>>> kops: Building testing/kops 1.28.4-r7 (using abuild 3.14.1-r6) started Mon, 17 Feb 2025 08:34:08 +0000 >>> kops: Validating /home/buildozer/aports/testing/kops/APKBUILD... >>> kops: Analyzing dependencies... >>> kops: Installing for build: build-base kubernetes go bash (1/4) Installing kubernetes (1.32.2-r0) (2/4) Installing go (1.23.6-r0) (3/4) Installing bash (5.2.37-r0) Executing bash-5.2.37-r0.post-install (4/4) Installing .makedepends-kops (20250217.083409) Executing busybox-1.37.0-r14.trigger OK: 583 MiB in 110 packages >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Cleaning up tmpdir >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32.7M 100 32.7M 0 0 54.8M 0 --:--:-- --:--:-- --:--:-- 54.9M >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz >>> kops: Checking sha512sums... kops-1.28.4.tar.gz: OK >>> kops: Unpacking /var/cache/distfiles/edge/kops-1.28.4.tar.gz... fatal: not a git repository (or any of the parent directories): .git mkdir -p /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64 GOOS=linux GOARCH=amd64 go build "-trimpath" -o /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64/kops -ldflags=all=" -X k8s.io/kops.Version=1.28.4 -X k8s.io/kops.GitVersion=" k8s.io/kops/cmd/kops go: downloading k8s.io/apimachinery v0.28.1 go: downloading k8s.io/klog/v2 v2.100.1 go: downloading k8s.io/client-go v0.28.1 go: downloading github.com/aws/amazon-ec2-instance-selector/v2 v2.4.1 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading github.com/aws/aws-sdk-go v1.49.24 go: downloading github.com/google/go-containerregistry v0.16.1 go: downloading github.com/spf13/viper v1.16.0 go: downloading github.com/spf13/cobra v1.7.0 go: downloading k8s.io/cli-runtime v0.28.1 go: downloading golang.org/x/crypto v0.14.0 go: downloading github.com/spf13/pflag v1.0.5 go: downloading helm.sh/helm/v3 v3.12.3 go: downloading k8s.io/api v0.28.1 go: downloading go.uber.org/multierr v1.11.0 go: downloading k8s.io/kubectl v0.28.1 go: downloading sigs.k8s.io/yaml v1.3.0 go: downloading github.com/cert-manager/cert-manager v1.12.3 go: downloading github.com/Masterminds/sprig/v3 v3.2.3 go: downloading github.com/scaleway/scaleway-sdk-go v1.0.0-beta.20.0.20230829075301-d16b548612e4 go: downloading k8s.io/klog v1.0.0 go: downloading golang.org/x/sync v0.3.0 go: downloading k8s.io/cloud-provider-aws v1.28.1 go: downloading github.com/apparentlymart/go-cidr v1.1.0 go: downloading github.com/Azure/azure-pipeline-go v0.2.3 go: downloading github.com/Azure/azure-storage-blob-go v0.15.0 go: downloading github.com/go-ini/ini v1.67.0 go: downloading github.com/gophercloud/gophercloud v1.6.0 go: downloading github.com/pkg/sftp v1.13.6 go: downloading golang.org/x/oauth2 v0.11.0 go: downloading google.golang.org/api v0.138.0 go: downloading github.com/MakeNowJust/heredoc/v2 v2.0.1 go: downloading github.com/MakeNowJust/heredoc v1.0.0 go: downloading golang.org/x/net v0.17.0 go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible go: downloading github.com/digitalocean/godo v1.102.1 go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b go: downloading github.com/hetznercloud/hcloud-go v1.50.0 go: downloading github.com/Azure/go-autorest/autorest v0.11.29 go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.12 go: downloading github.com/mitchellh/mapstructure v1.5.0 go: downloading k8s.io/mount-utils v0.28.1 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/Masterminds/goutils v1.1.1 go: downloading github.com/Masterminds/semver/v3 v3.2.1 go: downloading github.com/Azure/go-autorest v14.2.0+incompatible go: downloading github.com/google/uuid v1.3.1 go: downloading github.com/huandu/xstrings v1.4.0 go: downloading github.com/imdario/mergo v0.3.15 go: downloading github.com/mitchellh/copystructure v1.2.0 go: downloading github.com/shopspring/decimal v1.3.1 go: downloading github.com/spf13/cast v1.5.1 go: downloading github.com/fsnotify/fsnotify v1.6.0 go: downloading github.com/spf13/afero v1.9.5 go: downloading github.com/spf13/jwalterweatherman v1.1.0 go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/go-logr/logr v1.2.4 go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/evanphx/json-patch v5.6.0+incompatible go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.3.0 go: downloading github.com/google/gofuzz v1.2.0 go: downloading github.com/docker/cli v24.0.5+incompatible go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading google.golang.org/grpc v1.57.0 go: downloading github.com/spotinst/spotinst-sdk-go v1.145.0 go: downloading github.com/sergi/go-diff v1.3.1 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading gopkg.in/square/go-jose.v2 v2.6.0 go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 go: downloading github.com/pelletier/go-toml v1.9.5 go: downloading golang.org/x/exp v0.0.0-20230817173708-d852ddb80c63 go: downloading github.com/mattn/go-ieproxy v0.0.1 go: downloading github.com/pkg/errors v0.9.1 go: downloading gopkg.in/gcfg.v1 v1.2.3 go: downloading k8s.io/cloud-provider v0.28.0 go: downloading k8s.io/component-base v0.28.1 go: downloading k8s.io/csi-translation-lib v0.28.0 go: downloading github.com/chai2010/gettext-go v1.0.2 go: downloading github.com/mitchellh/go-wordwrap v1.0.1 go: downloading github.com/russross/blackfriday/v2 v2.1.0 go: downloading github.com/kr/fs v0.1.0 go: downloading golang.org/x/term v0.13.0 go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 go: downloading github.com/golang/protobuf v1.5.3 go: downloading github.com/google/gnostic-models v0.6.8 go: downloading golang.org/x/time v0.3.0 go: downloading github.com/google/go-querystring v1.1.0 go: downloading github.com/hashicorp/go-retryablehttp v0.7.4 go: downloading golang.org/x/sys v0.13.0 go: downloading github.com/prometheus/client_golang v1.16.0 go: downloading cloud.google.com/go/compute/metadata v0.2.3 go: downloading k8s.io/cloud-provider-gcp/providers v0.27.1 go: downloading cloud.google.com/go/compute v1.23.0 go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.22 go: downloading github.com/Azure/go-autorest/logger v0.2.1 go: downloading github.com/Azure/go-autorest/tracing v0.6.0 go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.5 go: downloading github.com/dimchansky/utfbom v1.1.1 go: downloading github.com/mitchellh/reflectwalk v1.0.2 go: downloading github.com/subosito/gotenv v1.4.2 go: downloading github.com/hashicorp/hcl v1.0.0 go: downloading gopkg.in/ini.v1 v1.67.0 go: downloading github.com/magiconair/properties v1.8.7 go: downloading github.com/pelletier/go-toml/v2 v2.0.8 go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible go: downloading github.com/charmbracelet/bubbles v0.13.0 go: downloading github.com/charmbracelet/bubbletea v0.21.0 go: downloading github.com/charmbracelet/lipgloss v0.5.0 go: downloading github.com/evertras/bubble-table v0.14.4 go: downloading github.com/muesli/termenv v0.11.1-0.20220212125758-44cd13922739 go: downloading github.com/moby/sys/mountinfo v0.6.2 go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de go: downloading golang.org/x/text v0.13.0 go: downloading sigs.k8s.io/kustomize/api v0.13.5-0.20230601165947-6ce0bf390ce3 go: downloading sigs.k8s.io/kustomize/kyaml v0.14.3-0.20230601165947-6ce0bf390ce3 go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/containerd/stargz-snapshotter/estargz v0.14.3 go: downloading github.com/docker/distribution v2.8.2+incompatible go: downloading github.com/docker/docker v24.0.5+incompatible go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading google.golang.org/protobuf v1.31.0 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20230807174057-1744710a1577 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading k8s.io/component-helpers v0.28.1 go: downloading github.com/moby/term v0.0.0-20221205130635-1aeaba878587 go: downloading github.com/prometheus/client_model v0.4.0 go: downloading github.com/prometheus/procfs v0.10.1 go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.2.0 go: downloading github.com/prometheus/common v0.44.0 go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 go: downloading github.com/GoogleCloudPlatform/k8s-cloud-provider v1.18.1-0.20220218231025-f11817397a1b go: downloading github.com/google/go-cmp v0.5.9 go: downloading github.com/oliveagle/jsonpath v0.0.0-20180606110733-2e52cf6e6852 go: downloading github.com/muesli/reflow v0.3.0 go: downloading github.com/sahilm/fuzzy v0.1.0 go: downloading github.com/atotto/clipboard v0.1.4 go: downloading github.com/mattn/go-runewidth v0.0.13 go: downloading github.com/lucasb-eyer/go-colorful v1.2.0 go: downloading github.com/containerd/console v1.0.3 go: downloading github.com/mattn/go-isatty v0.0.17 go: downloading github.com/muesli/ansi v0.0.0-20211018074035-2e021307bc4b go: downloading github.com/muesli/cancelreader v0.2.0 go: downloading github.com/go-openapi/swag v0.22.3 go: downloading github.com/go-openapi/jsonreference v0.20.2 go: downloading github.com/google/btree v1.0.1 go: downloading github.com/opencontainers/image-spec v1.1.0-rc4 go: downloading github.com/klauspost/compress v1.16.5 go: downloading github.com/vbatts/tar-split v0.11.3 go: downloading github.com/docker/docker-credential-helpers v0.8.0 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading github.com/containerd/containerd v1.7.5 go: downloading oras.land/oras-go v1.2.4-0.20230829103011-4d0bf161925b go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading github.com/exponent-io/jsonpath v0.0.0-20151013193312-d6023ce2651d go: downloading k8s.io/apiextensions-apiserver v0.28.0 go: downloading sigs.k8s.io/gateway-api v0.7.0 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 go: downloading github.com/googleapis/gax-go/v2 