071457 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0703 20:28:03.071480 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0703 20:28:03.071501 36200 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-ip.example.com" } iam-role:bastions.private-shared-ip.example.com ok I0703 20:28:03.071569 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0703 20:28:03.071621 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok --- PASS: TestLifecyclePrivateSharedIP (2.81s) === RUN TestLifecycleManyAddons I0703 20:28:03.072132 36200 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:28:03.072353 36200 internetgateways.go:66] CreateInternetGateway: { } I0703 20:28:03.072388 36200 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:28:03.072424 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:28:03.072457 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:28:03.072496 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:28:03.072528 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:28:03.072554 36200 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:28:03.072585 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:28:03.072607 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0703 20:28:03.094578 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:28:03.097661 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:03.097732 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:04.353104 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:05.053101 36200 iamrole.go:89] ListRoles: { } I0703 20:28:05.054747 36200 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0703 20:28:05.055200 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0703 20:28:05.055319 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal.example.com" }] } I0703 20:28:05.055452 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:28:05.055503 36200 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0703 20:28:05.055612 36200 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0703 20:28:05.055618 36200 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.055674 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:28:05.055771 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:05.055984 36200 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.056107 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:28:05.056159 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:05.056316 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:28:05.056470 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:28:05.056530 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:05.056799 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] }] } I0703 20:28:05.056809 36200 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.056939 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0703 20:28:05.056989 36200 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0703 20:28:05.057034 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:28:05.057093 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:28:05.057143 36200 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0703 20:28:05.057330 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:28:05.058745 36200 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0703 20:28:05.058891 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:28:05.059020 36200 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0703 20:28:05.059078 36200 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0703 20:28:05.059064 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0703 20:28:05.059185 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0703 20:28:05.059228 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0703 20:28:05.059205 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:05.059302 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0703 20:28:05.059323 36200 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0703 20:28:05.059407 36200 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], VpcId: "vpc-1" } I0703 20:28:05.059393 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:28:05.059608 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0703 20:28:05.059647 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeTags\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0703 20:28:05.059858 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }], VpcId: "vpc-1" } I0703 20:28:05.059966 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:28:05.060003 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:28:05.060037 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:05.060170 36200 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" }] }] } I0703 20:28:05.060235 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:28:05.060268 36200 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0703 20:28:05.060339 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:28:05.060378 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:28:05.060408 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:05.060577 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:28:05.060556 36200 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0703 20:28:05.060641 36200 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" } ] } I0703 20:28:05.060720 36200 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0703 20:28:05.060767 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:28:05.060810 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:28:05.061342 36200 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"acm:DescribeCertificate\",\n \"acm:ListCertificates\",\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"cognito-idp:DescribeUserPoolClient\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:CreateSnapshot\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcPeeringConnections\",\n \"ec2:DescribeVpcs\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"elasticloadbalancing:DescribeListenerCertificates\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeRules\",\n \"elasticloadbalancing:DescribeTags\",\n \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteSnapshot\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddListenerCertificates\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteRule\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyRule\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:RemoveListenerCertificates\",\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:SetIpAddressType\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\",\n \"elasticloadbalancing:SetSecurityGroups\",\n \"elasticloadbalancing:SetSubnets\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateRule\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0703 20:28:05.063593 36200 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0703 20:28:05.063704 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:05.063850 36200 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:28:05.063901 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.064074 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0703 20:28:05.064319 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.064490 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.064646 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.064800 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" }] }] } I0703 20:28:05.064964 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" }] }] } I0703 20:28:05.065083 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:05.065158 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:05.065211 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.065323 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:05.065440 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:05.065531 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.065720 36200 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0703 20:28:05.065772 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.065890 36200 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.066019 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:05.066105 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:05.066178 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.066326 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0703 20:28:05.066368 36200 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0703 20:28:05.066402 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.066518 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.066628 36200 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0703 20:28:05.066880 36200 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0703 20:28:05.067139 36200 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0703 20:28:05.067396 36200 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0703 20:28:05.067448 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:05.067485 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:28:05.067563 36200 dns.go:235] Pre-creating DNS records I0703 20:28:05.067590 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:28:05.072597 36200 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0703 20:28:05.075631 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:05.075702 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:06.318506 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:06.951713 36200 iamrole.go:89] ListRoles: { } I0703 20:28:06.952503 36200 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0703 20:28:06.952849 36200 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0703 20:28:06.952826 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.953050 36200 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0703 20:28:06.953175 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.953303 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:28:06.953330 36200 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:28:06.953374 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:28:06.953409 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.953523 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.957562 36200 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0703 20:28:06.957903 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.958209 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0703 20:28:06.958337 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:28:06.958383 36200 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0703 20:28:06.958420 36200 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0703 20:28:06.958398 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.958485 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0703 20:28:06.958669 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:28:06.958790 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:28:06.959341 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.959435 36200 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:28:06.959456 36200 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:28:06.964619 36200 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0703 20:28:06.964799 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:06.964981 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:06.965134 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:06.965209 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:06.965315 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:06.965469 36200 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0703 20:28:06.965596 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:06.966088 36200 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0703 20:28:06.966308 36200 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0703 20:28:06.966467 36200 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0703 20:28:06.968926 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0703 20:28:06.968982 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0703 20:28:06.969014 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0703 20:28:06.969042 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0703 20:28:06.969069 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0703 20:28:06.969092 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0703 20:28:06.969116 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0703 20:28:06.969141 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0703 20:28:06.969166 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0703 20:28:06.969200 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0703 20:28:06.969228 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0703 20:28:06.969252 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0703 20:28:06.969277 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0703 20:28:06.969303 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0703 20:28:06.969326 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:28:06.969351 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0703 20:28:06.969376 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:28:06.969403 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0703 20:28:06.969423 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0703 20:28:06.969446 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0703 20:28:06.969469 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0703 20:28:06.969493 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0703 20:28:06.969520 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:28:06.969546 36200 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0703 20:28:06.970952 36200 delete_cluster.go:128] Looking for cloud resources to delete W0703 20:28:06.971006 36200 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0703 20:28:06.971023 36200 keypairs.go:95] DescribeKeyPairs: { } I0703 20:28:06.971057 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.971099 36200 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0703 20:28:06.971147 36200 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.971196 36200 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.971234 36200 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.971281 36200 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.971317 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.971348 36200 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0703 20:28:06.971385 36200 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.971426 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0703 20:28:06.971460 36200 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0703 20:28:06.971496 36200 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0703 20:28:06.971526 36200 api.go:53] PageSize not implemented I0703 20:28:06.971545 36200 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0703 20:28:06.971567 36200 loadbalancers.go:35] PageSize not implemented I0703 20:28:06.971583 36200 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0703 20:28:06.971604 36200 targetgroups.go:35] PageSize not implemented I0703 20:28:06.971620 36200 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0703 20:28:06.971665 36200 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0703 20:28:06.971700 36200 iamrole.go:89] ListRoles: { } I0703 20:28:06.971739 36200 zones.go:93] ListHostedZonesPages { } I0703 20:28:06.971763 36200 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0703 20:28:06.971798 36200 internetgateways.go:101] DescribeInternetGateways: { } I0703 20:28:06.971834 36200 routetable.go:53] DescribeRouteTables: { } I0703 20:28:06.971860 36200 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0703 20:28:06.972221 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } autoscaling-group:nodes.minimal.example.com ok I0703 20:28:06.972282 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0703 20:28:06.972218 36200 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0703 20:28:06.972333 36200 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0703 20:28:06.972372 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0703 20:28:06.972420 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0703 20:28:06.972436 36200 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0703 20:28:06.972508 36200 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } autoscaling-group:master-us-test-1a.masters.minimal.example.com ok iam-instance-profile:masters.minimal.example.com ok I0703 20:28:06.972338 36200 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.minimal.example.com. ok I0703 20:28:06.972463 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0703 20:28:06.972585 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:06.972601 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0703 20:28:06.972630 36200 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0703 20:28:06.972668 36200 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0703 20:28:06.972839 36200 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0703 20:28:06.972857 36200 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0703 20:28:06.972885 36200 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-1 ok I0703 20:28:06.972946 36200 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-2 ok I0703 20:28:06.973039 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0703 20:28:06.973079 36200 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0703 20:28:06.973093 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0703 20:28:06.973122 36200 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0703 20:28:06.973089 36200 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0703 20:28:06.973153 36200 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0703 20:28:06.973207 36200 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0703 20:28:06.973222 36200 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0703 20:28:06.973249 36200 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0703 20:28:06.973309 36200 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0703 20:28:06.973369 36200 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0703 20:28:06.973422 36200 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleManyAddons (3.90s) === RUN TestGetFilters --- PASS: TestGetFilters (0.00s) === RUN TestGetInstanceSelectorOpts --- PASS: TestGetInstanceSelectorOpts (0.00s) === RUN TestValidateAllPrivateOrPublicSubnets --- PASS: TestValidateAllPrivateOrPublicSubnets (0.00s) === RUN TestValidateUserSubnetsWithClusterSubnets --- PASS: TestValidateUserSubnetsWithClusterSubnets (0.00s) === RUN TestCreateInstanceGroup --- PASS: TestCreateInstanceGroup (0.00s) === RUN TestDecorateWithInstanceGroupSpecs --- PASS: TestDecorateWithInstanceGroupSpecs (0.00s) === RUN TestDecorateWithMixedInstancesPolicy --- PASS: TestDecorateWithMixedInstancesPolicy (0.00s) === RUN TestDecorateWithClusterAutoscalerLabels --- PASS: TestDecorateWithClusterAutoscalerLabels (0.00s) === RUN TestNewTemplateContext --- PASS: TestNewTemplateContext (0.00s) PASS ok k8s.io/kops/cmd/kops 199.570s === RUN TestBuildProxyRequest === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/livez === RUN TestBuildProxyRequest/http://127.0.0.1:3990/healthz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ready === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz? === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude --- PASS: TestBuildProxyRequest (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/livez (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/healthz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ready (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz? (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude (0.00s) PASS ok k8s.io/kops/cmd/kube-apiserver-healthcheck 0.003s === RUN TestAliasForNodesInRole --- PASS: TestAliasForNodesInRole (0.00s) === RUN TestEnsureDotSuffix --- PASS: TestEnsureDotSuffix (0.00s) === RUN TestParseZoneSpec --- PASS: TestParseZoneSpec (0.00s) === RUN TestParseZoneRules I0703 20:24:47.801900 36447 zonespec.go:75] No rules specified, will permit management of all zones --- PASS: TestParseZoneRules (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/dns 0.003s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/util 0.004s === RUN TestPodController I0703 20:24:47.825029 36451 pod.go:59] starting pod controller I0703 20:24:47.825193 36451 stoppable.go:62] shutting down controller --- PASS: TestPodController (0.00s) I0703 20:24:47.825261 36451 pod.go:107] Got stop signal PASS I0703 20:24:47.825275 36451 pod.go:65] shutting down pod controller ok k8s.io/kops/dns-controller/pkg/watchers 0.028s === RUN TestEquivalent --- PASS: TestEquivalent (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider 0.003s Parsing flags. Getting new test interface. Running tests... === RUN TestZonesList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000185470} route53_test.go:93: Got zone list: [0xc0001854a0] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc0001860e8} --- PASS: TestZonesList (0.00s) === RUN TestZonesID route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0001855d0} route53_test.go:93: Got zone list: [0xc000185600] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc000186100} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess route53_test.go:79: Got zones {0xc000185700} route53_test.go:170: Successfully added managed DNS zone: &{0xc00044d230 0xc000186120} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0001858c0} route53_test.go:93: Got zone list: [0xc0001858f0] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc000186140} route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000185a50} route53_test.go:93: Got zone list: [0xc000185a80] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc000186168} route53_test.go:187: Successfully added resource record set: {0xc000449e60 0xc000186188} --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000185d60} route53_test.go:93: Got zone list: [0xc000185d90] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc000186218} route53_test.go:199: Successfully added resource record set: {0xc000472090 0xc000186238} route53_test.go:118: Got 1 recordsets: [0xc000185f30] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000474140} route53_test.go:93: Got zone list: [0xc000474170] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc0001862d8} route53_test.go:221: Successfully added resource record set: {0xc000472240 0xc0001862f8} route53_test.go:228: Correctly failed to add duplicate resource record {0xc000472240 0xc0001862f8}: attempt to create duplicate rrset www11.example.com::A --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000474530} route53_test.go:93: Got zone list: [0xc000474560] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc0001863b8} route53_test.go:246: Successfully removed resource set {0xc000472480 0xc0001863d8} after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000474840} route53_test.go:93: Got zone list: [0xc000474870] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc000186468} route53_test.go:264: Successfully removed resource set {0xc000472630 0xc000186488} after adding route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000474b80} route53_test.go:93: Got zone list: [0xc000474bb0] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc000186520} commontests.go:192: Successfully added resource record set: {0xc0004727e0 0xc000186540} commontests.go:45: Correctly replaced resource record {0xc0004727e0 0xc000186540} -> {0xc000472900 0xc000186590} commontests.go:142: Got 1 recordsets: [0xc000474ec0] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0004750f0} route53_test.go:93: Got zone list: [0xc000475120] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc000186648} commontests.go:192: Successfully added resource record set: {0xc000472bd0 0xc000186668} commontests.go:70: Correctly replaced resource record {0xc000472bd0 0xc000186668} -> {0xc000472cf0 0xc0001866b8} commontests.go:142: Got 1 recordsets: [0xc000475430] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0004756b0} route53_test.go:93: Got zone list: [0xc0004756e0] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc000186780} commontests.go:192: Successfully added resource record set: {0xc000472fc0 0xc0001867a0} commontests.go:142: Got 2 recordsets: [0xc000475950 0xc000475970] commontests.go:142: Got 2 recordsets: [0xc0004759e0 0xc000475a00] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000475c00} route53_test.go:93: Got zone list: [0xc000475c30] route53_test.go:98: Got at least 1 zone in list:&{0xc00044cff0 0xc0001868a8} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53 0.009s === RUN TestZonesList --- PASS: TestZonesList (0.00s) === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestRemove --- PASS: TestRemove (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/do 0.004s === RUN TestZonesList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4140} clouddns_test.go:71: Got zone list: [0xc000848360] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000848300} --- PASS: TestZonesList (0.00s) === RUN TestZonesID clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4280} clouddns_test.go:71: Got zone list: [0xc0008484e0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000848480} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess clouddns_test.go:131: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4380} clouddns_test.go:133: Got zones, making new Zone clouddns_test.go:149: Successfully added managed DNS zone: &{0xc0005b6a40 0xc000848660} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4440} clouddns_test.go:71: Got zone list: [0xc0008487e0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000848780} clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4560} clouddns_test.go:71: Got zone list: [0xc000848a50] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc0008489f0} clouddns_test.go:165: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b46a0} clouddns_test.go:71: Got zone list: [0xc000848d38] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000848cd8} clouddns_test.go:176: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:96: Got 1 recordsets: [<(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4800} clouddns_test.go:71: Got zone list: [0xc000849158] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc0008490f8} clouddns_test.go:198: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:205: Correctly failed to add duplicate resource record <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>: attempt to insert duplicate rrset {www11.example.com [10.10.10.10 169.20.20.20] 180 A} --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4960} clouddns_test.go:71: Got zone list: [0xc000849488] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000849428} clouddns_test.go:223: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4aa0} clouddns_test.go:71: Got zone list: [0xc000849800] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000849728} clouddns_test.go:241: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4c00} clouddns_test.go:71: Got zone list: [0xc0008499c8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000849998} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:45: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4d80} clouddns_test.go:71: Got zone list: [0xc000849c98] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000849c68} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:70: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b4f00} clouddns_test.go:71: Got zone list: [0xc000318048] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000318018} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00079e010 0xc0005b5120} clouddns_test.go:71: Got zone list: [0xc0003184c8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005b68c0 0xc000318498} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns 0.040s === RUN TestContract --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/openstack/designate 0.022s === RUN TestZonesListValid --- PASS: TestZonesListValid (0.00s) === RUN TestZonesListShouldFail --- PASS: TestZonesListShouldFail (0.00s) === RUN TestAddValid --- PASS: TestAddValid (0.00s) === RUN TestAddShouldFail --- PASS: TestAddShouldFail (0.00s) === RUN TestRemoveValid --- PASS: TestRemoveValid (0.00s) === RUN TestRemoveShouldFail --- PASS: TestRemoveShouldFail (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/scaleway 0.005s === RUN TestBootstarapBuilder_Simple --- PASS: TestBootstarapBuilder_Simple (0.00s) PASS ok k8s.io/kops/nodeup/pkg/bootstrap 0.047s === RUN TestBuildAzure --- PASS: TestBuildAzure (0.00s) === RUN TestBuildAWSCustomNodeIPFamilies --- PASS: TestBuildAWSCustomNodeIPFamilies (0.00s) === RUN TestContainerdBuilder_Docker_19_03_13 I0703 20:24:52.650369 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.650596 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.650648 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.650686 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.650723 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.650778 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.650816 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.650835 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.650892 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.650927 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.660115 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_13 (0.01s) === RUN TestContainerdBuilder_Docker_19_03_14 I0703 20:24:52.664420 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.664591 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.664624 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.664658 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.664692 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.664729 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.664761 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.664779 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.664805 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.664823 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.666387 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_14 (0.01s) === RUN TestContainerdBuilder_Simple I0703 20:24:52.670133 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.670295 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.670325 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.670357 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.670381 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.670425 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.670453 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.670471 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.670494 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.670512 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.671634 37036 zones.go:93] ListHostedZonesPages { } I0703 20:24:52.673260 37036 assetstore.go:108] Matching assets for "^bin/(containerd|ctr)": I0703 20:24:52.673274 37036 assetstore.go:111] bin/containerd I0703 20:24:52.673281 37036 assetstore.go:111] bin/containerd-shim I0703 20:24:52.673287 37036 assetstore.go:111] bin/containerd-shim-runc-v1 I0703 20:24:52.673292 37036 assetstore.go:111] bin/containerd-shim-runc-v2 I0703 20:24:52.673297 37036 assetstore.go:111] bin/containerd-stress I0703 20:24:52.673302 37036 assetstore.go:111] bin/ctr I0703 20:24:52.673350 37036 assetstore.go:108] Matching assets for "/runc\\.