v2.12.0 go: downloading github.com/rivo/uniseg v0.2.0 go: downloading github.com/go-errors/errors v1.4.2 go: downloading github.com/go-openapi/jsonpointer v0.19.6 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/emicklei/go-restful/v3 v3.10.2 go: downloading github.com/google/s2a-go v0.1.5 go: downloading go.opencensus.io v0.24.0 go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 go: downloading github.com/xlab/treeprint v1.2.0 go: downloading github.com/moby/spdystream v0.2.0 go: downloading github.com/docker/go-units v0.5.0 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.2.5 go: downloading github.com/morikuni/aec v1.0.0 go: downloading github.com/jmespath/go-jmespath v0.4.0 go: downloading go.starlark.net v0.0.0-20230525235612-a134d8f9ddca go: downloading github.com/gorilla/mux v1.8.0 go: downloading github.com/docker/go-metrics v0.0.1 go: downloading google.golang.org/appengine v1.6.7 go: downloading github.com/moby/locker v1.0.1 go: downloading go.opentelemetry.io/otel/trace v1.15.0 go: downloading go.opentelemetry.io/otel v1.15.0 go: downloading github.com/go-logr/stdr v1.2.2 go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.1 fatal: not a git repository (or any of the parent directories): .git go test -v ./... go: downloading sigs.k8s.io/controller-runtime v0.16.1 go: downloading github.com/stretchr/testify v1.8.4 go: downloading github.com/jacksontj/memberlistmesh v0.0.0-20190905163944-93462b9d2bb7 go: downloading github.com/weaveworks/mesh v0.0.0-20191105120815-58dbcc3e8e63 go: downloading github.com/google/go-tpm-tools v0.4.0 go: downloading github.com/google/go-tpm v0.9.0 go: downloading k8s.io/kubelet v0.28.1 go: downloading k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading golang.org/x/tools v0.12.1-0.20230815132531-74c255bcf846 go: downloading github.com/hashicorp/memberlist v0.3.1 go: downloading github.com/oklog/ulid v1.3.1 go: downloading github.com/hashicorp/go-sockaddr v1.0.2 go: downloading github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529 go: downloading github.com/hashicorp/go-multierror v1.1.1 go: downloading github.com/hashicorp/go-msgpack v0.5.3 go: downloading github.com/armon/go-metrics v0.4.0 go: downloading github.com/miekg/dns v1.1.50 go: downloading github.com/hashicorp/errwrap v1.1.0 go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 go: downloading github.com/hashicorp/golang-lru v0.5.4 go: downloading github.com/evanphx/json-patch/v5 v5.6.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading github.com/google/go-sev-guest v0.6.1 go: downloading github.com/pborman/uuid v1.2.0 go: downloading github.com/google/logger v1.1.1 go: downloading golang.org/x/mod v0.12.0 ? k8s.io/kops [no test files] ? k8s.io/kops/channels/cmd/channels [no test files] ? k8s.io/kops/channels/pkg/api [no test files] ? k8s.io/kops/cloudmock/aws/mockautoscaling [no test files] ? k8s.io/kops/cloudmock/aws/mockec2 [no test files] ? k8s.io/kops/cloudmock/aws/mockelb [no test files] ? k8s.io/kops/cloudmock/aws/mockelbv2 [no test files] ? k8s.io/kops/cloudmock/aws/mockeventbridge [no test files] ? k8s.io/kops/cloudmock/aws/mockiam [no test files] ? k8s.io/kops/cloudmock/aws/mockroute53 [no test files] ? k8s.io/kops/cloudmock/aws/mocksqs [no test files] ? k8s.io/kops/cloudmock/gce [no test files] ? k8s.io/kops/cloudmock/gce/gcphttp [no test files] ? k8s.io/kops/cloudmock/gce/mockcloudresourcemanager [no test files] ? k8s.io/kops/cloudmock/gce/mockcompute [no test files] ? k8s.io/kops/cloudmock/gce/mockdns [no test files] ? k8s.io/kops/cloudmock/gce/mockiam [no test files] ? k8s.io/kops/cloudmock/gce/mockstorage [no test files] ? k8s.io/kops/cloudmock/openstack [no test files] ? k8s.io/kops/cloudmock/openstack/mockblockstorage [no test files] ? k8s.io/kops/cloudmock/openstack/mockcompute [no test files] ? k8s.io/kops/cloudmock/openstack/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack/mockimage [no test files] ? k8s.io/kops/cloudmock/openstack/mockloadbalancer [no test files] ? k8s.io/kops/cloudmock/openstack/mocknetworking [no test files] ? k8s.io/kops/cloudmock/scaleway/mockdns [no test files] === RUN Test_Filtering --- PASS: Test_Filtering (0.00s) === RUN Test_Replacement --- PASS: Test_Replacement (0.00s) === RUN Test_GetRequiredUpdates --- PASS: Test_GetRequiredUpdates (0.00s) === RUN Test_NeedsRollingUpdate I0217 08:35:36.224856 6025 addon.go:250] addon test wants to update all nodes I0217 08:35:36.226303 6025 addon.go:250] addon test wants to update workers nodes I0217 08:35:36.226559 6025 addon.go:250] addon test wants to update control-plane nodes --- PASS: Test_NeedsRollingUpdate (0.00s) === RUN Test_InstallPKI I0217 08:35:36.226827 6025 addon.go:283] installing PKI for "test" I0217 08:35:36.516152 6025 addon.go:283] installing PKI for "test" --- PASS: Test_InstallPKI (1.05s) === RUN Test_IsPKIInstalled --- PASS: Test_IsPKIInstalled (0.00s) PASS ok k8s.io/kops/channels/pkg/channels 1.092s === RUN TestGetUpdates --- PASS: TestGetUpdates (0.00s) PASS ok k8s.io/kops/channels/pkg/cmd 0.037s ? k8s.io/kops/cmd/kops/util [no test files] ? k8s.io/kops/cmd/kops-controller [no test files] ? k8s.io/kops/cmd/kops-controller/controllers [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/config [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/server [no test files] ? k8s.io/kops/cmd/kops-utils-cp [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53/stubs [no test files] ? k8s.io/kops/dns-controller/cmd/dns-controller [no test files] ? k8s.io/kops/cmd/nodeup [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/interfaces [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/rrstype [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/tests [no test files] ? k8s.io/kops/examples/kops-api-example [no test files] ? k8s.io/kops/nodeup/pkg/model/networking [no test files] ? k8s.io/kops/nodeup/pkg/model/resources [no test files] ? k8s.io/kops/pkg/acls [no test files] ? k8s.io/kops/pkg/acls/gce [no test files] ? k8s.io/kops/pkg/apis/kops/registry [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/apis/nodeup [no test files] ? k8s.io/kops/pkg/applylib [no test files] ? k8s.io/kops/pkg/applylib/mocks [no test files] ? k8s.io/kops/pkg/applylib/mocks/mockkubeapiserver [no test files] ? k8s.io/kops/pkg/bootstrap [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/fake [no test files] ? k8s.io/kops/pkg/clouds [no test files] ? k8s.io/kops/pkg/clusteraddons [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/commands/commandutils [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/simple [no test files] ? k8s.io/kops/pkg/client/simple/api [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/fake [no test files] ? k8s.io/kops/pkg/configserver [no test files] ? k8s.io/kops/pkg/dump [no test files] ? k8s.io/kops/pkg/kopscontrollerclient [no test files] ? k8s.io/kops/pkg/kubemanifest [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awscloudcontrollermanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsebscsidriver [no test files] ? k8s.io/kops/pkg/model/components/kopscontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/certmanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsloadbalancercontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/dnscontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/externaldns [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/karpenter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/kuberouter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/nodeterminationhandler [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/clusterautoscaler [no test files] ? k8s.io/kops/pkg/model/domodel [no test files] ? k8s.io/kops/pkg/model/gcemodel [no test files] ? k8s.io/kops/pkg/model/hetznermodel [no test files] ? k8s.io/kops/pkg/model/scalewaymodel [no test files] ? k8s.io/kops/pkg/mutexes [no test files] ? k8s.io/kops/pkg/nodeidentity [no test files] ? k8s.io/kops/pkg/nodeidentity/aws [no test files] ? k8s.io/kops/pkg/nodeidentity/do [no test files] ? k8s.io/kops/pkg/nodeidentity/gce [no test files] ? k8s.io/kops/pkg/nodeidentity/hetzner [no test files] ? k8s.io/kops/pkg/nodeidentity/openstack [no test files] ? k8s.io/kops/pkg/nodeidentity/scaleway [no test files] ? k8s.io/kops/pkg/rbac [no test files] ? k8s.io/kops/pkg/resolver [no test files] ? k8s.io/kops/pkg/resources [no test files] ? k8s.io/kops/pkg/resources/digitalocean [no test files] ? k8s.io/kops/pkg/testutils/golden [no test files] ? k8s.io/kops/pkg/try [no test files] ? k8s.io/kops/pkg/resources/ops [no test files] ? k8s.io/kops/pkg/resources/scaleway [no test files] ? k8s.io/kops/pkg/resources/spotinst [no test files] ? k8s.io/kops/pkg/resources/openstack [no test files] ? k8s.io/kops/pkg/sshcredentials [no test files] ? k8s.io/kops/pkg/testutils [no test files] ? k8s.io/kops/pkg/templates [no test files] ? k8s.io/kops/pkg/tokens [no test files] ? k8s.io/kops/pkg/resources/hetzner [no test files] ? k8s.io/kops/pkg/testutils/testcontext [no test files] ? k8s.io/kops/pkg/values [no test files] ? k8s.io/kops/protokube/cmd/protokube [no test files] ? k8s.io/kops/pkg/wellknownports [no test files] ? k8s.io/kops/pkg/wellknownusers [no test files] ? k8s.io/kops/protokube/pkg/etcd [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns/provider [no test files] ? k8s.io/kops/protokube/pkg/protokube [no test files] ? k8s.io/kops/protokube/pkg/gossip [no test files] ? k8s.io/kops/protokube/pkg/gossip/aws [no test files] ? k8s.io/kops/tests/fuzz [no test files] ? k8s.io/kops/pkg/wellknownoperators [no test files] ? k8s.io/kops/proto/kops/bootstrap/v1 [no test files] ? k8s.io/kops/protokube/pkg/gossip/do [no test files] ? k8s.io/kops/protokube/pkg/gossip/hetzner [no test files] ? k8s.io/kops/protokube/pkg/gossip/memberlist [no test files] ? k8s.io/kops/protokube/pkg/gossip/mesh [no test files] ? k8s.io/kops/protokube/pkg/gossip/openstack [no test files] ? k8s.io/kops/protokube/pkg/gossip/scaleway [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns [no test files] ? k8s.io/kops/pkg/zones [no test files] ? k8s.io/kops/tests/integration/channel/simple [no test files] ? k8s.io/kops/upup/models [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/bootstrapchannelbuilder [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/do [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcediscovery [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcemetadata [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmsigner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmverifier [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetzner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetznertasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/scalewaytasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/spotinsttasks [no test files] ? k8s.io/kops/upup/pkg/fi/loader [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/install [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/local [no test files] ? k8s.io/kops/upup/pkg/fi/secrets [no test files] ? k8s.io/kops/upup/tools/generators/fitask [no test files] ? k8s.io/kops/util/pkg/architectures [no test files] ? k8s.io/kops/util/pkg/env [no test files] ? k8s.io/kops/util/pkg/mirrors [no test files] ? k8s.io/kops/util/pkg/tables [no test files] ? k8s.io/kops/util/pkg/ui [no test files] === RUN TestCreateClusterMinimal I0217 08:35:38.249024 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.249257 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.249298 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.249343 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.249377 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.249431 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.249471 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.249487 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.249521 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.249548 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.253374 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.253434 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.288413 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:38.288560 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:38.288844 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:38.297080 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.297174 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.297191 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.297214 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.297229 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.297250 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.297268 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.297287 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.297302 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.297320 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.299725 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.299836 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.317741 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:38.317925 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:38.318252 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:38.324173 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.324324 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.324351 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.324386 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.324410 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.324439 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.324465 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.324482 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.324509 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.324527 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.327404 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.327441 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.354993 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:38.355110 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:38.355384 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:38.358874 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.358968 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.358986 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.359008 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.359024 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.359044 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.359061 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.359070 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.359085 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.359096 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.361503 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.361532 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.406302 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:38.406423 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:38.406649 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:38.412112 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.412230 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.412248 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.412269 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.412284 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.412304 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.412321 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.412331 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.412345 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.412356 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.414559 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.414584 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.449797 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:38.449909 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:38.450109 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:38.453429 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.453545 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.453563 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.453583 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.453597 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.453617 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.453633 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.453643 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.453658 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.453668 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.678754 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.678793 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.696157 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:38.696234 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:38.696423 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:38.699729 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.699832 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.699849 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.699867 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.699882 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.699901 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.699919 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.699930 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.699945 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.699956 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.701976 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.702001 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.738340 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:38.738462 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:38.738665 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterMinimal (0.50s) === RUN TestCreateClusterHetzner I0217 08:35:38.744508 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.744641 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.744660 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.744685 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.744700 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.744728 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.744746 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.744756 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.744771 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.744783 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.747268 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.747307 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0217 08:35:38.783291 7135 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0217 08:35:38.783333 7135 new_cluster.go:1373] Cloud Provider ID: "hetzner" I0217 08:35:38.787672 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.787775 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.787792 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.787813 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.787828 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.787848 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.787866 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.787876 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.787891 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.787902 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.790394 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.790421 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.822794 7135 new_cluster.go:1373] Cloud Provider ID: "hetzner" --- PASS: TestCreateClusterHetzner (0.08s) === RUN TestCreateClusterOpenStack I0217 08:35:38.826265 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.826367 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.826385 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.826406 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.826421 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.826441 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.826458 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.826467 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.826483 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.826494 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.828787 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.828813 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0217 08:35:38.849671 7135 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0217 08:35:38.849696 7135 new_cluster.go:1373] Cloud Provider ID: "openstack" I0217 08:35:38.851250 7135 subnets.go:224] Assigned CIDR 10.0.0.0/16 to subnet us-test1 --- PASS: TestCreateClusterOpenStack (0.03s) === RUN TestCreateClusterOpenStackOctavia I0217 08:35:38.855717 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.855841 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.855858 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.855880 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.855895 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.855913 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.855930 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.855940 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.855953 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.855963 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.858113 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.858142 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0217 08:35:38.894528 7135 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0217 08:35:38.894558 7135 new_cluster.go:1373] Cloud Provider ID: "openstack" I0217 08:35:38.895940 7135 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0217 08:35:38.895954 7135 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackOctavia (0.05s) === RUN TestCreateClusterOpenStackNoDNS I0217 08:35:38.900866 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.900983 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.901003 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.901024 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.901039 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.901058 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.901074 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.901083 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.901097 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.901109 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.903987 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.904060 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0217 08:35:38.966171 7135 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0217 08:35:38.966221 7135 new_cluster.go:1373] Cloud Provider ID: "openstack" I0217 08:35:38.966281 7135 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0217 08:35:38.966306 7135 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackNoDNS (0.08s) === RUN TestCreateClusterCilium I0217 08:35:38.976002 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:38.976138 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:38.976161 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:38.976189 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:38.976208 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:38.976234 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:38.976259 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:38.976271 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:38.976289 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:38.976304 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:38.978819 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:38.978856 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.015224 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.015344 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:39.015565 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterCilium (0.04s) === RUN TestCreateClusterOverride I0217 08:35:39.019334 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.019446 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.019464 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.019482 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.019498 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.019518 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.019535 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.019544 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.019558 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.019568 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.022220 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.022246 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.057747 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.058097 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:39.058289 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterOverride (0.04s) === RUN TestCreateClusterKubernetesFeatureGates I0217 08:35:39.062030 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.062137 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.062156 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.062176 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.062193 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.062219 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.062236 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.062247 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.062262 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.062274 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.188730 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.188773 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.243796 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.250691 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:39.251362 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKubernetesFeatureGates (0.20s) === RUN TestCreateClusterComplex I0217 08:35:39.258317 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.258483 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.258507 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.258538 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.258560 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.258591 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.258614 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.258628 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.258648 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.258663 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.262161 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.262214 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.302884 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.303250 7135 subnets.go:224] Assigned CIDR 10.0.0.0/18 to subnet us-test-1a I0217 08:35:39.303267 7135 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1b I0217 08:35:39.303278 7135 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1c I0217 08:35:39.303624 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplex (0.05s) === RUN TestCreateClusterComplexPrivate I0217 08:35:39.313026 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.313175 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.313198 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.313228 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.313249 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.313275 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.313307 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.313323 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.313342 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.313356 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.316279 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.316314 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.363043 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.363308 7135 subnets.go:205] Assigned CIDR 10.0.0.0/21 to subnet utility-us-test-1a I0217 08:35:39.363320 7135 subnets.go:205] Assigned CIDR 10.0.8.0/21 to subnet utility-us-test-1a-1 I0217 08:35:39.363328 7135 subnets.go:205] Assigned CIDR 10.0.16.0/21 to subnet utility-us-test-1a-4 I0217 08:35:39.363335 7135 subnets.go:205] Assigned CIDR 10.0.24.0/21 to subnet utility-us-test-1b I0217 08:35:39.363341 7135 subnets.go:205] Assigned CIDR 10.0.32.0/21 to subnet utility-us-test-1b-2 I0217 08:35:39.363346 7135 subnets.go:205] Assigned CIDR 10.0.40.0/21 to subnet utility-us-test-1c I0217 08:35:39.363353 7135 subnets.go:205] Assigned CIDR 10.0.48.0/21 to subnet utility-us-test-1c-3 I0217 08:35:39.363362 7135 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1a I0217 08:35:39.363370 7135 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1b I0217 08:35:39.363377 7135 subnets.go:224] Assigned CIDR 10.0.192.0/18 to subnet us-test-1c I0217 08:35:39.363739 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplexPrivate (0.06s) === RUN TestCreateClusterHA I0217 08:35:39.374736 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.374847 