(amd64|arm64)$": I0703 20:24:52.673363 37036 assetstore.go:111] https://github.com/opencontainers/runc/releases/download/v1.1.0/runc.amd64 --- PASS: TestContainerdBuilder_Simple (0.01s) === RUN TestContainerdBuilder_Flatcar I0703 20:24:52.676329 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.676477 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.676509 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.676541 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.676565 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.676596 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.676623 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.676640 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.676665 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.676684 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.677773 37036 zones.go:93] ListHostedZonesPages { } I0703 20:24:52.679270 37036 containerd.go:60] Detected Flatcar; won't install containerd --- PASS: TestContainerdBuilder_Flatcar (0.00s) === RUN TestContainerdBuilder_SkipInstall I0703 20:24:52.680116 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.680240 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.680259 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.680281 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.680300 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.680326 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.680346 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.680364 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.680383 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.680397 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.681307 37036 zones.go:93] ListHostedZonesPages { } I0703 20:24:52.682883 37036 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestContainerdBuilder_SkipInstall (0.00s) === RUN TestContainerdBuilder_BuildFlags --- PASS: TestContainerdBuilder_BuildFlags (0.00s) === RUN TestContainerdConfig --- PASS: TestContainerdConfig (0.00s) === RUN TestAppendGPURuntimeContainerdConfig --- PASS: TestAppendGPURuntimeContainerdConfig (0.00s) === RUN TestDockerBuilder_19_03_11 I0703 20:24:52.684898 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.685067 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.685098 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.685134 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.685164 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.685199 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.685231 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.685252 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.685280 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.685298 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.686437 37036 zones.go:93] ListHostedZonesPages { } I0703 20:24:52.688193 37036 assetstore.go:108] Matching assets for "^docker/": I0703 20:24:52.688209 37036 assetstore.go:111] docker/containerd I0703 20:24:52.688217 37036 assetstore.go:111] docker/containerd-shim I0703 20:24:52.688222 37036 assetstore.go:111] docker/ctr I0703 20:24:52.688227 37036 assetstore.go:111] docker/docker I0703 20:24:52.688232 37036 assetstore.go:111] docker/docker-init I0703 20:24:52.688237 37036 assetstore.go:111] docker/docker-proxy I0703 20:24:52.688242 37036 assetstore.go:111] docker/dockerd I0703 20:24:52.688246 37036 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_19_03_11 (0.01s) === RUN TestDockerBuilder_LogFlags I0703 20:24:52.691130 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.691279 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.691307 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.691338 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.691381 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.691412 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.691440 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.691458 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.691484 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.691502 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.692559 37036 zones.go:93] ListHostedZonesPages { } I0703 20:24:52.694237 37036 assetstore.go:108] Matching assets for "^docker/": I0703 20:24:52.694252 37036 assetstore.go:111] docker/containerd I0703 20:24:52.694259 37036 assetstore.go:111] docker/containerd-shim I0703 20:24:52.694265 37036 assetstore.go:111] docker/ctr I0703 20:24:52.694270 37036 assetstore.go:111] docker/docker I0703 20:24:52.694274 37036 assetstore.go:111] docker/docker-init I0703 20:24:52.694279 37036 assetstore.go:111] docker/docker-proxy I0703 20:24:52.694284 37036 assetstore.go:111] docker/dockerd I0703 20:24:52.694289 37036 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_LogFlags (0.01s) === RUN TestDockerBuilder_SkipInstall I0703 20:24:52.697063 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.697169 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.697191 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.697220 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.697241 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.697271 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.697297 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.697316 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.697341 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.697357 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.698207 37036 zones.go:93] ListHostedZonesPages { } I0703 20:24:52.699205 37036 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestDockerBuilder_SkipInstall (0.00s) === RUN TestDockerBuilder_HealthCheck I0703 20:24:52.699316 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.699391 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.699405 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.699420 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.699433 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.699450 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.699464 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.699474 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.699489 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.699497 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.700089 37036 zones.go:93] ListHostedZonesPages { } I0703 20:24:52.701034 37036 assetstore.go:108] Matching assets for "^docker/": I0703 20:24:52.701046 37036 assetstore.go:111] docker/docker I0703 20:24:52.701050 37036 assetstore.go:111] docker/docker-containerd I0703 20:24:52.701055 37036 assetstore.go:111] docker/docker-containerd-ctr I0703 20:24:52.701059 37036 assetstore.go:111] docker/docker-containerd-shim I0703 20:24:52.701062 37036 assetstore.go:111] docker/docker-init I0703 20:24:52.701065 37036 assetstore.go:111] docker/docker-proxy I0703 20:24:52.701068 37036 assetstore.go:111] docker/docker-runc I0703 20:24:52.701071 37036 assetstore.go:111] docker/dockerd --- PASS: TestDockerBuilder_HealthCheck (0.00s) === RUN TestDockerBuilder_BuildFlags --- PASS: TestDockerBuilder_BuildFlags (0.00s) === RUN TestContainerdHooksBuilder I0703 20:24:52.703400 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.703508 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.703527 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.703549 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.703564 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.703583 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.703601 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.703612 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.703628 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.703640 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.705131 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdHooksBuilder (0.00s) === RUN TestDockerHooksBuilder I0703 20:24:52.706488 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.706580 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.706596 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.706614 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.706628 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.706646 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.706663 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.706673 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.706689 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.706701 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.707838 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestDockerHooksBuilder (0.00s) === RUN TestKopsControllerBuilder I0703 20:24:52.709428 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.709524 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.709541 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.709559 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.709575 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.709592 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.709608 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.709619 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.709634 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.709645 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.710689 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKopsControllerBuilder (0.00s) === RUN Test_KubeAPIServer_BuildFlags --- PASS: Test_KubeAPIServer_BuildFlags (0.00s) === RUN TestKubeAPIServerBuilder I0703 20:24:52.715119 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.715237 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.715257 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.715279 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.715294 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.715314 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.715332 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.715341 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.715356 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.715368 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.717096 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilder (0.01s) === RUN TestAuditConfigAPIServerBuilder I0703 20:24:52.725957 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.726122 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.726152 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.726187 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.726211 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.726241 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.726267 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.726282 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.726305 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.726322 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.728649 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestAuditConfigAPIServerBuilder (0.01s) === RUN TestOIDCConfigAPIServerBuilder I0703 20:24:52.732929 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.733039 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.733058 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.733080 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.733097 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.733116 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.733134 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.733144 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.733160 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.733172 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.734360 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestOIDCConfigAPIServerBuilder (0.01s) === RUN TestDeddicatedAPIServerBuilder I0703 20:24:52.739047 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.739155 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.739177 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.739197 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.739213 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.739233 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.739252 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.739262 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.739278 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.739290 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.740441 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestDeddicatedAPIServerBuilder (0.01s) === RUN TestWithoutEtcdEventsAPIServerBuilder I0703 20:24:52.746126 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.746238 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.746260 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.746286 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.746304 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.746325 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.746345 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.746356 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.746373 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.746386 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.747472 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestWithoutEtcdEventsAPIServerBuilder (0.01s) === RUN TestAwsIamAuthenticator I0703 20:24:52.751337 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.751423 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.751439 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.751455 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.751469 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.751488 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.751504 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.751514 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.751528 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.751538 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.752496 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestAwsIamAuthenticator (0.01s) === RUN TestKubeAPIServerBuilderAMD64 I0703 20:24:52.757768 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:52.757876 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:52.757898 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:52.757919 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:52.757936 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:52.757957 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:52.757976 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:52.757987 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:52.758003 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:52.758014 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:52.759604 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderAMD64 (1.99s) === RUN TestKubeAPIServerBuilderARM64 I0703 20:24:54.743868 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:54.744066 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:54.744103 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:54.744143 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:54.744201 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:54.744247 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:54.744280 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:54.744303 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:54.744334 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:54.744355 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:54.748595 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderARM64 (1.16s) === RUN TestKubeControllerManagerBuilder I0703 20:24:55.905095 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:55.905258 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:55.905283 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:55.905318 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:55.905341 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:55.905371 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:55.905396 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:55.905416 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:55.905440 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:55.905457 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:55.907417 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilder (0.01s) === RUN TestKubeControllerManagerBuilderAMD64 I0703 20:24:55.913200 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:55.913329 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:55.913352 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:55.913377 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:55.913401 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:55.913429 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:55.913452 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:55.913469 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:55.913491 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:55.913506 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:55.915055 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderAMD64 (1.15s) === RUN TestKubeControllerManagerBuilderARM64 I0703 20:24:57.058901 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:57.059068 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:57.059094 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:57.059128 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:57.059150 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:57.059182 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:57.059208 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:57.059224 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:57.059247 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:57.059264 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:57.060920 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderARM64 (1.15s) === RUN TestKubeProxyBuilder_buildPod === RUN TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 --- PASS: TestKubeProxyBuilder_buildPod (0.00s) --- PASS: TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 (0.00s) === RUN TestKubeProxyBuilder I0703 20:24:58.206349 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:58.206557 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:58.206591 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:58.206633 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:58.206664 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:58.206702 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:58.206734 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:58.206755 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:58.206786 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:58.206808 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:58.208974 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilder (0.01s) === RUN TestKubeProxyBuilderAMD64 I0703 20:24:58.213791 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:58.213952 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:58.213980 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:58.214012 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:58.214039 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:58.214071 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:58.214097 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:58.214119 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:58.214147 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:58.214166 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:58.216258 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderAMD64 (1.15s) === RUN TestKubeProxyBuilderARM64 I0703 20:24:59.363146 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:24:59.363379 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:24:59.363451 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:24:59.363503 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:24:59.363538 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:24:59.363581 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:24:59.363619 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:24:59.363643 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:24:59.363676 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:24:59.363701 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:24:59.366062 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderARM64 (1.16s) === RUN TestParseDefault --- PASS: TestParseDefault (0.00s) === RUN TestParse --- PASS: TestParse (0.00s) === RUN TestKubeSchedulerBuilder I0703 20:25:00.521192 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:00.521418 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:00.521461 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:00.521501 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:00.521535 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:00.521576 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:00.521614 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:00.521646 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:00.521680 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:00.521704 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:00.523945 37036 zones.go:93] ListHostedZonesPages { } W0703 20:25:00.527352 37036 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilder (0.01s) === RUN TestKubeSchedulerBuilderAMD64 I0703 20:25:00.530816 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:00.532082 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:00.532120 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:00.532152 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:00.532179 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:00.532209 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:00.532234 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:00.532252 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:00.532278 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:00.532293 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:00.533966 37036 zones.go:93] ListHostedZonesPages { } W0703 20:25:01.682478 37036 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderAMD64 (1.15s) === RUN TestKubeSchedulerBuilderARM64 I0703 20:25:01.685028 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:01.685251 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:01.685300 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:01.685373 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:01.685424 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:01.685496 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:01.685543 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:01.685588 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:01.685647 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:01.685685 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:01.688016 37036 zones.go:93] ListHostedZonesPages { } W0703 20:25:02.847844 37036 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderARM64 (1.17s) === RUN TestKubectlBuilder I0703 20:25:02.850470 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:02.850689 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:02.850726 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:02.850765 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:02.850799 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:02.850867 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:02.850905 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:02.850927 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:02.850959 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:02.850984 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:02.853163 37036 zones.go:93] ListHostedZonesPages { } I0703 20:25:02.855597 37036 assetstore.go:159] Resolved asset kubectl: to /path/to/kubectl/asset --- PASS: TestKubectlBuilder (0.01s) === RUN TestTaintsApplied --- PASS: TestTaintsApplied (0.00s) === RUN Test_RunKubeletBuilder I0703 20:25:02.858144 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:02.858334 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:02.858389 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:02.858423 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:02.858455 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:02.858492 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:02.858523 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:02.858546 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:02.858577 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:02.858598 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:02.860354 37036 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilder (0.01s) === RUN Test_RunKubeletBuilderWarmPool I0703 20:25:02.865258 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:02.865413 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:02.865463 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:02.865492 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:02.865522 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:02.865558 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:02.865586 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:02.865612 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:02.865640 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:02.865660 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:02.867271 37036 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilderWarmPool (0.01s) === RUN Test_BuildComponentConfigFile --- PASS: Test_BuildComponentConfigFile (0.00s) === RUN TestProtokubeBuilder I0703 20:25:02.872168 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:02.872346 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:02.872376 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:02.872407 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:02.872436 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:02.872476 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:02.872504 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:02.872529 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:02.872558 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:02.872577 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:02.874695 37036 zones.go:93] ListHostedZonesPages { } I0703 20:25:02.877015 37036 assetstore.go:108] Matching assets for "protokube$": I0703 20:25:02.877037 37036 assetstore.go:111] /opt/kops/bin/protokube I0703 20:25:02.877049 37036 assetstore.go:129] Found single matching asset for expr "protokube$": "protokube" I0703 20:25:02.877074 37036 assetstore.go:108] Matching assets for "channels$": I0703 20:25:02.877085 37036 assetstore.go:111] /opt/kops/bin/channels I0703 20:25:02.877096 37036 assetstore.go:129] Found single matching asset for expr "channels$": "channels" --- PASS: TestProtokubeBuilder (0.01s) === RUN TestSecretBuilder I0703 20:25:02.879057 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:02.879222 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:02.879252 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:02.879285 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:02.879315 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:02.879369 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:02.879399 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:02.879422 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:02.879447 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:02.879466 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:02.885291 37036 zones.go:93] ListHostedZonesPages { } --- PASS: TestSecretBuilder (0.01s) === RUN TestUpdateServiceBuilderAutomaticUpgrade I0703 20:25:02.888251 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:02.888423 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:02.888456 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:02.888490 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:02.888521 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:02.888556 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:02.888584 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:02.888606 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:02.888632 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:02.888652 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:02.890646 37036 zones.go:93] ListHostedZonesPages { } I0703 20:25:02.893012 37036 update_service.go:91] Detected OS {deb ubuntu focal 20.04}; installing unattended-upgrades package --- PASS: TestUpdateServiceBuilderAutomaticUpgrade (0.01s) === RUN TestUpdateServiceBuilderExternal I0703 20:25:02.893503 37036 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:02.893661 37036 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:02.893693 37036 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:02.893727 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:02.893755 37036 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:02.893789 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:02.893816 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:02.893838 37036 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:02.893866 37036 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:02.893884 37036 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:02.895922 37036 zones.go:93] ListHostedZonesPages { } I0703 20:25:02.898345 37036 update_service.go:86] UpdatePolicy requests automatic updates; skipping installation of package "unattended-upgrades" --- PASS: TestUpdateServiceBuilderExternal (0.01s) PASS ok k8s.io/kops/nodeup/pkg/model 10.320s === RUN TestWarmPoolSpec_IsEnabled === RUN TestWarmPoolSpec_IsEnabled/nil === RUN TestWarmPoolSpec_IsEnabled/empty === RUN TestWarmPoolSpec_IsEnabled/1 === RUN TestWarmPoolSpec_IsEnabled/0 --- PASS: TestWarmPoolSpec_IsEnabled (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/nil (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/empty (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/1 (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/0 (0.00s) === RUN TestWarmPoolSpec_ResolveDefaults === RUN TestWarmPoolSpec_ResolveDefaults/MinSize === RUN TestWarmPoolSpec_ResolveDefaults/MaxSize === RUN TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook --- PASS: TestWarmPoolSpec_ResolveDefaults (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MinSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MaxSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook (0.00s) === RUN Test_ParseInstanceGroupRole --- PASS: Test_ParseInstanceGroupRole (0.00s) === RUN TestParseConfigYAML === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{}" --- PASS: TestParseConfigYAML (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{}" (0.00s) === RUN Test_SemverOrdering --- PASS: Test_SemverOrdering (0.00s) PASS ok k8s.io/kops/pkg/apis/kops 0.032s === RUN TestRoundTripTypes --- PASS: TestRoundTripTypes (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/install 0.029s === RUN TestUseCiliumEtcd --- PASS: TestUseCiliumEtcd (0.00s) === RUN Test_FindSubnet --- PASS: Test_FindSubnet (0.00s) === RUN Test_FindZonesForInstanceGroup --- PASS: Test_FindZonesForInstanceGroup (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/model 0.032s === RUN TestGetNodeRole === RUN TestGetNodeRole/RoleNone === RUN TestGetNodeRole/RoleNewerLabel === RUN TestGetNodeRole/RoleOlderLabel --- PASS: TestGetNodeRole (0.00s) --- PASS: TestGetNodeRole/RoleNone (0.00s) --- PASS: TestGetNodeRole/RoleNewerLabel (0.00s) --- PASS: TestGetNodeRole/RoleOlderLabel (0.00s) === RUN Test_ParseKubernetesVersion === RUN Test_ParseKubernetesVersion/1.3.7 === RUN Test_ParseKubernetesVersion/v1.4.0-beta.8 === RUN Test_ParseKubernetesVersion/1.5.0 === RUN Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ === RUN Test_ParseKubernetesVersion/#00 E0703 20:24:52.596504 37040 versions.go:96] unable to parse Kubernetes version "" === RUN Test_ParseKubernetesVersion/abc E0703 20:24:52.596588 37040 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: Test_ParseKubernetesVersion (0.00s) --- PASS: Test_ParseKubernetesVersion/1.3.7 (0.00s) --- PASS: Test_ParseKubernetesVersion/v1.4.0-beta.8 (0.00s) --- PASS: Test_ParseKubernetesVersion/1.5.0 (0.00s) --- PASS: Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ (0.00s) --- PASS: Test_ParseKubernetesVersion/#00 (0.00s) --- PASS: Test_ParseKubernetesVersion/abc (0.00s) === RUN Test_IsKubernetesGTEWithPatch --- PASS: Test_IsKubernetesGTEWithPatch (0.00s) === RUN Test_IsKubernetesGTEWithoutPatch --- PASS: Test_IsKubernetesGTEWithoutPatch (0.00s) === RUN Test_IsKubernetesGTEWithPre --- PASS: Test_IsKubernetesGTEWithPre (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/util 0.008s === RUN TestAWSValidateExternalCloudConfig --- PASS: TestAWSValidateExternalCloudConfig (0.00s) === RUN TestValidateInstanceGroupSpec I0703 20:24:52.644075 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644220 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644258 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644277 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644300 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestValidateInstanceGroupSpec (0.00s) === RUN TestMixedInstancePolicies I0703 20:24:52.644480 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644511 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644522 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644531 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644544 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644560 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644574 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644591 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644626 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644644 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644658 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644687 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644706 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644723 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644737 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644758 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644772 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644785 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0703 20:24:52.644798 37043 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestMixedInstancePolicies (0.00s) === RUN TestInstanceMetadataOptions I0703 20:24:52.644968 37043 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } I0703 20:24:52.645015 37043 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } --- PASS: TestInstanceMetadataOptions (0.00s) === RUN TestLoadBalancerSubnets --- PASS: TestLoadBalancerSubnets (0.00s) === RUN TestAWSAuthentication --- PASS: TestAWSAuthentication (0.00s) === RUN TestAWSAdditionalRoutes === RUN TestAWSAdditionalRoutes/valid_pcx === RUN TestAWSAdditionalRoutes/valid_instance === RUN TestAWSAdditionalRoutes/valid_nat === RUN TestAWSAdditionalRoutes/valid_transit_gateway === RUN TestAWSAdditionalRoutes/valid_internet_gateway === RUN TestAWSAdditionalRoutes/valid_egress_only_internet_gateway === RUN TestAWSAdditionalRoutes/bad_cluster_cidr === RUN TestAWSAdditionalRoutes/bad_cidr === RUN TestAWSAdditionalRoutes/bad_target === RUN TestAWSAdditionalRoutes/target_more_specific === RUN TestAWSAdditionalRoutes/target_more_specific_additionalCIDR === RUN TestAWSAdditionalRoutes/duplicates_cidr === RUN TestAWSAdditionalRoutes/shared_subnet === RUN TestAWSAdditionalRoutes/not_a_private_subnet --- PASS: TestAWSAdditionalRoutes (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_pcx (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_instance (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_nat (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_transit_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_egress_only_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cluster_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_target (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific_additionalCIDR (0.00s) --- PASS: TestAWSAdditionalRoutes/duplicates_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/shared_subnet (0.00s) --- PASS: TestAWSAdditionalRoutes/not_a_private_subnet (0.00s) === RUN TestValidEtcdChanges --- PASS: TestValidEtcdChanges (0.00s) === RUN TestValidateInstanceProfile --- PASS: TestValidateInstanceProfile (0.00s) === RUN TestValidMasterInstanceGroup --- PASS: TestValidMasterInstanceGroup (0.00s) === RUN TestValidBootDevice --- PASS: TestValidBootDevice (0.00s) === RUN TestValidNodeLabels --- PASS: TestValidNodeLabels (0.00s) === RUN TestValidateIGCloudLabels --- PASS: TestValidateIGCloudLabels (0.00s) === RUN TestIGCloudLabelIsIGName --- PASS: TestIGCloudLabelIsIGName (0.00s) === RUN TestValidTaints --- PASS: TestValidTaints (0.00s) === RUN TestIGUpdatePolicy === RUN TestIGUpdatePolicy/missing === RUN TestIGUpdatePolicy/automatic === RUN TestIGUpdatePolicy/external === RUN TestIGUpdatePolicy/empty === RUN TestIGUpdatePolicy/unknown --- PASS: TestIGUpdatePolicy (0.00s) --- PASS: TestIGUpdatePolicy/missing (0.00s) --- PASS: TestIGUpdatePolicy/automatic (0.00s) --- PASS: TestIGUpdatePolicy/external (0.00s) --- PASS: TestIGUpdatePolicy/empty (0.00s) --- PASS: TestIGUpdatePolicy/unknown (0.00s) === RUN TestValidInstanceGroup --- PASS: TestValidInstanceGroup (0.00s) === RUN Test_Validate_DNS --- PASS: Test_Validate_DNS (0.00s) === RUN TestValidateCIDR --- PASS: TestValidateCIDR (0.00s) === RUN TestValidateSubnets --- PASS: TestValidateSubnets (0.00s) === RUN TestValidateKubeAPIServer --- PASS: TestValidateKubeAPIServer (0.00s) === RUN Test_Validate_DockerConfig_Storage --- PASS: Test_Validate_DockerConfig_Storage (0.00s) === RUN Test_Validate_Networking_Flannel --- PASS: Test_Validate_Networking_Flannel (0.00s) === RUN Test_Validate_AdditionalPolicies --- PASS: Test_Validate_AdditionalPolicies (0.00s) === RUN Test_Validate_Calico === RUN Test_Validate_Calico/empty_specs === RUN Test_Validate_Calico/positive_Typha_replica_count === RUN Test_Validate_Calico/negative_Typha_replica_count === RUN Test_Validate_Calico/with_etcd_version === RUN Test_Validate_Calico/IPv4_autodetection_method === RUN Test_Validate_Calico/IPv6_autodetection_method === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name === RUN Test_Validate_Calico/AWS_source/destination_checks_off === RUN Test_Validate_Calico/AWS_source/destination_checks_enabled === RUN Test_Validate_Calico/AWS_source/destination_checks_disabled === RUN Test_Validate_Calico/AWS_source/destination_checks_left_as_is === RUN Test_Validate_Calico/encapsulation_none_with_IPv4 === RUN Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 === RUN Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 === RUN Test_Validate_Calico/unknown_Calico_IPIP_mode === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPv6_without_encapsulation --- PASS: Test_Validate_Calico (0.00s) --- PASS: Test_Validate_Calico/empty_specs (0.00s) --- PASS: Test_Validate_Calico/positive_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/negative_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/with_etcd_version (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_off (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_enabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_disabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_left_as_is (0.00s) --- PASS: Test_Validate_Calico/encapsulation_none_with_IPv4 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/unknown_Calico_IPIP_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPv6_without_encapsulation (0.00s) === RUN Test_Validate_Cilium --- PASS: Test_Validate_Cilium (0.00s) === RUN Test_Validate_RollingUpdate --- PASS: Test_Validate_RollingUpdate (0.00s) === RUN Test_Validate_NodeLocalDNS --- PASS: Test_Validate_NodeLocalDNS (0.00s) === RUN Test_Validate_CloudConfiguration === RUN Test_Validate_CloudConfiguration/neither === RUN Test_Validate_CloudConfiguration/all_false === RUN Test_Validate_CloudConfiguration/all_true === RUN Test_Validate_CloudConfiguration/os_false === RUN Test_Validate_CloudConfiguration/os_true === RUN Test_Validate_CloudConfiguration/all_false,_os_false === RUN Test_Validate_CloudConfiguration/all_false,_os_true === RUN Test_Validate_CloudConfiguration/all_true,_os_false === RUN Test_Validate_CloudConfiguration/all_true,_os_true --- PASS: Test_Validate_CloudConfiguration (0.00s) --- PASS: Test_Validate_CloudConfiguration/neither (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_true (0.00s) === RUN TestValidateSAExternalPermissions === RUN TestValidateSAExternalPermissions/Duplicate_SA === RUN TestValidateSAExternalPermissions/Missing_permissions === RUN TestValidateSAExternalPermissions/Setting_both_arn_and_inline === RUN TestValidateSAExternalPermissions/Empty_SA_name === RUN TestValidateSAExternalPermissions/Empty_SA_namespace --- PASS: TestValidateSAExternalPermissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Duplicate_SA (0.00s) --- PASS: TestValidateSAExternalPermissions/Missing_permissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Setting_both_arn_and_inline (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_name (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_namespace (0.00s) === RUN Test_Validate_Nvidia_Cluster --- PASS: Test_Validate_Nvidia_Cluster (0.00s) === RUN Test_Validate_Nvidia_Ig --- PASS: Test_Validate_Nvidia_Ig (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/validation 0.066s === RUN TestManagedFieldsMigrator === RUN TestManagedFieldsMigrator/csa-migration === RUN TestManagedFieldsMigrator/merge-owners === RUN TestManagedFieldsMigrator/ssa-unchanged === RUN TestManagedFieldsMigrator/unknown-unchanged --- PASS: TestManagedFieldsMigrator (0.00s) --- PASS: TestManagedFieldsMigrator/csa-migration (0.00s) --- PASS: TestManagedFieldsMigrator/merge-owners (0.00s) --- PASS: TestManagedFieldsMigrator/ssa-unchanged (0.00s) --- PASS: TestManagedFieldsMigrator/unknown-unchanged (0.00s) PASS ok k8s.io/kops/pkg/applylib/applyset 0.010s === RUN TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub W0703 20:24:52.626355 37046 builder.go:232] failed to digest image "proxy.example.com/weaveworks/weave-kube": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub (0.01s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub W0703 20:24:52.627252 37046 builder.go:232] failed to digest image "proxy.example.com/debian": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL W0703 20:24:52.628049 37046 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL W0703 20:24:52.628764 37046 builder.go:232] failed to digest image "proxy.example.com/google_containers/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags W0703 20:24:52.629413 37046 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags (0.00s) === RUN TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges W0703 20:24:52.630110 37046 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host W0703 20:24:52.630736 37046 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges (0.00s) === RUN TestRemapEmptySection --- PASS: TestRemapEmptySection (0.00s) === RUN Test_BuildVFSPath E0703 20:24:52.631317 37046 copyfile.go:209] Unable to determine VFS path from supplied URL: https://foo/k8s-for-greeks-kops/kubernetes-release/release/v1.7.2/bin/linux/amd64/kubectl E0703 20:24:52.631327 37046 copyfile.go:210] S3, Google Cloud Storage, and File Paths are supported. E0703 20:24:52.631332 37046 copyfile.go:211] For S3, please make sure that the supplied file repository URL adhere to S3 naming conventions, https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region. E0703 20:24:52.631339 37046 copyfile.go:212] For GCS, please make sure that the supplied file repository URL adheres to https://storage.googleapis.com/ --- PASS: Test_BuildVFSPath (0.00s) PASS ok k8s.io/kops/pkg/assets 0.044s === RUN TestBackoff --- PASS: TestBackoff (0.00s) PASS ok k8s.io/kops/pkg/backoff 0.005s === RUN TestSSHCredentialStoreOnConfigBase --- PASS: TestSSHCredentialStoreOnConfigBase (0.00s) === RUN TestSSHCredentialStoreOnOwnCFS --- PASS: TestSSHCredentialStoreOnOwnCFS (0.00s) PASS ok k8s.io/kops/pkg/client/simple/vfsclientset 0.053s === RUN TestToAzureVMName === RUN TestToAzureVMName/test_case_0 === RUN TestToAzureVMName/test_case_1 --- PASS: TestToAzureVMName (0.00s) --- PASS: TestToAzureVMName/test_case_0 (0.00s) --- PASS: TestToAzureVMName/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/cloudinstances 0.026s === RUN TestSetClusterBadInput --- PASS: TestSetClusterBadInput (0.00s) === RUN TestSetClusterFields --- PASS: TestSetClusterFields (0.00s) === RUN TestSetCiliumFields --- PASS: TestSetCiliumFields (0.00s) === RUN TestSetInstanceGroupsBadInput --- PASS: TestSetInstanceGroupsBadInput (0.00s) === RUN TestSetInstanceGroupsFields --- PASS: TestSetInstanceGroupsFields (0.00s) === RUN TestUnsetClusterBadInput --- PASS: TestUnsetClusterBadInput (0.00s) === RUN TestUnsetClusterFields --- PASS: TestUnsetClusterFields (0.00s) === RUN TestUnsetCiliumFields --- PASS: TestUnsetCiliumFields (0.00s) === RUN TestUnsetInstanceGroupsBadInput --- PASS: TestUnsetInstanceGroupsBadInput (0.00s) === RUN TestUnsetInstanceGroupsFields --- PASS: TestUnsetInstanceGroupsFields (0.00s) PASS ok k8s.io/kops/pkg/commands 0.081s === RUN Test_cacheFilePath --- PASS: Test_cacheFilePath (0.00s) PASS ok k8s.io/kops/pkg/commands/helpers 0.073s === RUN TestGetStructVal --- PASS: TestGetStructVal (0.00s) === RUN TestWrongStructField --- PASS: TestWrongStructField (0.00s) PASS ok k8s.io/kops/pkg/configbuilder 0.020s === RUN Test_Diff_1 --- PASS: Test_Diff_1 (0.00s) === RUN Test_Diff_2 --- PASS: Test_Diff_2 (0.00s) === RUN Test_Diff_3 --- PASS: Test_Diff_3 (0.00s) === RUN Test_Diff_ChangedLine --- PASS: Test_Diff_ChangedLine (0.00s) === RUN Test_Diff_4 --- PASS: Test_Diff_4 (0.00s) PASS ok k8s.io/kops/pkg/diff 0.005s === RUN TestIsGossipHostname --- PASS: TestIsGossipHostname (0.00s) PASS ok k8s.io/kops/pkg/dns 0.004s === RUN TestHasExtraFields === RUN TestHasExtraFields/minimal === RUN TestHasExtraFields/extraFields === RUN TestHasExtraFields/spec2 === RUN TestHasExtraFields/isolateMasters === RUN TestHasExtraFields/instanceGroup --- PASS: TestHasExtraFields (0.01s) --- PASS: TestHasExtraFields/minimal (0.01s) --- PASS: TestHasExtraFields/extraFields (0.00s) --- PASS: TestHasExtraFields/spec2 (0.00s) --- PASS: TestHasExtraFields/isolateMasters (0.00s) --- PASS: TestHasExtraFields/instanceGroup (0.00s) PASS ok k8s.io/kops/pkg/edit 0.033s === RUN TestFlagToFalse I0703 20:24:52.978005 37876 featureflag_test.go:32] Created flag Unittest1 I0703 20:24:52.978036 37876 featureflag.go:164] FeatureFlag "UnitTest1"=false I0703 20:24:52.978041 37876 featureflag.go:164] FeatureFlag "UnitTest1"=true --- PASS: TestFlagToFalse (0.00s) === RUN TestSetenv I0703 20:24:52.978080 37876 featureflag.go:164] FeatureFlag "UnitTest2"=false --- PASS: TestSetenv (0.00s) === RUN TestGetPositive --- PASS: TestGetPositive (0.00s) === RUN TestGetNegative --- PASS: TestGetNegative (0.00s) PASS ok k8s.io/kops/pkg/featureflag 0.003s === RUN TestBuildKCMFlags --- PASS: TestBuildKCMFlags (0.00s) === RUN TestKubeletConfigSpec --- PASS: TestKubeletConfigSpec (0.00s) === RUN TestBuildAPIServerFlags --- PASS: TestBuildAPIServerFlags (0.00s) PASS ok k8s.io/kops/pkg/flagbuilder 0.030s === RUN TestRenderInstanceGroupZones W0703 20:24:52.997616 37877 instancegroup.go:42] error fetching zones for instancegroup: cannot find subnet "badsubnet" (declared in instance group "", not found in cluster) --- PASS: TestRenderInstanceGroupZones (0.00s) === RUN TestRenderInstanceGroupSubnets --- PASS: TestRenderInstanceGroupSubnets (0.00s) PASS ok k8s.io/kops/pkg/formatter 0.025s === RUN TestWarmPoolOnlyRoll I0703 20:25:05.124296 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.124367 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.124384 38941 instancegroups.go:136] deleting warm pool instance "node-1" --- PASS: TestWarmPoolOnlyRoll (0.00s) === RUN TestRollingUpdateDisabledSurgeOS rollingupdate_os_test.go:96: Failing in new release PR when build is not yet published --- SKIP: TestRollingUpdateDisabledSurgeOS (0.00s) === RUN TestRollingUpdateAllNeedUpdate I0703 20:25:05.124726 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.124751 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.125884 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.125907 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.131039 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.131088 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.131100 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.131111 38941 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0703 20:25:05.132573 38941 instancegroups.go:431] Draining the node: "master-1a.local". I0703 20:25:05.132883 38941 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0703 20:25:05.132938 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.132953 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.134081 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.134112 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.139311 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.139367 38941 instancegroups.go:431] Draining the node: "master-1b.local". I0703 20:25:05.139801 38941 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0703 20:25:05.139839 38941 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0703 20:25:05.139854 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.140974 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.141001 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.146209 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.146236 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.146243 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.146251 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.146682 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.146984 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.147002 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.148146 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.148183 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.153386 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.153425 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.153869 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.153887 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.155013 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.155035 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.160228 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.160282 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:05.160979 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.160997 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.162103 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.162126 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.167307 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.167339 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.167353 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.167364 38941 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0703 20:25:05.168103 38941 instancegroups.go:431] Draining the node: "node-2a.local". I0703 20:25:05.168563 38941 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0703 20:25:05.168587 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.169716 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.169739 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.174946 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.175008 38941 instancegroups.go:431] Draining the node: "node-2b.local". I0703 20:25:05.175683 38941 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0703 20:25:05.175707 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.176822 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.176846 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.182058 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.182119 38941 instancegroups.go:431] Draining the node: "node-2c.local". I0703 20:25:05.182814 38941 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0703 20:25:05.182845 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.183957 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.183979 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.189181 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.189230 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdate (0.06s) === RUN TestRollingUpdateAllNeedUpdateCloudonly I0703 20:25:05.189600 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.189618 38941 instancegroups.go:469] waiting for 1ms after terminating instance W0703 20:25:05.190744 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.190769 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.190785 38941 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0703 20:25:05.190791 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.190800 38941 instancegroups.go:469] waiting for 1ms after terminating instance W0703 20:25:05.191905 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.191939 38941 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0703 20:25:05.191948 38941 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0703 20:25:05.191964 38941 instancegroups.go:469] waiting for 1ms after terminating instance W0703 20:25:05.193069 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.193083 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.193103 38941 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0703 20:25:05.193109 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.193118 38941 instancegroups.go:469] waiting for 1ms after terminating instance W0703 20:25:05.194212 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.194246 38941 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0703 20:25:05.194255 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.194271 38941 instancegroups.go:469] waiting for 1ms after terminating instance W0703 20:25:05.195366 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.195392 38941 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0703 20:25:05.195399 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.195409 38941 instancegroups.go:469] waiting for 1ms after terminating instance W0703 20:25:05.196499 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.196512 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.196534 38941 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0703 20:25:05.196542 38941 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0703 20:25:05.196554 38941 instancegroups.go:469] waiting for 1ms after terminating instance W0703 20:25:05.197646 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.197665 38941 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0703 20:25:05.197672 38941 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0703 20:25:05.197684 38941 instancegroups.go:469] waiting for 1ms after terminating instance W0703 20:25:05.198760 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0703 20:25:05.198780 38941 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0703 20:25:05.198785 38941 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0703 20:25:05.198811 38941 instancegroups.go:469] waiting for 1ms after terminating instance W0703 20:25:05.199903 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0703 20:25:05.199923 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateCloudonly (0.01s) === RUN TestRollingUpdateAllNeedUpdateNoFailOnValidate I0703 20:25:05.200150 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.200165 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.201340 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.201372 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.201386 38941 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.201420 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.201433 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.201447 38941 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.201455 38941 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0703 20:25:05.202037 38941 instancegroups.go:431] Draining the node: "master-1a.local". I0703 20:25:05.202534 38941 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0703 20:25:05.202591 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.202613 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.203764 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.203787 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.203800 38941 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.203824 38941 instancegroups.go:431] Draining the node: "master-1b.local". I0703 20:25:05.204220 38941 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0703 20:25:05.204261 38941 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0703 20:25:05.204279 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.205407 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.205426 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.205435 38941 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.205445 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.205451 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.205456 38941 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.205462 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.205859 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.206231 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.206250 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.207360 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.207396 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.207435 38941 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.207472 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.208137 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.208160 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.209266 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.209287 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.209297 38941 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.209322 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:05.209754 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.209770 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.210879 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.210903 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.210919 38941 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.210933 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.210958 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.210968 38941 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.210977 38941 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0703 20:25:05.211596 38941 instancegroups.go:431] Draining the node: "node-2a.local". I0703 20:25:05.212139 38941 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0703 20:25:05.212165 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.213278 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.213301 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.213315 38941 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.213344 38941 instancegroups.go:431] Draining the node: "node-2b.local". I0703 20:25:05.213874 38941 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0703 20:25:05.213909 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.215233 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.215260 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.215273 38941 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.215296 38941 instancegroups.go:431] Draining the node: "node-2c.local". I0703 20:25:05.215859 38941 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0703 20:25:05.215880 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.216968 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.216990 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0703 20:25:05.216999 38941 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0703 20:25:05.217011 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateNoFailOnValidate (0.02s) === RUN TestRollingUpdateNoneNeedUpdate I0703 20:25:05.217157 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdate (0.00s) === RUN TestRollingUpdateNoneNeedUpdateWithForce I0703 20:25:05.217267 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.217279 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.218384 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.218399 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.223565 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.223622 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.223633 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.223654 38941 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0703 20:25:05.224048 38941 instancegroups.go:431] Draining the node: "master-1a.local". I0703 20:25:05.224351 38941 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0703 20:25:05.224389 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.224405 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.225524 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.225536 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.230725 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.230776 38941 instancegroups.go:431] Draining the node: "master-1b.local". I0703 20:25:05.231362 38941 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0703 20:25:05.231401 38941 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0703 20:25:05.231419 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.232529 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.232541 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.237720 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.237760 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.237793 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.237804 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.238496 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.238981 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.239003 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.240117 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.240129 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.245251 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.245305 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.245981 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.246004 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.247126 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.247142 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.252344 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.252401 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:05.252900 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.252920 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.254029 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.254050 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.259239 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.259270 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.259285 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.259298 38941 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0703 20:25:05.260019 38941 instancegroups.go:431] Draining the node: "node-2a.local". I0703 20:25:05.260447 38941 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0703 20:25:05.260465 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.261574 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.261595 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.266774 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.266811 38941 instancegroups.go:431] Draining the node: "node-2b.local". I0703 20:25:05.267291 38941 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0703 20:25:05.267312 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.268402 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.268413 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.273590 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.273637 38941 instancegroups.go:431] Draining the node: "node-2c.local". I0703 20:25:05.274300 38941 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0703 20:25:05.274324 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.275439 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.275451 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.280922 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.280965 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdateWithForce (0.06s) === RUN TestRollingUpdateEmptyGroup I0703 20:25:05.281129 38941 rollingupdate.go:111] Cloud Instance Group length is zero. Not doing a rolling-update. --- PASS: TestRollingUpdateEmptyGroup (0.00s) === RUN TestRollingUpdateUnknownRole --- PASS: TestRollingUpdateUnknownRole (0.00s) === RUN TestRollingUpdateAllNeedUpdateFailsValidation I0703 20:25:05.281710 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.281728 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.282841 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.282858 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0703 20:25:05.282867 38941 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateFailsValidation (0.00s) === RUN TestRollingUpdateAllNeedUpdateErrorsValidation I0703 20:25:05.283050 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.283061 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.284201 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.284222 38941 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0703 20:25:05.284238 38941 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateFailsValidation I0703 20:25:05.284457 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.284474 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0703 20:25:05.284483 38941 instancegroups.go:509] Cluster did not validate within 0s E0703 20:25:05.284491 38941 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateFailsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateErrorsValidation I0703 20:25:05.284612 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.284624 38941 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0703 20:25:05.284633 38941 instancegroups.go:509] Cluster did not validate within 0s E0703 20:25:05.284642 38941 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateClusterFailsValidationAfterOneMaster I0703 20:25:05.284806 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.284825 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.285934 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.285952 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.291133 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.291179 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.291195 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.291207 38941 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0703 20:25:05.291815 38941 instancegroups.go:431] Draining the node: "master-1a.local". I0703 20:25:05.292345 38941 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0703 20:25:05.292413 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.292435 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.293534 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.293554 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0703 20:25:05.293565 38941 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterFailsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneMaster I0703 20:25:05.293798 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.293812 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.294948 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.294967 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.300158 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.300205 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.300220 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.300227 38941 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0703 20:25:05.301167 38941 instancegroups.go:431] Draining the node: "master-1a.local". I0703 20:25:05.301418 38941 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0703 20:25:05.301452 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.301465 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.302591 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.302605 38941 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0703 20:25:05.302613 38941 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateNonRelatedInstanceGroupFailure I0703 20:25:05.302747 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.302756 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.302760 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.303059 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.303279 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.303290 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.304397 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.304409 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.309592 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.309636 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.310060 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.310084 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.311190 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.311202 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.316399 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.316442 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:05.316915 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.316931 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.318023 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.318037 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.323188 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.323218 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNonRelatedInstanceGroupFailure (0.02s) === RUN TestRollingUpdateRelatedInstanceGroupFailure I0703 20:25:05.323413 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.323429 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0703 20:25:05.323441 38941 instancegroups.go:509] Cluster did not validate within 0s E0703 20:25:05.323452 38941 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateRelatedInstanceGroupFailure (0.00s) === RUN TestRollingUpdateMasterGroupFailure I0703 20:25:05.323561 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.323573 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0703 20:25:05.323582 38941 instancegroups.go:509] Cluster did not validate within 0s E0703 20:25:05.323590 38941 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateMasterGroupFailure (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupNil I0703 20:25:05.323690 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.323702 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0703 20:25:05.323711 38941 instancegroups.go:509] Cluster did not validate within 0s E0703 20:25:05.323720 38941 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupNil (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupExitableError I0703 20:25:05.323829 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.323840 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.323849 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.324310 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.324601 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.324615 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.325747 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.325759 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.330930 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.330976 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.331583 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.331607 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.332713 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.332731 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.337931 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.337968 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:05.338377 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.338394 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.339486 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.339503 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.344690 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.344719 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.344735 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0703 20:25:05.344753 38941 instancegroups.go:509] Cluster did not validate within 0s E0703 20:25:05.344765 38941 rollingupdate.go:218] failed to roll InstanceGroup "node-2": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupExitableError (0.02s) === RUN TestRollingUpdateClusterFailsValidationAfterOneNode I0703 20:25:05.344984 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.344999 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.345008 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.345665 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.347170 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.347192 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.348307 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.348338 38941 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0703 20:25:05.348354 38941 instancegroups.go:509] Cluster did not validate within 0s E0703 20:25:05.348365 38941 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterFailsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneNode I0703 20:25:05.348528 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.348540 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.348547 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.349114 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.349579 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.349598 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.350703 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.350717 38941 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0703 20:25:05.350725 38941 instancegroups.go:509] Cluster did not validate within 0s E0703 20:25:05.350732 38941 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateFlappingValidation I0703 20:25:05.350863 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.350875 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.351948 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.351971 38941 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0703 20:25:05.353087 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.358202 38941 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0703 20:25:05.359320 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.364513 38941 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0703 20:25:05.365593 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.370736 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.370778 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.370791 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.370798 38941 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0703 20:25:05.371190 38941 instancegroups.go:431] Draining the node: "master-1a.local". I0703 20:25:05.371464 38941 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0703 20:25:05.371502 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.371515 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.372629 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.372646 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.377828 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.377861 38941 instancegroups.go:431] Draining the node: "master-1b.local". I0703 20:25:05.378314 38941 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0703 20:25:05.378357 38941 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0703 20:25:05.378374 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.379480 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.379520 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.384734 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.384758 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.384772 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.384778 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.385195 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.385490 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.385505 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.386599 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.386621 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.391809 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.391856 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.392481 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.392507 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.393616 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.393644 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.398830 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.398875 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:05.399478 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.399500 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.400606 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.400628 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.405825 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.405853 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.405871 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.405882 38941 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0703 20:25:05.406757 38941 instancegroups.go:431] Draining the node: "node-2a.local". I0703 20:25:05.407092 38941 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0703 20:25:05.407108 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.408208 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.408231 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.413451 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.413485 38941 instancegroups.go:431] Draining the node: "node-2b.local". I0703 20:25:05.413915 38941 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0703 20:25:05.413932 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.415048 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.415072 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.420242 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.420275 38941 instancegroups.go:431] Draining the node: "node-2c.local". I0703 20:25:05.420662 38941 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0703 20:25:05.420677 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.421778 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.421804 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.427013 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.427050 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateFlappingValidation (0.08s) === RUN TestRollingUpdateValidatesAfterBastion I0703 20:25:05.427305 38941 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0703 20:25:05.427325 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.428433 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.428456 38941 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0703 20:25:05.429549 38941 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0703 20:25:05.430634 38941 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0703 20:25:05.431719 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.436875 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.436925 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.436940 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.436952 38941 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0703 20:25:05.437481 38941 instancegroups.go:431] Draining the node: "master-1a.local". I0703 20:25:05.437925 38941 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0703 20:25:05.437977 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.437999 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.439114 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.439127 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.444525 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.444590 38941 instancegroups.go:431] Draining the node: "master-1b.local". I0703 20:25:05.445007 38941 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0703 20:25:05.445045 38941 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0703 20:25:05.445059 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.446207 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.446228 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.451420 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.451444 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.451453 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.451459 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.451826 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.452107 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.452121 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.453258 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.453282 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.458483 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.458507 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.458847 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.458862 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.460012 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.460033 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.465249 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.465281 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:05.465641 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.465655 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.466804 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.466825 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.471983 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.472001 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.472009 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.472014 38941 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0703 20:25:05.472376 38941 instancegroups.go:431] Draining the node: "node-2a.local". I0703 20:25:05.472673 38941 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0703 20:25:05.472687 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.473844 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.473865 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.479540 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.479599 38941 instancegroups.go:431] Draining the node: "node-2b.local". I0703 20:25:05.480202 38941 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0703 20:25:05.480222 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.481331 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.481351 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.486556 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.486583 38941 instancegroups.go:431] Draining the node: "node-2c.local". I0703 20:25:05.486951 38941 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0703 20:25:05.486966 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.488068 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.488086 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.493283 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.493299 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateValidatesAfterBastion (0.07s) === RUN TestAddAnnotatedNodesToNeedsUpdate --- PASS: TestAddAnnotatedNodesToNeedsUpdate (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateCloudonly --- PASS: TestAddAnnotatedNodesToNeedsUpdateCloudonly (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateNodesMissing --- PASS: TestAddAnnotatedNodesToNeedsUpdateNodesMissing (0.00s) === RUN TestRollingUpdateTaintAllButOneNeedUpdate I0703 20:25:05.493585 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.493593 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.493597 38941 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0703 20:25:05.493875 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.494144 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.494156 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.495253 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.495266 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.500425 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.500457 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.501046 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.501066 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.502190 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.502202 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.507356 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.507375 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateTaintAllButOneNeedUpdate (0.01s) === RUN TestRollingUpdateMaxSurgeIgnoredForMaster I0703 20:25:05.507587 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.507601 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.507609 38941 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0703 20:25:05.508052 38941 instancegroups.go:431] Draining the node: "master-1a.local". I0703 20:25:05.508479 38941 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0703 20:25:05.508515 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.508530 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.509672 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.509684 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.514855 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.514886 38941 instancegroups.go:431] Draining the node: "master-1b.local". I0703 20:25:05.515365 38941 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0703 20:25:05.515403 38941 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0703 20:25:05.515419 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.516562 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.516574 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.521730 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.521748 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeIgnoredForMaster (0.01s) === RUN TestRollingUpdateDisabled I0703 20:25:05.521989 38941 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled W0703 20:25:05.522017 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0703 20:25:05.522031 38941 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled W0703 20:25:05.522040 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0703 20:25:05.522050 38941 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled W0703 20:25:05.522058 38941 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0703 20:25:05.522068 38941 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0703 20:25:05.522078 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabled (0.00s) === RUN TestRollingUpdateDisabledSurge I0703 20:25:05.522219 38941 instancegroups.go:607] Detaching instance "bastion-1a", in group "bastion-1". I0703 20:25:05.522251 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:05.523414 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.523425 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.528622 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.528645 38941 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled I0703 20:25:05.528677 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.528690 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.528698 38941 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0703 20:25:05.529228 38941 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled I0703 20:25:05.529243 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.529253 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.529262 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:05.529767 38941 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0703 20:25:05.529803 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:05.530916 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.530935 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.536098 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.536114 38941 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled I0703 20:25:05.536123 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.536132 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.536140 38941 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0703 20:25:05.536716 38941 instancegroups.go:605] Detaching instance "node-2c", node "node-2c.local", in group "node-2". I0703 20:25:05.536750 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:05.537905 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.537938 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:05.543112 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.543130 38941 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0703 20:25:05.543142 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabledSurge (0.02s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdate I0703 20:25:05.543350 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.543369 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.543380 38941 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0703 20:25:05.544708 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.545203 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.545230 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.546385 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.546410 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.546436 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:05.546495 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.547062 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.547195 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.547217 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.548326 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.548353 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.648651 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.648716 38941 instancegroups.go:431] Draining the node: "node-1e.local". I0703 20:25:05.648738 38941 instancegroups.go:431] Draining the node: "node-1d.local". I0703 20:25:05.649268 38941 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0703 20:25:05.649525 38941 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0703 20:25:05.649545 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.650699 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.650721 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.650735 38941 instancegroups.go:431] Draining the node: "node-1f.local". I0703 20:25:05.651225 38941 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0703 20:25:05.651260 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.652393 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.652421 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.752923 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.752987 38941 instancegroups.go:431] Draining the node: "node-1g.local". I0703 20:25:05.753805 38941 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0703 20:25:05.753849 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.755017 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.755052 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.755066 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllButOneNeedUpdate I0703 20:25:05.755259 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.755272 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.755279 38941 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0703 20:25:05.756660 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:05.756701 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:05.757753 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:05.757960 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:05.757994 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.759204 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.759289 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.859699 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.859755 38941 instancegroups.go:431] Draining the node: "node-1d.local". I0703 20:25:05.859829 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:05.860803 38941 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0703 20:25:05.861041 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:05.861083 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.862227 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.862265 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.862306 38941 instancegroups.go:431] Draining the node: "node-1e.local". I0703 20:25:05.863058 38941 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0703 20:25:05.863097 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.864243 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.864284 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.964726 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.964797 38941 instancegroups.go:431] Draining the node: "node-1f.local". I0703 20:25:05.965444 38941 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0703 20:25:05.965486 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.966681 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.966721 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.966738 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdateMaster I0703 20:25:05.966923 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.966943 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.966953 38941 instancegroups.go:342] Tainting 7 nodes in "master-1" instancegroup. I0703 20:25:05.968711 38941 instancegroups.go:431] Draining the node: "master-1a.local". I0703 20:25:05.969255 38941 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0703 20:25:05.969300 38941 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0703 20:25:05.969332 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.970500 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.970547 38941 instancegroups.go:540] Cluster validated. I0703 20:25:05.970595 38941 instancegroups.go:431] Draining the node: "master-1c.local". I0703 20:25:05.970623 38941 instancegroups.go:431] Draining the node: "master-1b.local". I0703 20:25:05.971763 38941 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0703 20:25:05.971821 38941 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0703 20:25:05.972022 38941 instancegroups.go:691] skipping deregistration of instance "master-1c", as part of instancegroup with role "ControlPlane" I0703 20:25:05.972067 38941 instancegroups.go:628] Stopping instance "master-1c", node "master-1c.local", in group "master-1" (this may take a while). I0703 20:25:05.972104 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:05.973256 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:05.973283 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.073740 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.073804 38941 instancegroups.go:431] Draining the node: "master-1e.local". I0703 20:25:06.073829 38941 instancegroups.go:431] Draining the node: "master-1d.local". I0703 20:25:06.074823 38941 instancegroups.go:691] skipping deregistration of instance "master-1d", as part of instancegroup with role "ControlPlane" I0703 20:25:06.074882 38941 instancegroups.go:628] Stopping instance "master-1d", node "master-1d.local", in group "master-1" (this may take a while). I0703 20:25:06.075041 38941 instancegroups.go:691] skipping deregistration of instance "master-1e", as part of instancegroup with role "ControlPlane" I0703 20:25:06.075092 38941 instancegroups.go:628] Stopping instance "master-1e", node "master-1e.local", in group "master-1" (this may take a while). I0703 20:25:06.075125 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.076311 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.076357 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.076397 38941 instancegroups.go:431] Draining the node: "master-1f.local". I0703 20:25:06.077295 38941 instancegroups.go:691] skipping deregistration of instance "master-1f", as part of instancegroup with role "ControlPlane" I0703 20:25:06.077342 38941 instancegroups.go:628] Stopping instance "master-1f", node "master-1f.local", in group "master-1" (this may take a while). I0703 20:25:06.077370 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.078519 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.078562 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.179009 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.179062 38941 instancegroups.go:431] Draining the node: "master-1g.local". I0703 20:25:06.179454 38941 instancegroups.go:691] skipping deregistration of instance "master-1g", as part of instancegroup with role "ControlPlane" I0703 20:25:06.179489 38941 instancegroups.go:628] Stopping instance "master-1g", node "master-1g.local", in group "master-1" (this may take a while). I0703 20:25:06.179510 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.180633 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.180654 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.180663 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdateMaster (0.21s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdate I0703 20:25:06.180788 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.180800 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.180806 38941 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0703 20:25:06.181401 38941 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0703 20:25:06.181425 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:06.182540 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.182557 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.182562 38941 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0703 20:25:06.182579 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:06.183689 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.183705 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.183731 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:06.183789 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:06.184019 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:06.184254 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:06.184271 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.185388 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.185412 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.285805 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.285865 38941 instancegroups.go:431] Draining the node: "node-1d.local". I0703 20:25:06.285891 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:06.286394 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:06.286747 38941 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0703 20:25:06.286776 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.287890 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.287917 