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.374866 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.374887 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.374901 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.374921 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.374946 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.374956 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.374970 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.374993 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.378356 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.378384 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.395636 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.395865 7135 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0217 08:35:39.395875 7135 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0217 08:35:39.395881 7135 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0217 08:35:39.396130 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:39.402084 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.402186 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.402203 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.402223 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.402239 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.402260 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.402278 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.402289 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.402305 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.402316 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.404943 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.404985 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.431949 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.432149 7135 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0217 08:35:39.432159 7135 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0217 08:35:39.432164 7135 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0217 08:35:39.432374 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHA (0.06s) === RUN TestCreateClusterMinimalGCE I0217 08:35:39.437812 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.437911 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.437927 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.437946 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.437960 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.437980 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.437997 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.438007 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.438021 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.438032 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.440183 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.440209 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.487567 7135 new_cluster.go:1373] Cloud Provider ID: "gce" I0217 08:35:39.487696 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 I0217 08:35:39.492378 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.492504 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.492527 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.492553 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.492573 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.492599 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.492620 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.492633 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.492651 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.492665 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.495431 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.495477 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.537223 7135 new_cluster.go:1373] Cloud Provider ID: "gce" I0217 08:35:39.537387 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterMinimalGCE (0.11s) === RUN TestCreateClusterHAGCE I0217 08:35:39.543160 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.543302 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.543326 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.543357 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.543377 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.543405 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.543439 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.543453 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.543473 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.543489 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.546394 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.546432 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.566518 7135 new_cluster.go:1373] Cloud Provider ID: "gce" I0217 08:35:39.566655 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterHAGCE (0.03s) === RUN TestCreateClusterGCE I0217 08:35:39.575607 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.575772 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.575801 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.575833 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.575858 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.575886 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.575915 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.575934 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.575961 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.575981 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.578730 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.578753 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.590510 7135 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0217 08:35:39.590557 7135 new_cluster.go:1373] Cloud Provider ID: "gce" I0217 08:35:39.590649 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterGCE (0.02s) === RUN TestCreateClusterHASharedZone I0217 08:35:39.594184 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.594295 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.594313 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.594330 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.594345 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.594364 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.594378 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.594389 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.594402 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.594412 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.597304 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.597340 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0217 08:35:39.610058 7135 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0217 08:35:39.610094 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.610270 7135 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0217 08:35:39.610482 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZone (0.03s) === RUN TestCreateClusterHASharedZones I0217 08:35:39.620209 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.620503 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.620553 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.620639 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.620691 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.620750 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.620800 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.620836 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.620884 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.620926 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.625171 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.625205 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0217 08:35:39.668028 7135 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0217 08:35:39.668075 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.668338 7135 subnets.go:224] Assigned CIDR 172.20.0.0/17 to subnet us-test-1a I0217 08:35:39.668348 7135 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1b I0217 08:35:39.668612 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZones (0.06s) === RUN TestCreateClusterPrivate I0217 08:35:39.676016 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.676132 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.676153 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.676175 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.676192 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.676214 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.676234 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.676245 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.676262 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.676281 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.680310 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.680379 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.742810 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.743044 7135 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0217 08:35:39.743061 7135 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0217 08:35:39.743370 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:39.743428 7135 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterPrivate (0.07s) === RUN TestCreateClusterPrivateGCE I0217 08:35:39.749747 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.749877 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.749901 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.749927 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.749948 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.749973 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.749996 