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.287944 38941 instancegroups.go:431] Draining the node: "node-1e.local". I0703 20:25:06.288453 38941 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0703 20:25:06.288484 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.289575 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.289600 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.390007 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.390057 38941 instancegroups.go:431] Draining the node: "node-1f.local". I0703 20:25:06.390669 38941 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0703 20:25:06.390724 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.391887 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.391921 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.391947 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeAllButOneNeedUpdate I0703 20:25:06.392169 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.392196 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.392208 38941 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0703 20:25:06.393496 38941 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0703 20:25:06.393540 38941 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0703 20:25:06.393577 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:06.394718 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.394738 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.394754 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:06.394767 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:06.395121 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:06.395559 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:06.395593 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.396745 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.396775 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.497197 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.497247 38941 instancegroups.go:431] Draining the node: "node-1d.local". I0703 20:25:06.497281 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:06.498012 38941 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0703 20:25:06.498161 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:06.498183 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.499351 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.499379 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.499399 38941 instancegroups.go:431] Draining the node: "node-1e.local". I0703 20:25:06.499817 38941 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0703 20:25:06.499848 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.500969 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.500998 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.601710 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.601778 38941 instancegroups.go:431] Draining the node: "node-1f.local". I0703 20:25:06.602540 38941 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0703 20:25:06.602594 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.604378 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.604438 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.604463 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeGreaterThanNeedUpdate I0703 20:25:06.604732 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.604758 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.604772 38941 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0703 20:25:06.605540 38941 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0703 20:25:06.605570 38941 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". I0703 20:25:06.605604 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:06.606739 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.606752 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:06.611964 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.611990 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:06.612032 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:06.612610 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:06.612628 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.612748 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:06.612762 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.613764 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.613788 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:06.619054 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.619075 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeGreaterThanNeedUpdate (0.01s) === RUN TestRollingUpdateDetachFails I0703 20:25:06.619237 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.619249 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.619255 38941 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0703 20:25:06.619605 38941 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". E0703 20:25:06.619641 38941 instancegroups.go:191] Failed to detach instance "node-1b": error detaching instance "node-1b", node "node-1b.local": error detaching instance "node-1b": testing error I0703 20:25:06.619648 38941 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". E0703 20:25:06.619661 38941 instancegroups.go:191] Failed to detach instance "node-1a": error detaching instance "node-1a", node "node-1a.local": error detaching instance "node-1a": testing error I0703 20:25:06.619677 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:06.620888 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.620914 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:06.626151 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.626182 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:06.626208 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:06.629234 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:06.629247 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:06.629277 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.629301 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.630470 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.630500 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:06.635720 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.635744 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDetachFails (0.02s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached I0703 20:25:06.635886 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.635900 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.635905 38941 instancegroups.go:342] Tainting 4 nodes in "node-1" instancegroup. I0703 20:25:06.636368 38941 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0703 20:25:06.636400 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:06.637566 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.637588 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.637595 38941 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0703 20:25:06.637622 38941 instancegroups.go:203] waiting for 1ms after detaching instance I0703 20:25:06.638742 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.638763 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.638784 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:06.638802 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:06.638878 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:06.639156 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:06.639178 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.639428 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:06.639445 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.639670 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:06.639688 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.640328 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.741040 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.741089 38941 instancegroups.go:431] Draining the node: "node-1d.local". I0703 20:25:06.741581 38941 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0703 20:25:06.741611 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.742754 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.742780 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.742793 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached (0.11s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached I0703 20:25:06.742940 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.742955 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.742963 38941 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0703 20:25:06.744457 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:06.744989 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:06.745024 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.746198 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.746226 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.746240 38941 instancegroups.go:431] Draining the node: "node-1e.local". I0703 20:25:06.746257 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:06.746911 38941 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0703 20:25:06.747030 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:06.747053 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.748228 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.748310 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.849029 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.849092 38941 instancegroups.go:431] Draining the node: "node-1g.local". I0703 20:25:06.849146 38941 instancegroups.go:431] Draining the node: "node-1f.local". I0703 20:25:06.850037 38941 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0703 20:25:06.850211 38941 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0703 20:25:06.850249 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.851429 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.851462 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.851481 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:06.851929 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:06.851960 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.853154 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.853204 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.954751 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.954817 38941 instancegroups.go:431] Draining the node: "node-1d.local". I0703 20:25:06.955540 38941 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0703 20:25:06.955581 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.957414 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.957433 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.957443 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached (0.21s) === RUN TestRollingUpdateOnlyWarmPoolNodes I0703 20:25:06.957599 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.957607 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.957612 38941 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0703 20:25:06.957618 38941 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0703 20:25:06.957622 38941 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0703 20:25:06.957632 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateOnlyWarmPoolNodes (0.00s) === RUN TestRollingWarmPoolBeforeJoinedNodes I0703 20:25:06.957686 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.957693 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.957697 38941 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0703 20:25:06.958062 38941 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0703 20:25:06.958070 38941 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0703 20:25:06.958075 38941 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0703 20:25:06.958088 38941 instancegroups.go:431] Draining the node: "node-1a.local". I0703 20:25:06.958345 38941 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0703 20:25:06.958356 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.959464 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.959487 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:06.964648 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.964679 38941 instancegroups.go:431] Draining the node: "node-1b.local". I0703 20:25:06.965181 38941 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0703 20:25:06.965205 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.966348 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.966370 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:06.971521 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.971551 38941 instancegroups.go:431] Draining the node: "node-1c.local". I0703 20:25:06.972034 38941 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0703 20:25:06.972059 38941 instancegroups.go:469] waiting for 1ms after terminating instance I0703 20:25:06.973734 38941 instancegroups.go:504] Validating the cluster. I0703 20:25:06.973755 38941 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0703 20:25:06.978917 38941 instancegroups.go:540] Cluster validated. I0703 20:25:06.978945 38941 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingWarmPoolBeforeJoinedNodes (0.02s) === RUN TestSettings === RUN TestSettings/DrainAndTerminate === RUN TestSettings/MaxUnavailable === RUN TestSettings/MaxSurge --- PASS: TestSettings (0.00s) --- PASS: TestSettings/DrainAndTerminate (0.00s) --- PASS: TestSettings/MaxUnavailable (0.00s) --- PASS: TestSettings/MaxSurge (0.00s) === RUN TestMaxUnavailable === RUN TestMaxUnavailable/0_1 === RUN TestMaxUnavailable/0%_1 === RUN TestMaxUnavailable/39%_10 === RUN TestMaxUnavailable/100%_10 --- PASS: TestMaxUnavailable (0.00s) --- PASS: TestMaxUnavailable/0_1 (0.00s) --- PASS: TestMaxUnavailable/0%_1 (0.00s) --- PASS: TestMaxUnavailable/39%_10 (0.00s) --- PASS: TestMaxUnavailable/100%_10 (0.00s) === RUN TestMaxSurge === RUN TestMaxSurge/0_1 === RUN TestMaxSurge/0%_1 === RUN TestMaxSurge/31%_10 === RUN TestMaxSurge/100%_10 --- PASS: TestMaxSurge (0.00s) --- PASS: TestMaxSurge/0_1 (0.00s) --- PASS: TestMaxSurge/0%_1 (0.00s) --- PASS: TestMaxSurge/31%_10 (0.00s) --- PASS: TestMaxSurge/100%_10 (0.00s) === RUN TestAWSDefault --- PASS: TestAWSDefault (0.00s) PASS ok k8s.io/kops/pkg/instancegroups 1.935s === RUN TestWriteToken === RUN TestWriteToken/WriteJson === RUN TestWriteToken/WriteJsonWithIndent --- PASS: TestWriteToken (0.00s) --- PASS: TestWriteToken/WriteJson (0.00s) --- PASS: TestWriteToken/WriteJsonWithIndent (0.00s) PASS ok k8s.io/kops/pkg/jsonutils 0.006s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.00s) PASS ok k8s.io/kops/pkg/k8scodecs 0.011s === RUN TestParse E0703 20:25:05.060871 38943 versions.go:96] unable to parse Kubernetes version "" E0703 20:25:05.060962 38943 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: TestParse (0.00s) === RUN TestIsGTE === RUN TestIsGTE/KV_greater_than_Version === RUN TestIsGTE/KV_greater_than_Version#01 === RUN TestIsGTE/KV_equal_Version === RUN TestIsGTE/KV_equal_Version#01 === RUN TestIsGTE/Version_greater_than_KV === RUN TestIsGTE/Version_greater_than_KV#01 --- PASS: TestIsGTE (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version#01 (0.00s) --- PASS: TestIsGTE/KV_equal_Version (0.00s) --- PASS: TestIsGTE/KV_equal_Version#01 (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV#01 (0.00s) PASS ok k8s.io/kops/pkg/k8sversion 0.010s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.01s) === RUN TestToVersionedJSON --- PASS: TestToVersionedJSON (0.00s) === RUN TestRewriteAPIGroup --- PASS: TestRewriteAPIGroup (0.00s) PASS ok k8s.io/kops/pkg/kopscodecs 0.033s === RUN TestBuildKubecfg === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster === RUN TestBuildKubecfg/Public_DNS_with_kops_auth_plugin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option --- PASS: TestBuildKubecfg (0.09s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster (0.00s) --- PASS: TestBuildKubecfg/Public_DNS_with_kops_auth_plugin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option (0.00s) PASS ok k8s.io/kops/pkg/kubeconfig 0.152s === RUN Test_ProxyFunc --- PASS: Test_ProxyFunc (0.00s) === RUN TestBootstrapUserData --- PASS: TestBootstrapUserData (0.01s) === RUN TestValidateAWSVolumeAllow50ratio --- PASS: TestValidateAWSVolumeAllow50ratio (0.00s) PASS ok k8s.io/kops/pkg/model 0.079s === RUN TestRootVolumeOptimizationFlag --- PASS: TestRootVolumeOptimizationFlag (0.00s) === RUN TestAPIServerAdditionalSecurityGroupsWithNLB === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Node --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Node (0.00s) === RUN TestJoinSuffixes --- PASS: TestJoinSuffixes (0.00s) === RUN TestIAMServiceEC2 --- PASS: TestIAMServiceEC2 (0.00s) === RUN Test_formatAWSIAMStatement === RUN Test_formatAWSIAMStatement/namespace_and_name_without_wildcard === RUN Test_formatAWSIAMStatement/name_contains_wildcard === RUN Test_formatAWSIAMStatement/namespace_contains_wildcard --- PASS: Test_formatAWSIAMStatement (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_and_name_without_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/name_contains_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_contains_wildcard (0.00s) PASS ok k8s.io/kops/pkg/model/awsmodel 0.073s === RUN TestAPILoadBalancerModelBuilder_Build --- PASS: TestAPILoadBalancerModelBuilder_Build (0.00s) === RUN TestSubnetForLoadbalancer --- PASS: TestSubnetForLoadbalancer (0.00s) === RUN TestCloudTagsForInstanceGroup --- PASS: TestCloudTagsForInstanceGroup (0.00s) === RUN TestNetworkModelBuilder_Build --- PASS: TestNetworkModelBuilder_Build (0.00s) === RUN TestResourceGroupModelBuilder_Build --- PASS: TestResourceGroupModelBuilder_Build (0.00s) === RUN TestVMScaleSetModelBuilder_Build --- PASS: TestVMScaleSetModelBuilder_Build (0.00s) === RUN TestGetCapacity === RUN TestGetCapacity/test_case_0 === RUN TestGetCapacity/test_case_1 === RUN TestGetCapacity/test_case_2 === RUN TestGetCapacity/test_case_3 --- PASS: TestGetCapacity (0.00s) --- PASS: TestGetCapacity/test_case_0 (0.00s) --- PASS: TestGetCapacity/test_case_1 (0.00s) --- PASS: TestGetCapacity/test_case_2 (0.00s) --- PASS: TestGetCapacity/test_case_3 (0.00s) === RUN TestGetStorageProfile === RUN TestGetStorageProfile/test_case_0 === RUN TestGetStorageProfile/test_case_1 --- PASS: TestGetStorageProfile (0.00s) --- PASS: TestGetStorageProfile/test_case_0 (0.00s) --- PASS: TestGetStorageProfile/test_case_1 (0.00s) === RUN TestParseImage === RUN TestParseImage/test_case_0 === RUN TestParseImage/test_case_1 === RUN TestParseImage/test_case_2 === RUN TestParseImage/test_case_3 --- PASS: TestParseImage (0.00s) --- PASS: TestParseImage/test_case_0 (0.00s) --- PASS: TestParseImage/test_case_1 (0.00s) --- PASS: TestParseImage/test_case_2 (0.00s) --- PASS: TestParseImage/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/model/azuremodel 0.070s === RUN TestCloudConfigurationOptionsBuilder === RUN TestCloudConfigurationOptionsBuilder/neither === RUN TestCloudConfigurationOptionsBuilder/all_false === RUN TestCloudConfigurationOptionsBuilder/all_true === RUN TestCloudConfigurationOptionsBuilder/os_false === RUN TestCloudConfigurationOptionsBuilder/os_true === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_true === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_true --- PASS: TestCloudConfigurationOptionsBuilder (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/neither (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_true (0.00s) === RUN Test_Build_Containerd_Supported_Version --- PASS: Test_Build_Containerd_Supported_Version (0.00s) === RUN Test_Build_Containerd_Unneeded_Runtime --- PASS: Test_Build_Containerd_Unneeded_Runtime (0.00s) === RUN Test_Build_Containerd_Needed_Runtime --- PASS: Test_Build_Containerd_Needed_Runtime (0.00s) === RUN TestImage I0703 20:25:05.110217 38950 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestImage (0.00s) === RUN Test_Build_KCM_Builder --- PASS: Test_Build_KCM_Builder (0.00s) === RUN Test_Build_KCM_Builder_Change_Duration --- PASS: Test_Build_KCM_Builder_Change_Duration (0.00s) === RUN Test_Build_KCM_Builder_CIDR_Mask_Size === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: (0.00s) === RUN TestFeatureGatesKubernetesVersion --- PASS: TestFeatureGatesKubernetesVersion (0.00s) === RUN TestFeatureGatesOverride --- PASS: TestFeatureGatesOverride (0.00s) === RUN Test_Build_Scheduler_Without_PolicyConfigMap --- PASS: Test_Build_Scheduler_Without_PolicyConfigMap (0.00s) === RUN Test_Build_Scheduler_PolicyConfigMap_Supported_Version --- PASS: Test_Build_Scheduler_PolicyConfigMap_Supported_Version (0.00s) PASS ok k8s.io/kops/pkg/model/components 0.062s === RUN Test_RunEtcdManagerBuilder I0703 20:25:05.115921 38955 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunEtcdManagerBuilder/basedir=tests/minimal === RUN Test_RunEtcdManagerBuilder/basedir=tests/interval === RUN Test_RunEtcdManagerBuilder/basedir=tests/proxy === RUN Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings W0703 20:25:05.145239 38955 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 W0703 20:25:05.147243 38955 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 --- PASS: Test_RunEtcdManagerBuilder (0.03s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/minimal (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/interval (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/proxy (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings (0.01s) PASS ok k8s.io/kops/pkg/model/components/etcdmanager 0.101s === RUN Test_RunKubeApiserverBuilder I0703 20:25:05.106575 38956 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunKubeApiserverBuilder/basedir=tests/minimal --- PASS: Test_RunKubeApiserverBuilder (0.01s) --- PASS: Test_RunKubeApiserverBuilder/basedir=tests/minimal (0.01s) PASS ok k8s.io/kops/pkg/model/components/kubeapiserver 0.069s === RUN Test_RunKubeSchedulerBuilder === RUN Test_RunKubeSchedulerBuilder/basedir=tests/minimal === RUN Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig === RUN Test_RunKubeSchedulerBuilder/basedir=tests/mixing --- PASS: Test_RunKubeSchedulerBuilder (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/minimal (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig (0.00s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/mixing (0.00s) PASS ok k8s.io/kops/pkg/model/components/kubescheduler 0.077s === RUN TestDefaultInstanceGroupVolumeSize --- PASS: TestDefaultInstanceGroupVolumeSize (0.00s) PASS ok k8s.io/kops/pkg/model/defaults 0.028s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) === RUN TestPolicyGeneration --- PASS: TestPolicyGeneration (0.00s) === RUN TestEmptyPolicy --- PASS: TestEmptyPolicy (0.00s) PASS ok k8s.io/kops/pkg/model/iam 0.064s === RUN TestServerGroupBuilder I0703 20:25:05.121132 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.130259 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.140711 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.149743 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.159567 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.172544 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.184912 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.194609 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.207339 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.216138 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.222756 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.228886 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.235001 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.284056 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.288652 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.293208 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.298542 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:05.302614 38961 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestServerGroupBuilder (0.19s) PASS ok k8s.io/kops/pkg/model/openstackmodel 0.260s === RUN Test_NodeUpTabs --- PASS: Test_NodeUpTabs (0.00s) PASS ok k8s.io/kops/pkg/model/resources 0.035s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetVMSSNameFromProviderID === RUN TestGetVMSSNameFromProviderID/test_case_0 === RUN TestGetVMSSNameFromProviderID/test_case_1 === RUN TestGetVMSSNameFromProviderID/test_case_2 --- PASS: TestGetVMSSNameFromProviderID (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_0 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_1 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_2 (0.00s) === RUN TestIdentifyNode === RUN TestIdentifyNode/test_case_0 === RUN TestIdentifyNode/test_case_1 --- PASS: TestIdentifyNode (0.00s) --- PASS: TestIdentifyNode/test_case_0 (0.00s) --- PASS: TestIdentifyNode/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/nodeidentity/azure 0.036s === RUN TestBuildNodeLabels === RUN TestBuildNodeLabels/RoleControlPlane === RUN TestBuildNodeLabels/RoleNode --- PASS: TestBuildNodeLabels (0.00s) --- PASS: TestBuildNodeLabels/RoleControlPlane (0.00s) --- PASS: TestBuildNodeLabels/RoleNode (0.00s) PASS ok k8s.io/kops/pkg/nodelabels 0.020s === RUN TestGenerateCertificate === RUN TestGenerateCertificate/selfsigned === RUN TestGenerateCertificate/client === RUN TestGenerateCertificate/server --- PASS: TestGenerateCertificate (0.00s) --- PASS: TestGenerateCertificate/selfsigned (0.00s) --- PASS: TestGenerateCertificate/client (0.00s) --- PASS: TestGenerateCertificate/server (0.00s) === RUN TestCertificateRoundTrip --- PASS: TestCertificateRoundTrip (0.00s) === RUN TestIssueCert === RUN TestIssueCert/ca === RUN TestIssueCert/client === RUN TestIssueCert/clientOneYear === RUN TestIssueCert/#00 === RUN TestIssueCert/server --- PASS: TestIssueCert (0.90s) --- PASS: TestIssueCert/ca (0.49s) --- PASS: TestIssueCert/client (0.09s) --- PASS: TestIssueCert/clientOneYear (0.32s) --- PASS: TestIssueCert/#00 (0.00s) --- PASS: TestIssueCert/server (0.00s) === RUN TestPrivateKeyRoundTripRSA === RUN TestPrivateKeyRoundTripRSA/rsa === RUN TestPrivateKeyRoundTripRSA/ecdsa --- PASS: TestPrivateKeyRoundTripRSA (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/rsa (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/ecdsa (0.00s) === RUN Test_AWSFingerprint_RsaKey1 --- PASS: Test_AWSFingerprint_RsaKey1 (0.00s) === RUN Test_AWSFingerprint_RsaKeyEncrypted --- PASS: Test_AWSFingerprint_RsaKeyEncrypted (0.00s) === RUN Test_AWSFingerprint_Ed25519Key --- PASS: Test_AWSFingerprint_Ed25519Key (0.00s) === RUN Test_AWSFingerprint_TrickyWhitespace --- PASS: Test_AWSFingerprint_TrickyWhitespace (0.00s) === RUN Test_AWSFingerprint_DsaKey --- PASS: Test_AWSFingerprint_DsaKey (0.00s) === RUN Test_OpenSSHFingerprint_RsaKey1 --- PASS: Test_OpenSSHFingerprint_RsaKey1 (0.00s) PASS ok k8s.io/kops/pkg/pki 0.909s === RUN TestLongDesc --- PASS: TestLongDesc (0.00s) PASS ok k8s.io/kops/pkg/pretty 0.003s === RUN TestAddUntaggedRouteTables I0703 20:25:09.846704 40552 routetable.go:53] DescribeRouteTables: { } I0703 20:25:09.846783 40552 aws.go:230] Skipping route table in VPC, but with wrong cluster tag ("other.example.com") W0703 20:25:09.846792 40552 tags.go:67] cluster tag not found on route-table:rtb-1234 --- PASS: TestAddUntaggedRouteTables (0.00s) === RUN TestListIAMInstanceProfiles I0703 20:25:09.846862 40552 iaminstanceprofile.go:193] ListInstanceProfiles: { } W0703 20:25:09.846904 40552 aws.go:2076] could not find instance profile "__no_entity__.me.example.com". Resource may already have been deleted: NoSuchEntity: No such entity --- PASS: TestListIAMInstanceProfiles (0.00s) === RUN TestListIAMRoles I0703 20:25:09.846943 40552 iamrole.go:89] ListRoles: { } --- PASS: TestListIAMRoles (0.00s) === RUN TestListRouteTables I0703 20:25:09.846986 40552 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["me.example.com"] }] } I0703 20:25:09.847025 40552 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/me.example.com"] }] } --- PASS: TestListRouteTables (0.00s) === RUN TestSharedVolume I0703 20:25:09.847069 40552 volumes.go:33] CreateVolume: { TagSpecifications: [{ ResourceType: "volume", Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "shared" }] }] } I0703 20:25:09.847123 40552 volumes.go:33] CreateVolume: { TagSpecifications: [{ Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "owned" }] }] } I0703 20:25:09.847139 40552 volumes.go:128] DescribeVolumes: { } W0703 20:25:09.847158 40552 aws.go:2229] (new) cluster tag not found on volume:vol-2 aws_test.go:334: 2 --- PASS: TestSharedVolume (0.00s) === RUN TestMatchesElbTags --- PASS: TestMatchesElbTags (0.00s) === RUN TestListVPCs I0703 20:25:09.847237 40552 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:09.847355 40552 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:09.847398 40552 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:09.847438 40552 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:09.847460 40552 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:09.847490 40552 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:09.847531 40552 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:09.847540 40552 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:09.847562 40552 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:09.847578 40552 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:09.847591 40552 tags.go:42] CreateTags { Resources: ["vpc-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "legacy.example.com" }] } I0703 20:25:09.847606 40552 tags.go:42] CreateTags { Resources: ["vpc-shared"], Tags: [{ Key: "kubernetes.io/cluster/shared.example.com", Value: "shared" }] } I0703 20:25:09.847617 40552 tags.go:42] CreateTags { Resources: ["vpc-shared-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "shared-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/shared-with-legacy.example.com", Value: "shared" }] } I0703 20:25:09.847636 40552 tags.go:42] CreateTags { Resources: ["vpc-owned"], Tags: [{ Key: "kubernetes.io/cluster/owned.example.com", Value: "owned" }] } I0703 20:25:09.847648 40552 tags.go:42] CreateTags { Resources: ["vpc-owned-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "owned-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/owned-with-legacy.example.com", Value: "owned" }] } I0703 20:25:09.847665 40552 tags.go:42] CreateTags { Resources: ["vpc-other"], Tags: [{ Key: "KubernetesCluster", Value: "other.example.com" },{ Key: "kubernetes.io/cluster/other.example.com", Value: "shared" }] } I0703 20:25:09.847682 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["mismatch.example.com"] }] } I0703 20:25:09.847701 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/mismatch.example.com"] }] } I0703 20:25:09.847712 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["legacy.example.com"] }] } I0703 20:25:09.847722 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/legacy.example.com"] }] } I0703 20:25:09.847733 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared-with-legacy.example.com"] }] } I0703 20:25:09.847742 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared-with-legacy.example.com"] }] } I0703 20:25:09.847753 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared.example.com"] }] } I0703 20:25:09.847762 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared.example.com"] }] } I0703 20:25:09.847773 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned-with-legacy.example.com"] }] } I0703 20:25:09.847781 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned-with-legacy.example.com"] }] } I0703 20:25:09.847792 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned.example.com"] }] } I0703 20:25:09.847801 40552 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned.example.com"] }] } --- PASS: TestListVPCs (0.00s) PASS ok k8s.io/kops/pkg/resources/aws 0.048s === RUN TestListResourcesAzure --- PASS: TestListResourcesAzure (0.00s) === RUN TestIsOwnedByCluster === RUN TestIsOwnedByCluster/test_case_0 === RUN TestIsOwnedByCluster/test_case_1 === RUN TestIsOwnedByCluster/test_case_2 === RUN TestIsOwnedByCluster/test_case_3 --- PASS: TestIsOwnedByCluster (0.00s) --- PASS: TestIsOwnedByCluster/test_case_0 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_1 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_2 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/resources/azure 0.023s === RUN TestNameMatch --- PASS: TestNameMatch (0.00s) === RUN TestMatchesClusterNameWithUUID --- PASS: TestMatchesClusterNameWithUUID (0.00s) PASS ok k8s.io/kops/pkg/resources/gce 0.044s === RUN TestEscapeCommand --- PASS: TestEscapeCommand (0.00s) === RUN TestRawManifest --- PASS: TestRawManifest (0.00s) === RUN TestRawMixedManifest --- PASS: TestRawMixedManifest (0.00s) === RUN TestKeyPairOnlyManifest --- PASS: TestKeyPairOnlyManifest (0.00s) === RUN TestUnitFileExtensionValid === RUN TestUnitFileExtensionValid/valid_extension:_.automount === RUN TestUnitFileExtensionValid/valid_extension:_.device === RUN TestUnitFileExtensionValid/valid_extension:_.mount === RUN TestUnitFileExtensionValid/valid_extension:_.path === RUN TestUnitFileExtensionValid/valid_extension:_.scope === RUN TestUnitFileExtensionValid/valid_extension:_.service === RUN TestUnitFileExtensionValid/valid_extension:_.slice === RUN TestUnitFileExtensionValid/valid_extension:_.socket === RUN TestUnitFileExtensionValid/valid_extension:_.swap === RUN TestUnitFileExtensionValid/valid_extension:_.target === RUN TestUnitFileExtensionValid/valid_extension:_.timer === RUN TestUnitFileExtensionValid/invalid_extension:_(no_extension) === RUN TestUnitFileExtensionValid/invalid_extension:_.not-valid --- PASS: TestUnitFileExtensionValid (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.automount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.device (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.mount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.path (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.scope (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.service (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.slice (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.socket (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.swap (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.target (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.timer (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_(no_extension) (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_.not-valid (0.00s) PASS ok k8s.io/kops/pkg/systemd 0.005s === RUN TestTruncateString === RUN TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false --- PASS: TestTruncateString (0.00s) --- PASS: TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false (0.00s) PASS ok k8s.io/kops/pkg/truncate 0.005s === RUN TestJoin --- PASS: TestJoin (0.00s) PASS ok k8s.io/kops/pkg/urls 0.004s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) PASS ok k8s.io/kops/pkg/util/stringorslice 0.003s === RUN Test_Overlap --- PASS: Test_Overlap (0.00s) === RUN Test_BelongsTo --- PASS: Test_BelongsTo (0.00s) === RUN Test_SplitInto8 --- PASS: Test_SplitInto8 (0.00s) PASS ok k8s.io/kops/pkg/util/subnet 0.004s === RUN TestRenderGeneralOK --- PASS: TestRenderGeneralOK (0.00s) === RUN TestRenderMissingValue --- PASS: TestRenderMissingValue (0.00s) === RUN TestRenderIndent --- PASS: TestRenderIndent (0.00s) === RUN TestRenderChannelFunctions --- PASS: TestRenderChannelFunctions (0.00s) === RUN TestRenderSnippet --- PASS: TestRenderSnippet (0.00s) === RUN TestRenderContext --- PASS: TestRenderContext (0.00s) === RUN TestAllowForMissingVars --- PASS: TestAllowForMissingVars (0.00s) === RUN TestRenderIntegration --- PASS: TestRenderIntegration (0.00s) PASS ok k8s.io/kops/pkg/util/templater 0.037s === RUN Test_ValidateCloudGroupMissing --- PASS: Test_ValidateCloudGroupMissing (0.00s) === RUN Test_ValidateNodesNotEnough --- PASS: Test_ValidateNodesNotEnough (0.00s) === RUN Test_ValidateDetachedNodesDontCount --- PASS: Test_ValidateDetachedNodesDontCount (0.00s) === RUN Test_ValidateNodeNotReady --- PASS: Test_ValidateNodeNotReady (0.00s) === RUN Test_ValidateMastersNotEnough --- PASS: Test_ValidateMastersNotEnough (0.00s) === RUN Test_ValidateMasterNotReady --- PASS: Test_ValidateMasterNotReady (0.00s) === RUN Test_ValidateMasterStaticPods --- PASS: Test_ValidateMasterStaticPods (0.00s) === RUN Test_ValidateNoPodFailures --- PASS: Test_ValidateNoPodFailures (0.00s) === RUN Test_ValidatePodFailure === RUN Test_ValidatePodFailure/pending-node-kube-system === RUN Test_ValidatePodFailure/pending-node-kube-system#01 === RUN Test_ValidatePodFailure/pending-node-kube-system#02 === RUN Test_ValidatePodFailure/pending-node-otherNamespace === RUN Test_ValidatePodFailure/pending-node-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-node-otherNamespace#02 === RUN Test_ValidatePodFailure/pending-cluster-kube-system === RUN Test_ValidatePodFailure/pending-cluster-kube-system#01 === RUN Test_ValidatePodFailure/pending-cluster-kube-system#02 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-node-kube-system === RUN Test_ValidatePodFailure/notready-node-kube-system#01 === RUN Test_ValidatePodFailure/notready-node-kube-system#02 === RUN Test_ValidatePodFailure/notready-node-otherNamespace === RUN Test_ValidatePodFailure/notready-node-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-node-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-cluster-kube-system === RUN Test_ValidatePodFailure/notready-cluster-kube-system#01 === RUN Test_ValidatePodFailure/notready-cluster-kube-system#02 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-node-kube-system === RUN Test_ValidatePodFailure/unknown-node-kube-system#01 === RUN Test_ValidatePodFailure/unknown-node-kube-system#02 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#01 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#02 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 --- PASS: Test_ValidatePodFailure (0.01s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 (0.00s) === RUN Test_ValidateBastionNodes === RUN Test_ValidateBastionNodes/instancegroup's_nodes_not_ready === RUN Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready --- PASS: Test_ValidateBastionNodes (0.00s) --- PASS: Test_ValidateBastionNodes/instancegroup's_nodes_not_ready (0.00s) --- PASS: Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready (0.00s) === RUN Test_ValidateDetachedNodesNotValidated --- PASS: Test_ValidateDetachedNodesNotValidated (0.00s) PASS ok k8s.io/kops/pkg/validation 0.068s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetInternalIP --- PASS: TestGetInternalIP (0.00s) === RUN TestGetSeeds --- PASS: TestGetSeeds (0.00s) PASS ok k8s.io/kops/protokube/pkg/gossip/azure 0.005s === RUN TestRemovesDuplicateGuardedBlocks W0703 20:25:09.960587 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.960625 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.960630 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.960633 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.960636 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.960640 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.960643 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.960647 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.960650 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.960653 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.960657 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.960662 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.960668 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.960672 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.960677 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.960682 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978160 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978188 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978253 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978263 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978321 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978330 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978384 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978393 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978445 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978454 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978514 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978523 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978594 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978604 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978670 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978683 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978738 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978748 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978808 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978816 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978882 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978892 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.978946 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.978955 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979005 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979013 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979058 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979065 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979111 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979120 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979176 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979185 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979235 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979244 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979296 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979305 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979359 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979368 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979457 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979467 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979522 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979531 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979586 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979595 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979646 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979655 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979707 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979717 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979775 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979784 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979836 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979845 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979898 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979908 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.979958 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.979967 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980022 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980031 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980097 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980106 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980160 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980169 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980222 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980231 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980284 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980292 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980343 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980352 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980409 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980418 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980471 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980480 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980556 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980565 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980625 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980634 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980686 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980695 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980748 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980757 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980852 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980863 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980920 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980928 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.980983 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.980992 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981043 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981057 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981111 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981119 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981169 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981192 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981246 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981254 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981307 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981317 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981368 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981377 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981429 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981440 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981491 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981500 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981551 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981560 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981620 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981630 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981680 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981689 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981741 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981751 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981805 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981814 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981869 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981878 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981929 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981938 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.981989 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.981998 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.982049 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.982058 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.982109 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.982121 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.982171 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.982180 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.982834 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.982849 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.982906 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.982914 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.982964 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.982971 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983021 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983029 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983079 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983088 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983139 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983147 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983199 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983208 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983260 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983269 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983317 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983325 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983380 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983392 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983452 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983460 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983509 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983518 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983568 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983577 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983626 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983635 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983682 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983690 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983737 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983748 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983802 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983810 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983864 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983873 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983920 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983929 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.983977 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.983985 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984038 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984047 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984110 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984124 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984185 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984194 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984244 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984252 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984300 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984309 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984359 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984368 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984416 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984425 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984474 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984485 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984534 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984543 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984592 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984601 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984650 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984659 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984708 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984717 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984768 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984776 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984825 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984833 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984882 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984890 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984937 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.984948 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.984995 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985003 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRemovesDuplicateGuardedBlocks (0.02s) === RUN TestRecoversFromBadNesting W0703 20:25:09.985559 40913 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0703 20:25:09.985569 40913 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0703 20:25:09.985576 40913 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0703 20:25:09.985581 40913 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0703 20:25:09.985587 40913 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0703 20:25:09.985591 40913 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0703 20:25:09.985594 40913 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0703 20:25:09.985618 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985627 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985633 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.985638 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985643 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.985648 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985653 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.985658 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985663 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.985668 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985674 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985679 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985685 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985690 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:09.985695 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:09.985700 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004104 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004121 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004160 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004166 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004213 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004220 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004258 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004264 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004323 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004330 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004362 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004367 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004400 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004406 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004437 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004441 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004473 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004478 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004509 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004515 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004548 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004554 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004585 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004591 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004635 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004642 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004689 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004695 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004727 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004733 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004765 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004770 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004802 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004807 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004838 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004844 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004898 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004905 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004944 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004950 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.004992 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.004998 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005030 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005036 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005073 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005079 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005110 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005115 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005146 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005152 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005185 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005191 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005223 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005229 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005260 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005265 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005306 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005312 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005344 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005349 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005380 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005386 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005416 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005422 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005453 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005458 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005489 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005495 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005526 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005531 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005564 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005570 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005603 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005609 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005639 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005645 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005676 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005682 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005712 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005718 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005749 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005754 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005789 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005796 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005826 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005832 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005864 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005869 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005901 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005906 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005938 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005943 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.005976 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.005982 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006013 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006019 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006050 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006055 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006087 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006092 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006125 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006131 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006163 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006169 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006207 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006213 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006245 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006250 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006281 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006287 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006317 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006323 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006353 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006363 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006397 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006403 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006451 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006461 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006514 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006524 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006579 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006588 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006643 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006653 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006730 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006740 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006793 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006803 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006856 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006866 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006919 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006929 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.006980 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.006989 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007043 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007053 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007106 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007115 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007165 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007174 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007227 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007237 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007288 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007298 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007352 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007361 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007413 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007423 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007483 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007493 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007556 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007569 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007642 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007652 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007705 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007717 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007760 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007766 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007797 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007803 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007834 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007839 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007871 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007880 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007932 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007939 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.007986 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.007993 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008040 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008047 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008092 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008100 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008146 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008155 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008201 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008210 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008256 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008263 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008314 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008321 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008372 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008377 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008415 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008422 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008457 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008461 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008499 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008504 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008537 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008541 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008580 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008585 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008617 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008621 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008663 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008668 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0703 20:25:10.008700 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0703 20:25:10.008705 40913 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRecoversFromBadNesting (0.02s) PASS ok k8s.io/kops/protokube/pkg/gossip/dns/hosts 0.052s === RUN TestSerializeEmptyCluster --- PASS: TestSerializeEmptyCluster (0.01s) PASS ok k8s.io/kops/tests/codecs 0.026s === RUN TestKopsUpgrades --- PASS: TestKopsUpgrades (0.01s) === RUN TestKubernetesUpgrades --- PASS: TestKubernetesUpgrades (0.00s) === RUN TestFindImage --- PASS: TestFindImage (0.00s) === RUN TestRecommendedKubernetesVersion --- PASS: TestRecommendedKubernetesVersion (0.00s) === RUN TestOrdering --- PASS: TestOrdering (0.00s) === RUN TestChannelsSelfConsistent --- PASS: TestChannelsSelfConsistent (0.02s) === RUN TestChannelImages === RUN TestChannelImages/stable-channel === RUN TestChannelImages/alpha-channel --- PASS: TestChannelImages (0.00s) --- PASS: TestChannelImages/stable-channel (0.00s) --- PASS: TestChannelImages/alpha-channel (0.00s) PASS ok k8s.io/kops/tests/integration/channel 0.053s === RUN TestConversionMinimal === RUN TestConversionMinimal/legacy-v1alpha2-v1alpha2 --- PASS: TestConversionMinimal (0.01s) --- PASS: TestConversionMinimal/legacy-v1alpha2-v1alpha2 (0.01s) PASS ok k8s.io/kops/tests/integration/conversion 0.032s === RUN Test_tryResourceAsString --- PASS: Test_tryResourceAsString (0.00s) === RUN Test_DryrunTarget_PrintReport --- PASS: Test_DryrunTarget_PrintReport (0.00s) === RUN TestWriteFile I0703 20:25:12.166870 42746 files.go:57] Writing file "/tmp/TestWriteFile1133590787/001/SubDir/test1.tmp" I0703 20:25:12.166963 42746 files.go:113] Changing file mode for "/tmp/TestWriteFile1133590787/001/SubDir/test1.tmp" to -rw-r--r-- --- PASS: TestWriteFile (0.00s) === RUN TestBigInt_Format --- PASS: TestBigInt_Format (0.00s) === RUN TestVFSCAStoreRoundTrip --- PASS: TestVFSCAStoreRoundTrip (0.00s) === RUN TestAddItem === RUN TestAddItem/first_primary === RUN TestAddItem/first_secondary === RUN TestAddItem/firstBigSerial_primary === RUN TestAddItem/firstBigSerial_secondary === RUN TestAddItem/after_primary === RUN TestAddItem/after_secondary === RUN TestAddItem/bigSerialAfter_primary === RUN TestAddItem/bigSerialAfter_secondary === RUN TestAddItem/before_primary === RUN TestAddItem/before_secondary === RUN TestAddItem/first_certonly_primary === RUN TestAddItem/first_certonly_secondary === RUN TestAddItem/after_certonly_primary === RUN TestAddItem/after_certonly_secondary === RUN TestAddItem/before_certonly_primary === RUN TestAddItem/before_certonly_secondary --- PASS: TestAddItem (0.00s) --- PASS: TestAddItem/first_primary (0.00s) --- PASS: TestAddItem/first_secondary (0.00s) --- PASS: TestAddItem/firstBigSerial_primary (0.00s) --- PASS: TestAddItem/firstBigSerial_secondary (0.00s) --- PASS: TestAddItem/after_primary (0.00s) --- PASS: TestAddItem/after_secondary (0.00s) --- PASS: TestAddItem/bigSerialAfter_primary (0.00s) --- PASS: TestAddItem/bigSerialAfter_secondary (0.00s) --- PASS: TestAddItem/before_primary (0.00s) --- PASS: TestAddItem/before_secondary (0.00s) --- PASS: TestAddItem/first_certonly_primary (0.00s) --- PASS: TestAddItem/first_certonly_secondary (0.00s) --- PASS: TestAddItem/after_certonly_primary (0.00s) --- PASS: TestAddItem/after_certonly_secondary (0.00s) --- PASS: TestAddItem/before_certonly_primary (0.00s) --- PASS: TestAddItem/before_certonly_secondary (0.00s) PASS ok k8s.io/kops/upup/pkg/fi 0.030s === RUN TestBootstrapChannelBuilder_BuildTasks I0703 20:25:16.512664 43123 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:16.512875 43123 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:16.512915 43123 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:16.512942 43123 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:16.512972 43123 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:16.513016 43123 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:16.513041 43123 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:16.513052 43123 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:16.513078 43123 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:16.513096 43123 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:16.518190 43123 zones.go:93] ListHostedZonesPages { } I0703 20:25:16.574298 43123 zones.go:93] ListHostedZonesPages { } I0703 20:25:16.676657 43123 zones.go:93] ListHostedZonesPages { } I0703 20:25:16.817696 43123 zones.go:93] ListHostedZonesPages { } I0703 20:25:16.964794 43123 zones.go:93] ListHostedZonesPages { } I0703 20:25:17.059412 43123 zones.go:93] ListHostedZonesPages { } I0703 20:25:17.173893 43123 zones.go:93] ListHostedZonesPages { } I0703 20:25:17.341393 43123 zones.go:93] ListHostedZonesPages { } I0703 20:25:17.941870 43123 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_BuildTasks (1.56s) === RUN TestBootstrapChannelBuilder_ServiceAccountIAM I0703 20:25:18.076060 43123 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:18.076251 43123 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:18.076316 43123 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:18.076362 43123 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:18.076395 43123 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:18.076435 43123 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:18.076470 43123 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:18.076493 43123 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:18.076530 43123 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:18.076554 43123 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:18.076579 43123 featureflag.go:167] Unknown FeatureFlag "+UseServiceAccountExternalPermissions" I0703 20:25:18.078090 43123 zones.go:93] ListHostedZonesPages { } I0703 20:25:18.238460 43123 featureflag.go:167] Unknown FeatureFlag "-UseServiceAccountExternalPermissions" --- PASS: TestBootstrapChannelBuilder_ServiceAccountIAM (0.16s) === RUN TestBootstrapChannelBuilder_AWSCloudController I0703 20:25:18.238718 43123 featureflag.go:164] FeatureFlag "ImageDigest"=false I0703 20:25:18.238915 43123 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:18.238980 43123 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0703 20:25:18.239030 43123 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0703 20:25:18.239067 43123 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0703 20:25:18.239111 43123 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0703 20:25:18.239147 43123 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0703 20:25:18.239176 43123 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0703 20:25:18.239211 43123 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0703 20:25:18.239234 43123 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0703 20:25:18.240746 43123 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_AWSCloudController (0.12s) === RUN TestContainerdVersionUrl === RUN TestContainerdVersionUrl/1.4.1- === RUN TestContainerdVersionUrl/1.4.1-arm === RUN TestContainerdVersionUrl/-amd64 === RUN TestContainerdVersionUrl/-arm64 === RUN TestContainerdVersionUrl/1.1.1-amd64 === RUN TestContainerdVersionUrl/1.1.1-arm64 === RUN TestContainerdVersionUrl/1.6.5-amd64 === RUN TestContainerdVersionUrl/1.5.5-arm64 --- PASS: TestContainerdVersionUrl (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1- (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-arm (0.00s) --- PASS: TestContainerdVersionUrl/-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.6.5-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.5.5-arm64 (0.00s) === RUN TestDeepValidate_OK --- PASS: TestDeepValidate_OK (0.00s) === RUN TestDeepValidate_NoNodeZones --- PASS: TestDeepValidate_NoNodeZones (0.00s) === RUN TestDeepValidate_NoMasterZones --- PASS: TestDeepValidate_NoMasterZones (0.00s) === RUN TestDeepValidate_BadZone deepvalidate_test.go:58: Zone validation not checked by DeepValidate --- SKIP: TestDeepValidate_BadZone (0.00s) === RUN TestDeepValidate_MixedRegion deepvalidate_test.go:70: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_MixedRegion (0.00s) === RUN TestDeepValidate_RegionAsZone deepvalidate_test.go:84: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_RegionAsZone (0.00s) === RUN TestDeepValidate_NotIncludedZone --- PASS: TestDeepValidate_NotIncludedZone (0.00s) === RUN TestDeepValidate_DuplicateZones --- PASS: TestDeepValidate_DuplicateZones (0.00s) === RUN TestDeepValidate_ExtraMasterZone --- PASS: TestDeepValidate_ExtraMasterZone (0.00s) === RUN TestDeepValidate_EvenEtcdClusterSize --- PASS: TestDeepValidate_EvenEtcdClusterSize (0.00s) === RUN TestDeepValidate_MissingEtcdMember --- PASS: TestDeepValidate_MissingEtcdMember (0.00s) === RUN TestPopulateClusterSpec_Proxy --- PASS: TestPopulateClusterSpec_Proxy (0.00s) === RUN TestPrecreateDNSNames --- PASS: TestPrecreateDNSNames (0.00s) === RUN TestDockerVersionUrlHash === RUN TestDockerVersionUrlHash/19.03.13-amd64 === RUN TestDockerVersionUrlHash/19.03.13-arm64 === RUN TestDockerVersionUrlHash/18.06.3-amd64 === RUN TestDockerVersionUrlHash/18.06.3-arm64 === RUN TestDockerVersionUrlHash/17.03.1-amd64 === RUN TestDockerVersionUrlHash/17.03.1-arm64 --- PASS: TestDockerVersionUrlHash (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-arm64 (0.00s) === RUN TestDockerVersionUrl === RUN TestDockerVersionUrl/19.03.13- === RUN TestDockerVersionUrl/19.03.13-arm === RUN TestDockerVersionUrl/-amd64 === RUN TestDockerVersionUrl/-arm64 === RUN TestDockerVersionUrl/18.06.3-amd64 === RUN TestDockerVersionUrl/18.06.3-arm64 === RUN TestDockerVersionUrl/19.03.13-amd64 === RUN TestDockerVersionUrl/19.03.13-arm64 --- PASS: TestDockerVersionUrl (0.00s) --- PASS: TestDockerVersionUrl/19.03.13- (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm (0.00s) --- PASS: TestDockerVersionUrl/-amd64 (0.00s) --- PASS: TestDockerVersionUrl/-arm64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm64 (0.00s) === RUN TestDockerVersionHash === RUN TestDockerVersionHash/19.03.13- === RUN TestDockerVersionHash/19.03.13-arm === RUN TestDockerVersionHash/-amd64 === RUN TestDockerVersionHash/-arm64 === RUN TestDockerVersionHash/1.1.1-amd64 === RUN TestDockerVersionHash/1.1.1-arm64 === RUN TestDockerVersionHash/19.03.13-amd64 === RUN TestDockerVersionHash/19.03.13-arm64 --- PASS: TestDockerVersionHash (0.00s) --- PASS: TestDockerVersionHash/19.03.13- (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm (0.00s) --- PASS: TestDockerVersionHash/-amd64 (0.00s) --- PASS: TestDockerVersionHash/-arm64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-amd64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-arm64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm64 (0.00s) === RUN TestDockerVersionsHashesAmd64 docker_test.go:245: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesAmd64 (0.00s) === RUN TestDockerVersionsHashesArm64 docker_test.go:260: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesArm64 (0.00s) === RUN Test_FindCNIAssetFromEnvironmentVariable --- PASS: Test_FindCNIAssetFromEnvironmentVariable (0.00s) === RUN Test_FindCNIAssetFromDefaults122 --- PASS: Test_FindCNIAssetFromDefaults122 (0.20s) === RUN TestRemoveSharedPrefix --- PASS: TestRemoveSharedPrefix (0.00s) === RUN TestCreateEtcdCluster --- PASS: TestCreateEtcdCluster (0.00s) === RUN TestSetupNetworking W0703 20:25:18.579972 43123 new_cluster.go:1152] flannel UDP mode is not recommended; consider flannel-vxlan instead --- PASS: TestSetupNetworking (0.00s) === RUN TestDefaultImage --- PASS: TestDefaultImage (0.00s) === RUN TestPopulateCluster_Default_NoError --- PASS: TestPopulateCluster_Default_NoError (0.00s) === RUN TestPopulateCluster_Subnets === RUN TestPopulateCluster_Subnets/100.64.0.0/10 === RUN TestPopulateCluster_Subnets/10.0.0.0/9 === RUN TestPopulateCluster_Subnets/10.0.0.0/8 === RUN TestPopulateCluster_Subnets/::/0 --- PASS: TestPopulateCluster_Subnets (0.01s) --- PASS: TestPopulateCluster_Subnets/100.64.0.0/10 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/9 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/8 (0.00s) --- PASS: TestPopulateCluster_Subnets/::/0 (0.00s) === RUN TestPopulateCluster_Docker_Spec --- PASS: TestPopulateCluster_Docker_Spec (0.00s) === RUN TestPopulateCluster_StorageDefault --- PASS: TestPopulateCluster_StorageDefault (0.00s) === RUN TestPopulateCluster_EvictionHard --- PASS: TestPopulateCluster_EvictionHard (0.00s) === RUN TestPopulateCluster_Custom_CIDR --- PASS: TestPopulateCluster_Custom_CIDR (0.00s) === RUN TestPopulateCluster_IsolateMasters --- PASS: TestPopulateCluster_IsolateMasters (0.00s) === RUN TestPopulateCluster_IsolateMastersFalse --- PASS: TestPopulateCluster_IsolateMastersFalse (0.00s) === RUN TestPopulateCluster_Name_Required --- PASS: TestPopulateCluster_Name_Required (0.00s) === RUN TestPopulateCluster_Zone_Required --- PASS: TestPopulateCluster_Zone_Required (0.00s) === RUN TestPopulateCluster_NetworkCIDR_Required --- PASS: TestPopulateCluster_NetworkCIDR_Required (0.00s) === RUN TestPopulateCluster_NonMasqueradeCIDR_Required --- PASS: TestPopulateCluster_NonMasqueradeCIDR_Required (0.00s) === RUN TestPopulateCluster_CloudProvider_Required --- PASS: TestPopulateCluster_CloudProvider_Required (0.00s) === RUN TestPopulateCluster_APIServerCount --- PASS: TestPopulateCluster_APIServerCount (0.00s) === RUN TestPopulateCluster_AnonymousAuth --- PASS: TestPopulateCluster_AnonymousAuth (0.00s) === RUN TestPopulateCluster_DockerVersion --- PASS: TestPopulateCluster_DockerVersion (0.00s) === RUN TestPopulateCluster_KubeController_High_Enough_Version --- PASS: TestPopulateCluster_KubeController_High_Enough_Version (0.00s) === RUN TestPopulateInstanceGroup_Name_Required --- PASS: TestPopulateInstanceGroup_Name_Required (0.00s) === RUN TestPopulateInstanceGroup_Role_Required --- PASS: TestPopulateInstanceGroup_Role_Required (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision --- PASS: TestPopulateInstanceGroup_AddTaintsCollision (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision3 --- PASS: TestPopulateInstanceGroup_AddTaintsCollision3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard --- PASS: TestPopulateInstanceGroup_EvictionHard (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard3 --- PASS: TestPopulateInstanceGroup_EvictionHard3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard4 --- PASS: TestPopulateInstanceGroup_EvictionHard4 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard2 --- PASS: TestPopulateInstanceGroup_EvictionHard2 (0.00s) === RUN TestPopulateInstanceGroup_AddTaints --- PASS: TestPopulateInstanceGroup_AddTaints (0.00s) === RUN TestMachineArchitecture === RUN TestMachineArchitecture/t2.micro-amd64 === RUN TestMachineArchitecture/t3.micro-amd64 === RUN TestMachineArchitecture/a1.large-arm64 --- PASS: TestMachineArchitecture (0.00s) --- PASS: TestMachineArchitecture/t2.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/t3.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/a1.large-arm64 (0.00s) === RUN TestRuncVersionUrlHash === RUN TestRuncVersionUrlHash/1.100.0-amd64 === RUN TestRuncVersionUrlHash/1.100.0-arm64 === RUN TestRuncVersionUrlHash/1.1.0-amd64 === RUN TestRuncVersionUrlHash/1.1.0-arm64 --- PASS: TestRuncVersionUrlHash (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionUrl === RUN TestRuncVersionUrl/1.1.0- === RUN TestRuncVersionUrl/1.1.0-arm === RUN TestRuncVersionUrl/-amd64 === RUN TestRuncVersionUrl/-arm64 === RUN TestRuncVersionUrl/1.0.0-amd64 === RUN TestRuncVersionUrl/1.0.0-arm64 === RUN TestRuncVersionUrl/1.1.0-amd64 === RUN TestRuncVersionUrl/1.1.0-arm64 --- PASS: TestRuncVersionUrl (0.00s) --- PASS: TestRuncVersionUrl/1.1.0- (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm (0.00s) --- PASS: TestRuncVersionUrl/-amd64 (0.00s) --- PASS: TestRuncVersionUrl/-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm64 (0.00s) === RUN TestRuncVersionHash === RUN TestRuncVersionHash/1.1.0- === RUN TestRuncVersionHash/1.1.0-arm === RUN TestRuncVersionHash/-amd64 === RUN TestRuncVersionHash/-arm64 === RUN TestRuncVersionHash/1.0.0-amd64 === RUN TestRuncVersionHash/1.0.0-arm64 === RUN TestRuncVersionHash/1.100.0-amd64 === RUN TestRuncVersionHash/1.100.0-arm64 === RUN TestRuncVersionHash/1.1.0-amd64 === RUN TestRuncVersionHash/1.1.0-arm64 --- PASS: TestRuncVersionHash (0.00s) --- PASS: TestRuncVersionHash/1.1.0- (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm (0.00s) --- PASS: TestRuncVersionHash/-amd64 (0.00s) --- PASS: TestRuncVersionHash/-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionsHashesAmd64 runc_test.go:240: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesAmd64 (0.00s) === RUN TestRuncVersionsHashesArm64 runc_test.go:255: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesArm64 (0.00s) === RUN Test_AssignSubnets === RUN Test_AssignSubnets/test-1 === RUN Test_AssignSubnets/test-2 I0703 20:25:18.626799 43123 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-3 I0703 20:25:18.626878 43123 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet a I0703 20:25:18.626891 43123 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-4 I0703 20:25:18.626971 43123 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet b I0703 20:25:18.626984 43123 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-5 I0703 20:25:18.627052 43123 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-6 I0703 20:25:18.627117 43123 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-7 I0703 20:25:18.627184 43123 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0703 20:25:18.627203 43123 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-8 I0703 20:25:18.627266 43123 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0703 20:25:18.627285 43123 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-9 === RUN Test_AssignSubnets/test-10 I0703 20:25:18.627395 43123 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-11 === RUN Test_AssignSubnets/test-12 I0703 20:25:18.627498 43123 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-13 I0703 20:25:18.627601 43123 subnets.go:205] Assigned CIDR 10.0.0.0/14 to subnet a I0703 20:25:18.627618 43123 subnets.go:205] Assigned CIDR 10.4.0.0/14 to subnet b I0703 20:25:18.627626 43123 subnets.go:205] Assigned CIDR 10.8.0.0/14 to subnet c I0703 20:25:18.627642 43123 subnets.go:224] Assigned CIDR 10.32.0.0/11 to subnet a I0703 20:25:18.627659 43123 subnets.go:224] Assigned CIDR 10.64.0.0/11 to subnet b I0703 20:25:18.627667 43123 subnets.go:224] Assigned CIDR 10.96.0.0/11 to subnet b I0703 20:25:18.627678 43123 subnets.go:224] Assigned CIDR 10.128.0.0/11 to subnet c I0703 20:25:18.627691 43123 subnets.go:224] Assigned CIDR 10.160.0.0/11 to subnet c --- PASS: Test_AssignSubnets (0.00s) --- PASS: Test_AssignSubnets/test-1 (0.00s) --- PASS: Test_AssignSubnets/test-2 (0.00s) --- PASS: Test_AssignSubnets/test-3 (0.00s) --- PASS: Test_AssignSubnets/test-4 (0.00s) --- PASS: Test_AssignSubnets/test-5 (0.00s) --- PASS: Test_AssignSubnets/test-6 (0.00s) --- PASS: Test_AssignSubnets/test-7 (0.00s) --- PASS: Test_AssignSubnets/test-8 (0.00s) --- PASS: Test_AssignSubnets/test-9 (0.00s) --- PASS: Test_AssignSubnets/test-10 (0.00s) --- PASS: Test_AssignSubnets/test-11 (0.00s) --- PASS: Test_AssignSubnets/test-12 (0.00s) --- PASS: Test_AssignSubnets/test-13 (0.00s) === RUN Test_TemplateFunctions_CloudControllerConfigArgv === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller (0.00s) === RUN Test_KarpenterInstanceTypes I0703 20:25:18.628862 43123 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: Test_KarpenterInstanceTypes (0.00s) === RUN TestKopsFeatureEnabled === RUN TestKopsFeatureEnabled/Missing_feature === RUN TestKopsFeatureEnabled/Existing_feature I0703 20:25:18.629050 43123 featureflag.go:164] FeatureFlag "Scaleway"=true --- PASS: TestKopsFeatureEnabled (0.00s) --- PASS: TestKopsFeatureEnabled/Missing_feature (0.00s) --- PASS: TestKopsFeatureEnabled/Existing_feature (0.00s) === RUN Test_BuildMirroredAsset === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup --- PASS: Test_BuildMirroredAsset (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup (0.00s) === RUN TestValidateFull_Default_Validates --- PASS: TestValidateFull_Default_Validates (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_NoDot --- PASS: TestValidateFull_ClusterName_InvalidDNS_NoDot (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_Invalid --- PASS: TestValidateFull_ClusterName_InvalidDNS_Invalid (0.00s) === RUN TestValidateFull_ClusterName_Required --- PASS: TestValidateFull_ClusterName_Required (0.00s) === RUN TestValidateFull_UpdatePolicy_Valid === RUN TestValidateFull_UpdatePolicy_Valid/missing === RUN TestValidateFull_UpdatePolicy_Valid/automatic === RUN TestValidateFull_UpdatePolicy_Valid/external --- PASS: TestValidateFull_UpdatePolicy_Valid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/missing (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/automatic (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/external (0.00s) === RUN TestValidateFull_UpdatePolicy_Invalid === RUN TestValidateFull_UpdatePolicy_Invalid/empty === RUN TestValidateFull_UpdatePolicy_Invalid/populated --- PASS: TestValidateFull_UpdatePolicy_Invalid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/empty (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/populated (0.00s) === RUN Test_Validate_Kubenet_With_14 --- PASS: Test_Validate_Kubenet_With_14 (0.00s) === RUN TestValidate_ClusterName_Import --- PASS: TestValidate_ClusterName_Import (0.00s) === RUN TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity --- PASS: TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup 2.198s === RUN TestGetASGTagsToDelete --- PASS: TestGetASGTagsToDelete (0.00s) === RUN TestProcessCompare --- PASS: TestProcessCompare (0.00s) === RUN TestAutoscalingGroupTerraformRender I0703 20:25:16.503322 43124 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender197558764/001 I0703 20:25:16.503574 43124 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender197558764/001 I0703 20:25:16.503763 43124 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender197558764/001 --- PASS: TestAutoscalingGroupTerraformRender (0.00s) === RUN TestTGsARNsChunks --- PASS: TestTGsARNsChunks (0.00s) === RUN TestGetEBSVolumeTagsToDelete --- PASS: TestGetEBSVolumeTagsToDelete (0.00s) === RUN TestSharedEgressOnlyInternetGatewayDoesNotRename I0703 20:25:16.507809 43124 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0703 20:25:16.507890 43124 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0703 20:25:16.507914 43124 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] }], VpcId: "vpc-1" } I0703 20:25:16.508015 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.508100 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.508140 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.508156 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.508285 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:25:16.508311 43124 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0703 20:25:16.508356 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.508403 43124 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0703 20:25:16.508448 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0703 20:25:16.508483 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.508505 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.508527 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.508536 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.508553 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.508575 43124 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0703 20:25:16.508604 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedEgressOnlyInternetGatewayDoesNotRename (0.00s) === RUN TestElasticIPCreate I0703 20:25:16.508685 43124 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0703 20:25:16.508711 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.508763 43124 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0703 20:25:16.508785 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:25:16.508798 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.508813 43124 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0703 20:25:16.508847 43124 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0703 20:25:16.508960 43124 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0703 20:25:16.508996 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:25:16.509015 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.509037 43124 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0703 20:25:16.509083 43124 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:25:16.509162 43124 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "eip1" }] }] } I0703 20:25:16.509194 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:25:16.509208 43124 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedElasticIp", Value: "192.0.2.1" },{ Key: "AssociatedElasticIpAllocationId", Value: "eipalloc-1" }] } I0703 20:25:16.509230 43124 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0703 20:25:16.509267 43124 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0703 20:25:16.509290 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.509315 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.509324 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.509338 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.509352 43124 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0703 20:25:16.509374 43124 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0703 20:25:16.509403 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.509418 43124 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0703 20:25:16.509440 43124 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:25:16.509466 43124 address.go:120] DescribeAddresses: { Filters: [{ Name: "public-ip", Values: ["192.0.2.1"] }] } I0703 20:25:16.509481 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0703 20:25:16.509501 43124 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestElasticIPCreate (0.00s) === RUN TestSharedInternetGatewayDoesNotRename I0703 20:25:16.509538 43124 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0703 20:25:16.509557 43124 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0703 20:25:16.509570 43124 internetgateways.go:66] CreateInternetGateway: { } I0703 20:25:16.509578 43124 tags.go:42] CreateTags { Resources: ["igw-1"], Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] } I0703 20:25:16.509605 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.509627 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.509647 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.509655 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.509691 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:25:16.509705 43124 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0703 20:25:16.509724 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.509758 43124 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0703 20:25:16.509803 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0703 20:25:16.509858 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.509881 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.509902 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.509911 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.509928 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.509950 43124 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0703 20:25:16.509979 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedInternetGatewayDoesNotRename (0.00s) === RUN TestLaunchTemplateTerraformRender I0703 20:25:16.510373 43124 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender2465352227/001 I0703 20:25:16.510581 43124 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender2465352227/001 --- PASS: TestLaunchTemplateTerraformRender (0.00s) === RUN TestParseRemovalRule --- PASS: TestParseRemovalRule (0.00s) === RUN TestPortRemovalRule --- PASS: TestPortRemovalRule (0.00s) === RUN TestPortRemovalRule_Zero --- PASS: TestPortRemovalRule_Zero (0.00s) === RUN TestSecurityGroupCreate I0703 20:25:16.510892 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.510934 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.511011 43124 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0703 20:25:16.511047 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:25:16.511070 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.511094 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.511147 43124 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0703 20:25:16.511321 43124 securitygroups.go:40] CreateSecurityGroup: { Description: "Description", GroupName: "sg1", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "sg1" }] }], VpcId: "vpc-1" } I0703 20:25:16.511372 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0703 20:25:16.511401 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0703 20:25:16.511446 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.511480 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.511518 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.511529 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.511544 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.511558 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.511581 43124 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0703 20:25:16.511620 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSecurityGroupCreate (0.00s) === RUN Test_Subnet_ValidateRequired --- PASS: Test_Subnet_ValidateRequired (0.00s) === RUN Test_Subnet_CannotChangeSubnet --- PASS: Test_Subnet_CannotChangeSubnet (0.00s) === RUN TestSubnetCreate I0703 20:25:16.511752 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.511776 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.511842 43124 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0703 20:25:16.511866 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:25:16.511877 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.511891 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.511912 43124 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0703 20:25:16.511963 43124 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0703 20:25:16.511986 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:25:16.511998 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.512011 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0703 20:25:16.512059 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.512083 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.512107 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.512115 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.512128 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.512141 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.512159 43124 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0703 20:25:16.512187 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.512201 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSubnetCreate (0.00s) === RUN TestSubnetCreateIPv6 I0703 20:25:16.512267 43124 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0703 20:25:16.512289 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.512341 43124 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0703 20:25:16.512361 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:25:16.512373 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.512385 43124 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0703 20:25:16.512406 43124 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0703 20:25:16.512461 43124 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0703 20:25:16.512465 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.512568 43124 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0703 20:25:16.512601 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:25:16.512619 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.512634 43124 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0703 20:25:16.512689 43124 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0703 20:25:16.512716 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.512741 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.512749 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.512763 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.512776 43124 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0703 20:25:16.512880 43124 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0703 20:25:16.512965 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.512984 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.513023 43124 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6 (0.00s) === RUN TestSubnetCreateIPv6NetNum I0703 20:25:16.513119 43124 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0703 20:25:16.513147 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.513209 43124 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0703 20:25:16.513242 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:25:16.513257 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.513273 43124 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0703 20:25:16.513299 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.513350 43124 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0703 20:25:16.513367 43124 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0703 20:25:16.513476 43124 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0703 20:25:16.513509 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:25:16.513524 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.513539 43124 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0703 20:25:16.513593 43124 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0703 20:25:16.513619 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.513643 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.513653 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.513668 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.513682 43124 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0703 20:25:16.513705 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.513731 43124 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0703 20:25:16.513799 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.513816 43124 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6NetNum (0.00s) === RUN TestSharedSubnetCreateDoesNotCreateNew I0703 20:25:16.513853 43124 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "ExistingVPC" }] }] } I0703 20:25:16.513890 43124 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "ExistingSubnet" }] }], VpcId: "vpc-1" } I0703 20:25:16.513935 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.513959 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.513982 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.513992 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.514034 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:25:16.514049 43124 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0703 20:25:16.514071 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.514095 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.514166 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0703 20:25:16.514196 43124 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0703 20:25:16.514214 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0703 20:25:16.514257 43124 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0703 20:25:16.514280 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.514301 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.514309 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.514327 43124 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0703 20:25:16.514348 43124 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0703 20:25:16.514377 43124 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedSubnetCreateDoesNotCreateNew (0.00s) === RUN TestVPCCreate I0703 20:25:16.514428 43124 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.514460 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.514530 43124 vpcs.go:89] CreateVpc: { CidrBlock: "172.21.