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.750011 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.750031 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.750049 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.753190 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.753240 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.802040 7135 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0217 08:35:39.802129 7135 new_cluster.go:1373] Cloud Provider ID: "gce" I0217 08:35:39.802228 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterPrivateGCE (0.06s) === RUN TestCreateClusterWithNGWSpecified I0217 08:35:39.814247 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.814368 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.814390 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.814416 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.814433 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.814455 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.814475 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.814485 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.814502 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.814514 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.817090 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.817126 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.846117 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.846283 7135 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0217 08:35:39.846295 7135 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0217 08:35:39.846541 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:39.846565 7135 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithNGWSpecified (0.04s) === RUN TestCreateClusterWithINGWSpecified I0217 08:35:39.851033 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.851142 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.851162 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.851184 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.851200 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.851224 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.851246 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.851257 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.851273 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.851285 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.853995 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.854030 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.907120 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:39.907291 7135 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0217 08:35:39.907303 7135 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0217 08:35:39.907528 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:39.907553 7135 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithINGWSpecified (0.06s) === RUN TestCreateClusterSharedVPC I0217 08:35:39.911865 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:39.911974 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:39.911993 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:39.912014 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:39.912030 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:39.912050 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:39.912069 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:39.912079 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:39.912092 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:39.912103 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:39.914906 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:39.914974 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.008391 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:40.008510 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.008543 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.008564 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.008574 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.008601 7135 subnets.go:224] Assigned CIDR 10.0.0.0/12 to subnet us-test-1a I0217 08:35:40.008808 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedVPC (0.10s) === RUN TestCreateClusterSharedSubnets I0217 08:35:40.016161 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:40.016381 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:40.016417 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:40.016457 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:40.016487 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:40.016526 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:40.016560 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:40.016582 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:40.016613 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:40.016635 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:40.020196 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.020229 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.045511 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.045538 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.045593 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:40.045692 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.045706 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.045722 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.045731 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.045937 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnets (0.03s) === RUN TestCreateClusterSharedSubnetsVpcLookup I0217 08:35:40.050351 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:40.050481 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:40.050500 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:40.050519 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:40.050536 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:40.050558 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:40.050578 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:40.050590 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:40.050618 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:40.050642 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:40.053143 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.053176 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.082334 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:35:40.082378 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.082393 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.082447 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:40.082535 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.082547 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.082561 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.082570 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.082777 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnetsVpcLookup (0.04s) === RUN TestCreateClusterPrivateSharedSubnets I0217 08:35:40.086391 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:40.086491 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:40.086510 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:40.086528 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:40.086542 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:40.086562 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:40.086580 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:40.086590 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:40.086608 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:40.086619 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:40.089097 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.089126 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.102672 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.102697 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.102729 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.102740 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.102777 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:40.102870 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.102883 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.102896 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:35:40.102904 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:35:40.103123 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterPrivateSharedSubnets (0.02s) === RUN TestCreateClusterIPv6 I0217 08:35:40.106831 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:40.106929 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:40.106946 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:40.106967 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:40.106981 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:40.106999 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:40.107016 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:40.107027 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:40.107041 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:40.107052 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:40.109552 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.109587 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.125669 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:40.125799 7135 subnets.go:205] Assigned CIDR 172.20.0.0/21 to subnet utility-us-test-1a I0217 08:35:40.125811 7135 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet dualstack-us-test-1a I0217 08:35:40.126124 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterIPv6 (0.02s) === RUN TestCreateClusterDifferentAMIs I0217 08:35:40.130491 7135 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0217 08:35:40.130499 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:40.130599 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:40.130637 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:40.130657 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:40.130672 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:40.130693 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:40.130713 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:40.130723 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:40.130739 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:40.130751 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:40.132900 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.132923 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.192077 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:40.192141 7135 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0217 08:35:40.192150 7135 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0217 08:35:40.192356 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:40.196638 7135 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestCreateClusterDifferentAMIs (0.07s) === RUN TestCreateClusterKarpenter I0217 08:35:40.196696 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:40.196800 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:40.196817 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:40.196837 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:40.196851 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:40.196871 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:40.196888 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:40.196898 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:40.196914 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:40.196934 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:40.199463 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.199500 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0217 08:35:40.214429 7135 new_cluster.go:1373] Cloud Provider ID: "aws" I0217 08:35:40.214575 7135 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0217 08:35:40.214583 7135 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0217 08:35:40.214589 7135 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0217 08:35:40.214817 7135 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKarpenter (0.02s) === RUN TestParseCloudLabels --- PASS: TestParseCloudLabels (0.00s) === RUN TestConfirmation --- PASS: TestConfirmation (0.00s) === RUN TestEditInstanceGroup I0217 08:35:40.218844 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:40.218937 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:40.218955 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:40.219000 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:40.219016 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:40.219037 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:40.219054 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:40.219065 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:40.219079 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:40.219092 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:40.222402 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } --- PASS: TestEditInstanceGroup (0.00s) === RUN TestMinimal I0217 08:35:40.223166 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:40.223251 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:40.223266 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:40.223281 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:40.223294 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:40.223310 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:40.223323 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:40.223333 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:40.223345 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:40.223353 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:40.231670 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0217 08:35:40.232709 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:40.232739 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0217 08:35:44.592584 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:47.807816 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:35:47.811239 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:35:47.811265 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:35:47.811337 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:35:47.814513 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:35:47.819631 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:35:47.820590 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:47.820772 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:47.821169 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:47.821240 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:47.821328 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:35:47.821874 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:35:47.822411 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:35:47.829826 7135 target.go:111] Terraform output is in /tmp/test3197064619/out --- PASS: TestMinimal (7.61s) === RUN TestMinimal_v1_23 I0217 08:35:47.835760 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:47.836101 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:47.836197 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:47.836285 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:47.836364 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:47.836455 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:47.836537 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:47.836605 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:47.836682 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:47.836744 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:47.864142 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0217 08:35:47.867519 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:47.867615 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:49.923783 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:50.064333 7135 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0217 08:35:50.065779 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:35:50.065807 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:35:50.065880 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:35:50.067683 7135 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0217 08:35:50.075173 7135 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0217 08:35:50.075763 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:50.076161 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:50.076599 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:50.077139 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:50.077218 7135 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0217 08:35:50.077459 7135 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0217 08:35:50.077708 7135 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0217 08:35:50.083038 7135 target.go:111] Terraform output is in /tmp/test4221514674/out --- PASS: TestMinimal_v1_23 (2.25s) === RUN TestMinimal_v1_24 I0217 08:35:50.087177 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:50.087369 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:50.087405 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:50.087444 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:50.087476 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:50.087513 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:50.087544 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:50.087566 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:50.087600 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:50.087621 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:50.108683 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:35:50.111412 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:50.111475 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:51.680472 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:51.832901 7135 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0217 08:35:51.833153 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:35:51.833181 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:35:51.833272 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:35:51.836616 7135 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0217 08:35:51.839794 7135 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0217 08:35:51.840280 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:51.840493 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:51.840626 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:51.841023 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:51.841115 7135 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0217 08:35:51.841307 7135 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0217 08:35:51.841566 7135 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0217 08:35:51.850692 7135 target.go:111] Terraform output is in /tmp/test3476608127/out --- PASS: TestMinimal_v1_24 (1.77s) === RUN TestMinimal_v1_25 I0217 08:35:51.855061 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:51.855244 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:51.855278 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:51.855318 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:51.855352 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:51.855391 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:51.855422 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:51.855445 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:51.855475 