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0703 20:25:16.514559 43124 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0703 20:25:16.514576 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.514594 43124 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0703 20:25:16.514621 43124 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.514643 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0703 20:25:16.514666 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.514675 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.514687 43124 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0703 20:25:16.514700 43124 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestVPCCreate (0.00s) === RUN Test4758 --- PASS: Test4758 (0.00s) === RUN TestSharedVPCAdditionalCIDR I0703 20:25:16.514765 43124 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "172.22.0.0/16", VpcId: "vpc-1" } I0703 20:25:16.514805 43124 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.514827 43124 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc-1"] }] } I0703 20:25:16.514850 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0703 20:25:16.514860 43124 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0703 20:25:16.514878 43124 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestSharedVPCAdditionalCIDR (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awstasks 0.057s === RUN TestValidateRegion --- PASS: TestValidateRegion (0.00s) === RUN TestFindRegion --- PASS: TestFindRegion (0.00s) === RUN TestEC2TagSpecification === RUN TestEC2TagSpecification/No_tags === RUN TestEC2TagSpecification/simple_tag --- PASS: TestEC2TagSpecification (0.00s) --- PASS: TestEC2TagSpecification/No_tags (0.00s) --- PASS: TestEC2TagSpecification/simple_tag (0.00s) === RUN Test_GetResourceName32 --- PASS: Test_GetResourceName32 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awsup 0.043s === RUN TestZoneToLocation === RUN TestZoneToLocation/test_case_0 === RUN TestZoneToLocation/test_case_1 === RUN TestZoneToLocation/test_case_2 --- PASS: TestZoneToLocation (0.00s) --- PASS: TestZoneToLocation/test_case_0 (0.00s) --- PASS: TestZoneToLocation/test_case_1 (0.00s) --- PASS: TestZoneToLocation/test_case_2 (0.00s) === RUN TestZoneToAvailabilityZoneNumber === RUN TestZoneToAvailabilityZoneNumber/test_case_0 === RUN TestZoneToAvailabilityZoneNumber/test_case_1 === RUN TestZoneToAvailabilityZoneNumber/test_case_2 --- PASS: TestZoneToAvailabilityZoneNumber (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_0 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_1 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_2 (0.00s) === RUN TestFindEtcdStatus --- PASS: TestFindEtcdStatus (0.00s) === RUN TestGetCloudGroups --- PASS: TestGetCloudGroups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azure 0.027s === RUN TestDiskRenderAzure I0703 20:25:16.488213 43127 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRenderAzure (0.00s) === RUN TestDiskFind --- PASS: TestDiskFind (0.00s) === RUN TestDiskRun I0703 20:25:16.488697 43127 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRun (0.00s) === RUN TestDiskCheckChanges === RUN TestDiskCheckChanges/test_case_0 === RUN TestDiskCheckChanges/test_case_1 === RUN TestDiskCheckChanges/test_case_2 === RUN TestDiskCheckChanges/test_case_3 --- PASS: TestDiskCheckChanges (0.00s) --- PASS: TestDiskCheckChanges/test_case_0 (0.00s) --- PASS: TestDiskCheckChanges/test_case_1 (0.00s) --- PASS: TestDiskCheckChanges/test_case_2 (0.00s) --- PASS: TestDiskCheckChanges/test_case_3 (0.00s) === RUN TestLoadBalancerRenderAzure I0703 20:25:16.488949 43127 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRenderAzure (0.00s) === RUN TestLoadBalancerFind loadbalancer_test.go:124: *azuretasks.LoadBalancer {"Name":"loadbalancer","Lifecycle":"","ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Subnet":{"Name":"subnet","Lifecycle":"","ID":null,"ResourceGroup":null,"VirtualNetwork":null,"NatGateway":null,"NetworkSecurityGroup":null,"CIDR":null,"Shared":null},"External":true,"Tags":null,"ForAPIServer":false} --- PASS: TestLoadBalancerFind (0.00s) === RUN TestLoadBalancerRun I0703 20:25:16.489681 43127 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRun (0.00s) === RUN TestLoadBalancerCheckChanges === RUN TestLoadBalancerCheckChanges/test_case_0 === RUN TestLoadBalancerCheckChanges/test_case_1 === RUN TestLoadBalancerCheckChanges/test_case_2 === RUN TestLoadBalancerCheckChanges/test_case_3 --- PASS: TestLoadBalancerCheckChanges (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_0 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_1 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_2 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_3 (0.00s) === RUN TestPublicIPAddressRenderAzure I0703 20:25:16.489952 43127 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRenderAzure (0.00s) === RUN TestPublicIPAddressFind publicipaddress_test.go:102: *azuretasks.PublicIPAddress {"Name":"publicIPAddress","Lifecycle":"","ID":null,"ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Tags":null} --- PASS: TestPublicIPAddressFind (0.00s) === RUN TestPublicIPAddressRun I0703 20:25:16.490247 43127 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRun (0.00s) === RUN TestPublicIPAddressCheckChanges === RUN TestPublicIPAddressCheckChanges/test_case_0 === RUN TestPublicIPAddressCheckChanges/test_case_1 === RUN TestPublicIPAddressCheckChanges/test_case_2 === RUN TestPublicIPAddressCheckChanges/test_case_3 --- PASS: TestPublicIPAddressCheckChanges (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_0 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_1 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_2 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_3 (0.00s) === RUN TestResourceGroupRenderAzure I0703 20:25:16.490518 43127 resourcegroup.go:108] Creating a new Resource Group with name: rg I0703 20:25:16.490532 43127 resourcegroup.go:110] Updating a Resource Group with name: rg --- PASS: TestResourceGroupRenderAzure (0.00s) === RUN TestResourceGroupFind --- PASS: TestResourceGroupFind (0.00s) === RUN TestResourceGroupRun I0703 20:25:16.490744 43127 resourcegroup.go:108] Creating a new Resource Group with name: rg --- PASS: TestResourceGroupRun (0.00s) === RUN TestResourceGroupCheckChanges === RUN TestResourceGroupCheckChanges/test_case_0 === RUN TestResourceGroupCheckChanges/test_case_1 === RUN TestResourceGroupCheckChanges/test_case_2 === RUN TestResourceGroupCheckChanges/test_case_3 --- PASS: TestResourceGroupCheckChanges (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_0 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_1 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_2 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_3 (0.00s) === RUN TestRoleAssignmentRenderAzure --- PASS: TestRoleAssignmentRenderAzure (0.00s) === RUN TestRoleAssignmentFind --- PASS: TestRoleAssignmentFind (0.00s) === RUN TestRoleAssignmentFind_NoPrincipalID --- PASS: TestRoleAssignmentFind_NoPrincipalID (0.00s) === RUN TestRoleAssignmentCheckChanges === RUN TestRoleAssignmentCheckChanges/test_case_0 === RUN TestRoleAssignmentCheckChanges/test_case_1 === RUN TestRoleAssignmentCheckChanges/test_case_2 === RUN TestRoleAssignmentCheckChanges/test_case_3 --- PASS: TestRoleAssignmentCheckChanges (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_0 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_1 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_2 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_3 (0.00s) === RUN TestSubnetRenderAzure I0703 20:25:16.491318 43127 subnet.go:126] Creating a new Subnet with name: vnet --- PASS: TestSubnetRenderAzure (0.00s) === RUN TestSubnetFind --- PASS: TestSubnetFind (0.00s) === RUN TestSubnetCheckChanges === RUN TestSubnetCheckChanges/test_case_0 === RUN TestSubnetCheckChanges/test_case_1 === RUN TestSubnetCheckChanges/test_case_2 === RUN TestSubnetCheckChanges/test_case_3 --- PASS: TestSubnetCheckChanges (0.00s) --- PASS: TestSubnetCheckChanges/test_case_0 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_1 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_2 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_3 (0.00s) === RUN TestVirtualNetworkRenderAzure I0703 20:25:16.491586 43127 virtualnetwork.go:122] Creating a new Virtual Network with name: vnet --- PASS: TestVirtualNetworkRenderAzure (0.00s) === RUN TestVirtualNetworkFind --- PASS: TestVirtualNetworkFind (0.00s) === RUN TestVirtualNetworkRun I0703 20:25:16.491821 43127 virtualnetwork.go:122] Creating a new Virtual Network with name: rg --- PASS: TestVirtualNetworkRun (0.00s) === RUN TestVirtualNetworkCheckChanges === RUN TestVirtualNetworkCheckChanges/test_case_0 === RUN TestVirtualNetworkCheckChanges/test_case_1 === RUN TestVirtualNetworkCheckChanges/test_case_2 === RUN TestVirtualNetworkCheckChanges/test_case_3 --- PASS: TestVirtualNetworkCheckChanges (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_0 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_1 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_2 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_3 (0.00s) === RUN TestSubnetIDParse --- PASS: TestSubnetIDParse (0.00s) === RUN TestLoadBalancerIDParse --- PASS: TestLoadBalancerIDParse (0.00s) === RUN TestVMScaleSetRenderAzure I0703 20:25:16.492246 43127 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRenderAzure (0.00s) === RUN TestVMScaleSetFind --- PASS: TestVMScaleSetFind (0.00s) === RUN TestVMScaleSetRun I0703 20:25:16.492528 43127 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRun (0.00s) === RUN TestVMScaleSetCheckChanges === RUN TestVMScaleSetCheckChanges/test_case_0 === RUN TestVMScaleSetCheckChanges/test_case_1 === RUN TestVMScaleSetCheckChanges/test_case_2 === RUN TestVMScaleSetCheckChanges/test_case_3 --- PASS: TestVMScaleSetCheckChanges (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_0 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_1 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_2 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_3 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azuretasks 0.035s === RUN Test_Find === RUN Test_Find/successfully_found_volume === RUN Test_Find/no_volume_found === RUN Test_Find/error_from_server --- PASS: Test_Find (0.00s) --- PASS: Test_Find/successfully_found_volume (0.00s) --- PASS: Test_Find/no_volume_found (0.00s) --- PASS: Test_Find/error_from_server (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/dotasks 0.026s === RUN TestProjectIAMBinding I0703 20:25:16.511094 43129 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.511573 43129 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0703 20:25:16.511588 43129 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.511889 43129 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0703 20:25:16.511906 43129 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.511995 43129 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestProjectIAMBinding (0.00s) === RUN TestServiceAccount I0703 20:25:16.512087 43129 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.512160 43129 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0703 20:25:16.512173 43129 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.512240 43129 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0703 20:25:16.512255 43129 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.512283 43129 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestServiceAccount (0.00s) === RUN TestStorageBucketIAM I0703 20:25:16.512340 43129 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.512488 43129 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0703 20:25:16.512500 43129 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.512679 43129 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0703 20:25:16.512696 43129 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0703 20:25:16.512761 43129 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestStorageBucketIAM (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/gcetasks 0.055s === RUN Test_OpenstackCloud_MakeCloud === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value --- PASS: Test_OpenstackCloud_MakeCloud (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value (0.00s) === RUN Test_OpenstackCloud_GetApiIngressStatus === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled --- PASS: Test_OpenstackCloud_GetApiIngressStatus (0.01s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled (0.00s) === RUN Test_BuildClients === RUN Test_BuildClients/Empty_openstack_spec_means_no_load_balancer === RUN Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned === RUN Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned === RUN Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned === RUN Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled --- PASS: Test_BuildClients (0.00s) --- PASS: Test_BuildClients/Empty_openstack_spec_means_no_load_balancer (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled (0.00s) === RUN Test_WaitForStatusActiveIsSuccessful --- PASS: Test_WaitForStatusActiveIsSuccessful (1.00s) === RUN Test_WaitForStatusActiveResultsInInstanceNotFound --- PASS: Test_WaitForStatusActiveResultsInInstanceNotFound (1.00s) === RUN Test_WaitForStatusActiveResultsInUnableToCreateServer --- PASS: Test_WaitForStatusActiveResultsInUnableToCreateServer (1.00s) === RUN Test_WaitForStatusActiveResultsInTimeout --- PASS: Test_WaitForStatusActiveResultsInTimeout (1.00s) === RUN TestGetMetadataFromMetadataServiceReturnsNotFoundError --- PASS: TestGetMetadataFromMetadataServiceReturnsNotFoundError (0.00s) === RUN TestGetMetadataFromMetadataService --- PASS: TestGetMetadataFromMetadataService (0.00s) === RUN TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound --- PASS: TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound (0.00s) === RUN TestGetMetadataFromConfigDrive --- PASS: TestGetMetadataFromConfigDrive (0.00s) === RUN TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound --- PASS: TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound (0.00s) === RUN TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenConfigDriveFails --- PASS: TestGetMetadataFromServiceEndpointWhenConfigDriveFails (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromConfigDriveWhenServiceEndpointFails --- PASS: TestGetMetadataFromConfigDriveWhenServiceEndpointFails (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstack 4.056s === RUN TestFilterPortsReturnsAllPorts --- PASS: TestFilterPortsReturnsAllPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPort --- PASS: TestFilterPortsReturnsOnlyTaggedPort (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPorts --- PASS: TestFilterPortsReturnsOnlyTaggedPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername --- PASS: TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil (0.00s) === RUN Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges --- PASS: Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges (0.00s) === RUN Test_Port_GetDependencies --- PASS: Test_Port_GetDependencies (0.00s) === RUN Test_NewPortTaskFromCloud === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs --- PASS: Test_NewPortTaskFromCloud (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs (0.00s) === RUN Test_Port_Find === RUN Test_Port_Find/nothing_found === RUN Test_Port_Find/port_found_no_tags === RUN Test_Port_Find/port_found_with_tags === RUN Test_Port_Find/multiple_ports_found === RUN Test_Port_Find/error_listing_ports === RUN Test_Port_Find/port_found_with_allowed_address_pairs --- PASS: Test_Port_Find (0.00s) --- PASS: Test_Port_Find/nothing_found (0.00s) --- PASS: Test_Port_Find/port_found_no_tags (0.00s) --- PASS: Test_Port_Find/port_found_with_tags (0.00s) --- PASS: Test_Port_Find/multiple_ports_found (0.00s) --- PASS: Test_Port_Find/error_listing_ports (0.00s) --- PASS: Test_Port_Find/port_found_with_allowed_address_pairs (0.00s) === RUN Test_Port_CheckChanges === RUN Test_Port_CheckChanges/actual_nil_all_required_fields_set === RUN Test_Port_CheckChanges/actual_nil_required_field_Name_nil === RUN Test_Port_CheckChanges/actual_nil_required_field_Network_nil === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set --- PASS: Test_Port_CheckChanges (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_all_required_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Name_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Network_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set (0.00s) === RUN Test_Port_RenderOpenstack === RUN Test_Port_RenderOpenstack/actual_not_nil === RUN Test_Port_RenderOpenstack/actual_nil_success === RUN Test_Port_RenderOpenstack/actual_nil_cloud_error === RUN Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success --- PASS: Test_Port_RenderOpenstack (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_not_nil (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_success (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_cloud_error (0.00s) --- PASS: Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success (0.00s) === RUN Test_Port_createOptsFromPortTask === RUN Test_Port_createOptsFromPortTask/all_fields_set === RUN Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups --- PASS: Test_Port_createOptsFromPortTask (0.00s) --- PASS: Test_Port_createOptsFromPortTask/all_fields_set (0.00s) --- PASS: Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstacktasks 0.043s === RUN TestCreateValidScalewayProfile === RUN TestCreateValidScalewayProfile/Only_environment_set === RUN TestCreateValidScalewayProfile/Only_profile_set === RUN TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID === RUN TestCreateValidScalewayProfile/Environment_should_override_whole_profile === RUN TestCreateValidScalewayProfile/Empty_profile_for_integration_tests --- PASS: TestCreateValidScalewayProfile (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_environment_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_profile_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_whole_profile (0.00s) --- PASS: TestCreateValidScalewayProfile/Empty_profile_for_integration_tests (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/scaleway 0.028s === RUN TestWriteLocalsOutputs === RUN TestWriteLocalsOutputs/empty_map === RUN TestWriteLocalsOutputs/single_output === RUN TestWriteLocalsOutputs/list_output --- PASS: TestWriteLocalsOutputs (0.00s) --- PASS: TestWriteLocalsOutputs/empty_map (0.00s) --- PASS: TestWriteLocalsOutputs/single_output (0.00s) --- PASS: TestWriteLocalsOutputs/list_output (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraform 0.026s === RUN TestGetOutputs === RUN TestGetOutputs/empty_map === RUN TestGetOutputs/single_output === RUN TestGetOutputs/list_output === RUN TestGetOutputs/duplicate_names === RUN TestGetOutputs/duplicate_values --- PASS: TestGetOutputs (0.00s) --- PASS: TestGetOutputs/empty_map (0.00s) --- PASS: TestGetOutputs/single_output (0.00s) --- PASS: TestGetOutputs/list_output (0.00s) --- PASS: TestGetOutputs/duplicate_names (0.00s) --- PASS: TestGetOutputs/duplicate_values (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter 0.005s === RUN TestKeypairDeps --- PASS: TestKeypairDeps (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/fitasks 0.026s === RUN TestArchiveDependencies --- PASS: TestArchiveDependencies (0.00s) === RUN TestBindMountCommands I0703 20:25:16.513939 43137 bindmount.go:223] running mount command [mount --bind /containerized_mounter /containerized_mounter] I0703 20:25:16.513992 43137 bindmount.go:232] running mount command [mount -o remount,exec /containerized_mounter] I0703 20:25:16.513999 43137 bindmount.go:223] running mount command [mount --rbind /var/lib/kubelet/ /containerized_mounter/rootfs/var/lib/kubelet] I0703 20:25:16.514006 43137 bindmount.go:243] running mount command [mount --make-rshared /containerized_mounter/rootfs/var/lib/kubelet] I0703 20:25:16.514013 43137 bindmount.go:223] running mount command [mount --bind -o ro /proc /containerized_mounter/rootfs/proc] I0703 20:25:16.514020 43137 bindmount.go:223] running mount command [mount --bind -o ro /dev /containerized_mounter/rootfs/dev] I0703 20:25:16.514026 43137 bindmount.go:223] running mount command [mount --bind -o ro /etc/resolv.conf /containerized_mounter/rootfs/etc/resolv.conf] --- PASS: TestBindMountCommands (0.00s) === RUN TestBindMountDependencies --- PASS: TestBindMountDependencies (0.00s) === RUN TestFileDependencies === RUN TestFileDependencies/user === RUN TestFileDependencies/parentDir === RUN TestFileDependencies/afterFiles --- PASS: TestFileDependencies (0.00s) --- PASS: TestFileDependencies/user (0.00s) --- PASS: TestFileDependencies/parentDir (0.00s) --- PASS: TestFileDependencies/afterFiles (0.00s) === RUN TestIssueCertFileDependencies --- PASS: TestIssueCertFileDependencies (0.00s) === RUN TestLoadImageTask_Deps --- PASS: TestLoadImageTask_Deps (0.00s) === RUN TestServiceTask_Deps --- PASS: TestServiceTask_Deps (0.00s) === RUN TestServiceTask_UnknownTypes W0703 20:25:16.514369 43137 service.go:110] Unhandled type *nodetasks.FakeTask in Service::GetDependencies: &{} --- PASS: TestServiceTask_UnknownTypes (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/nodeup/nodetasks 0.056s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) === RUN TestStringSlicesEqualIgnoreOrder --- PASS: TestStringSlicesEqualIgnoreOrder (0.00s) === RUN TestHashString --- PASS: TestHashString (0.00s) === RUN TestSanitizeString --- PASS: TestSanitizeString (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/utils 0.004s === RUN TestFindDistribution --- PASS: TestFindDistribution (0.00s) PASS ok k8s.io/kops/util/pkg/distributions 0.005s === RUN TestWithTee --- PASS: TestWithTee (0.00s) PASS ok k8s.io/kops/util/pkg/exec 0.004s === RUN TestNewHasher === RUN TestNewHasher/sha256 === RUN TestNewHasher/sha1 === RUN TestNewHasher/md5 --- PASS: TestNewHasher (0.00s) --- PASS: TestNewHasher/sha256 (0.00s) --- PASS: TestNewHasher/sha1 (0.00s) --- PASS: TestNewHasher/md5 (0.00s) === RUN TestMemberFromString === RUN TestMemberFromString/sha256_1 === RUN TestMemberFromString/sha256_2 === RUN TestMemberFromString/sha256_3 === RUN TestMemberFromString/sha1_1 === RUN TestMemberFromString/sha1_2 === RUN TestMemberFromString/sha1_3 === RUN TestMemberFromString/md5_1 === RUN TestMemberFromString/md5_2 === RUN TestMemberFromString/md5_3 --- PASS: TestMemberFromString (0.00s) --- PASS: TestMemberFromString/sha256_1 (0.00s) --- PASS: TestMemberFromString/sha256_2 (0.00s) --- PASS: TestMemberFromString/sha256_3 (0.00s) --- PASS: TestMemberFromString/sha1_1 (0.00s) --- PASS: TestMemberFromString/sha1_2 (0.00s) --- PASS: TestMemberFromString/sha1_3 (0.00s) --- PASS: TestMemberFromString/md5_1 (0.00s) --- PASS: TestMemberFromString/md5_2 (0.00s) --- PASS: TestMemberFromString/md5_3 (0.00s) === RUN TestFromString === RUN TestFromString/sha256 === RUN TestFromString/sha1 === RUN TestFromString/md5 === RUN TestFromString/unknown --- PASS: TestFromString (0.00s) --- PASS: TestFromString/sha256 (0.00s) --- PASS: TestFromString/sha1 (0.00s) --- PASS: TestFromString/md5 (0.00s) --- PASS: TestFromString/unknown (0.00s) PASS ok k8s.io/kops/util/pkg/hashing 0.005s === RUN TestKeys --- PASS: TestKeys (0.00s) === RUN TestSortedKeys --- PASS: TestSortedKeys (0.00s) PASS ok k8s.io/kops/util/pkg/maps 0.006s === RUN TestGetProxyEnvVars W0703 20:25:16.484543 43143 proxy.go:34] EgressProxy set but no proxy host provided --- PASS: TestGetProxyEnvVars (0.00s) PASS ok k8s.io/kops/util/pkg/proxy 0.024s === RUN TestSet === RUN TestSet/simple_setting === RUN TestSet/setting_with_wildcard === RUN TestSet/creating_missing_objects === RUN TestSet/set_int === RUN TestSet/set_int32 === RUN TestSet/set_int64 === RUN TestSet/set_int_pointer === RUN TestSet/set_int32_pointer === RUN TestSet/set_int64_pointer === RUN TestSet/set_enum === RUN TestSet/set_enum_slice === RUN TestSet/append_enum_slice === RUN TestSet/set_env_var === RUN TestSet/set_env_var_with_val === RUN TestSet/set_duration --- PASS: TestSet (0.00s) --- PASS: TestSet/simple_setting (0.00s) --- PASS: TestSet/setting_with_wildcard (0.00s) --- PASS: TestSet/creating_missing_objects (0.00s) --- PASS: TestSet/set_int (0.00s) --- PASS: TestSet/set_int32 (0.00s) --- PASS: TestSet/set_int64 (0.00s) --- PASS: TestSet/set_int_pointer (0.00s) --- PASS: TestSet/set_int32_pointer (0.00s) --- PASS: TestSet/set_int64_pointer (0.00s) --- PASS: TestSet/set_enum (0.00s) --- PASS: TestSet/set_enum_slice (0.00s) --- PASS: TestSet/append_enum_slice (0.00s) --- PASS: TestSet/set_env_var (0.00s) --- PASS: TestSet/set_env_var_with_val (0.00s) --- PASS: TestSet/set_duration (0.00s) === RUN TestSetInvalidPath === RUN TestSetInvalidPath/setting_with_wildcard === RUN TestSetInvalidPath/creating_missing_objects === RUN TestSetInvalidPath/set_int === RUN TestSetInvalidPath/set_int32 === RUN TestSetInvalidPath/set_int64 --- PASS: TestSetInvalidPath (0.00s) --- PASS: TestSetInvalidPath/setting_with_wildcard (0.00s) --- PASS: TestSetInvalidPath/creating_missing_objects (0.00s) --- PASS: TestSetInvalidPath/set_int (0.00s) --- PASS: TestSetInvalidPath/set_int32 (0.00s) --- PASS: TestSetInvalidPath/set_int64 (0.00s) === RUN TestUnset === RUN TestUnset/simple_unsetting === RUN TestUnset/unsetting_with_wildcard === RUN TestUnset/uset_int === RUN TestUnset/unset_int32 === RUN TestUnset/unset_int64 === RUN TestUnset/unset_int_pointer === RUN TestUnset/unset_int32_pointer === RUN TestUnset/unset_int64_pointer === RUN TestUnset/unset_enum === RUN TestUnset/unset_enum_slice --- PASS: TestUnset (0.00s) --- PASS: TestUnset/simple_unsetting (0.00s) --- PASS: TestUnset/unsetting_with_wildcard (0.00s) --- PASS: TestUnset/uset_int (0.00s) --- PASS: TestUnset/unset_int32 (0.00s) --- PASS: TestUnset/unset_int64 (0.00s) --- PASS: TestUnset/unset_int_pointer (0.00s) --- PASS: TestUnset/unset_int32_pointer (0.00s) --- PASS: TestUnset/unset_int64_pointer (0.00s) --- PASS: TestUnset/unset_enum (0.00s) --- PASS: TestUnset/unset_enum_slice (0.00s) === RUN TestUnsetInvalidPath === RUN TestUnsetInvalidPath/usetting_with_wildcard === RUN TestUnsetInvalidPath/missing_objects --- PASS: TestUnsetInvalidPath (0.00s) --- PASS: TestUnsetInvalidPath/usetting_with_wildcard (0.00s) --- PASS: TestUnsetInvalidPath/missing_objects (0.00s) === RUN TestParseFieldPath === RUN TestParseFieldPath/test_Spec.Containers.Image === RUN TestParseFieldPath/test_Spec.Containers[0].Image === RUN TestParseFieldPath/test_Spec.Containers[*].Image --- PASS: TestParseFieldPath (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers.Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[0].Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[*].Image (0.00s) === RUN Test_Merge --- PASS: Test_Merge (0.00s) PASS ok k8s.io/kops/util/pkg/reflectutils 0.024s === RUN TestGetUniqueStrings --- PASS: TestGetUniqueStrings (0.00s) === RUN TestContains --- PASS: TestContains (0.00s) PASS ok k8s.io/kops/util/pkg/slice 0.004s === RUN TestSplitToSections --- PASS: TestSplitToSections (0.00s) PASS ok k8s.io/kops/util/pkg/text 0.004s === RUN TestAzureBlobPathBase === RUN TestAzureBlobPathBase/Test_case_0 === RUN TestAzureBlobPathBase/Test_case_1 === RUN TestAzureBlobPathBase/Test_case_2 --- PASS: TestAzureBlobPathBase (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_2 (0.00s) === RUN TestAzureBlobPathPath === RUN TestAzureBlobPathPath/Test_case_0 === RUN TestAzureBlobPathPath/Test_case_1 === RUN TestAzureBlobPathPath/Test_case_2 --- PASS: TestAzureBlobPathPath (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_2 (0.00s) === RUN TestAzureBlobPathJoin --- PASS: TestAzureBlobPathJoin (0.00s) === RUN TestCreateFile --- PASS: TestCreateFile (0.00s) === RUN TestWriteTo --- PASS: TestWriteTo (0.00s) === RUN TestMemFsCreateFile --- PASS: TestMemFsCreateFile (0.00s) === RUN TestMemFsReadDir --- PASS: TestMemFsReadDir (0.00s) === RUN TestMemFsReadTree --- PASS: TestMemFsReadTree (0.00s) === RUN Test_VFSPath --- PASS: Test_VFSPath (0.00s) === RUN Test_S3Path_Parse --- PASS: Test_S3Path_Parse (0.00s) PASS ok k8s.io/kops/util/pkg/vfs 0.024s === RUN TestGSRenderTerraform === RUN TestGSRenderTerraform/gs://foo/bar --- PASS: TestGSRenderTerraform (0.00s) --- PASS: TestGSRenderTerraform/gs://foo/bar (0.00s) === RUN TestS3RenderTerraform === RUN TestS3RenderTerraform/s3://foo/bar W0703 20:25:20.410002 43587 s3context.go:235] Unable to read bucket encryption policy for "foo" in region "us-east-1": will encrypt using AES256 --- PASS: TestS3RenderTerraform (0.00s) --- PASS: TestS3RenderTerraform/s3://foo/bar (0.00s) PASS ok k8s.io/kops/util/pkg/vfs/tests 0.048s >>> kops: Entering fakeroot... >>> kops*: Running postcheck for kops >>> kops*: Preparing package kops... >>> kops*: Stripping binaries >>> kops*: Scanning shared objects >>> kops*: Tracing dependencies... >>> kops*: Package size: 147.7 MB >>> kops*: Compressing data... >>> kops*: Create checksum... >>> kops*: Create kops-1.28.4-r5.apk >>> kops: Build complete at Wed, 03 Jul 2024 20:28:09 +0000 elapsed time 0h 4m 57s >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Uninstalling dependencies... (1/5) Purging .makedepends-kops (20240703.202314) (2/5) Purging kubernetes (1.30.2-r1) (3/5) Purging go (1.22.5-r0) (4/5) Purging bash (5.2.26-r0) Executing bash-5.2.26-r0.pre-deinstall (5/5) Purging readline (8.2.10-r0) Executing busybox-1.36.1-r31.trigger OK: 378 MiB in 107 packages >>> kops: Updating the testing/x86_64 repository index... >>> kops: Signing the index...