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:51.855497 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:51.876404 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0217 08:35:51.879056 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:51.879126 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:53.879695 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:54.000712 7135 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0217 08:35:54.003900 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:35:54.003928 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:35:54.004041 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:35:54.004651 7135 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0217 08:35:54.011926 7135 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0217 08:35:54.012333 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:54.012496 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:54.012897 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:54.012974 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:54.013079 7135 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0217 08:35:54.013291 7135 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0217 08:35:54.013527 7135 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0217 08:35:54.019255 7135 target.go:111] Terraform output is in /tmp/test3426669596/out --- PASS: TestMinimal_v1_25 (2.17s) === RUN TestMinimal_v1_26 I0217 08:35:54.023678 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:54.023864 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:54.023898 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:54.023959 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:54.023995 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:54.024043 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:54.024076 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:54.024098 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:54.024130 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:54.024151 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:54.045581 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0217 08:35:54.048380 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:54.048449 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:56.050879 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:56.132963 7135 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0217 08:35:56.133267 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:35:56.133286 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:35:56.133337 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:35:56.134393 7135 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0217 08:35:56.137122 7135 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0217 08:35:56.137312 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:56.137422 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:56.137615 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:56.137652 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:56.137682 7135 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0217 08:35:56.137824 7135 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0217 08:35:56.137942 7135 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0217 08:35:56.140723 7135 target.go:111] Terraform output is in /tmp/test1848173985/out --- PASS: TestMinimal_v1_26 (2.12s) === RUN TestMinimal_v1_27 I0217 08:35:56.142626 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:56.142717 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:56.142734 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:56.142754 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:56.142769 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:56.142789 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:56.142805 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:56.142815 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:56.142829 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:56.142841 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:56.154534 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0217 08:35:56.155829 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:56.155878 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:58.916077 7135 zones.go:93] ListHostedZonesPages { } I0217 08:35:59.047917 7135 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0217 08:35:59.050385 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:35:59.050401 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:35:59.050453 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:35:59.055098 7135 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0217 08:35:59.058218 7135 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0217 08:35:59.058506 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:59.058668 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:59.058805 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:59.059079 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:59.059135 7135 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0217 08:35:59.059360 7135 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0217 08:35:59.059506 7135 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0217 08:35:59.062605 7135 target.go:111] Terraform output is in /tmp/test3293332935/out --- PASS: TestMinimal_v1_27 (2.92s) === RUN TestMinimal_NoneDNS I0217 08:35:59.064531 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:59.064622 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:59.064640 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:59.064661 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:59.064676 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:59.064699 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:59.064719 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:59.064729 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:59.064745 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:59.064757 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0217 08:35:59.075438 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:35:59.075478 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:00.404362 7135 executor.go:111] Tasks: 0 done / 110 total; 43 can run I0217 08:36:00.406572 7135 executor.go:111] Tasks: 43 done / 110 total; 24 can run I0217 08:36:00.408641 7135 executor.go:111] Tasks: 67 done / 110 total; 29 can run I0217 08:36:00.409293 7135 executor.go:111] Tasks: 96 done / 110 total; 2 can run I0217 08:36:00.409342 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:00.409381 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:00.409473 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:00.409539 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:00.414149 7135 executor.go:111] Tasks: 98 done / 110 total; 4 can run I0217 08:36:00.414305 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:00.414467 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:00.414558 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:00.414743 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:00.414792 7135 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0217 08:36:00.414931 7135 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0217 08:36:00.415090 7135 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0217 08:36:00.418471 7135 target.go:111] Terraform output is in /tmp/test894880866/out --- PASS: TestMinimal_NoneDNS (1.36s) === RUN TestHetzner I0217 08:36:00.421495 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:36:02.245454 7135 executor.go:111] Tasks: 0 done / 46 total; 37 can run I0217 08:36:02.246987 7135 executor.go:111] Tasks: 37 done / 46 total; 3 can run I0217 08:36:02.247151 7135 executor.go:111] Tasks: 40 done / 46 total; 2 can run I0217 08:36:02.248977 7135 executor.go:111] Tasks: 42 done / 46 total; 4 can run I0217 08:36:02.249364 7135 executor.go:111] Tasks: 46 done / 46 total; 0 can run I0217 08:36:02.250722 7135 target.go:111] Terraform output is in /tmp/test2193568094/out --- PASS: TestHetzner (1.83s) === RUN TestNvidia I0217 08:36:02.251964 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:02.252053 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:02.252074 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:02.252098 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:02.252115 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:02.252137 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:02.252156 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:02.252167 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:02.252183 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:02.252195 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:02.262628 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:02.263866 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:02.263905 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:03.883309 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:04.049135 7135 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0217 08:36:04.049931 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:04.049950 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:04.049988 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:04.050642 7135 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0217 08:36:04.053662 7135 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0217 08:36:04.053889 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:04.054032 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:04.054219 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:04.054271 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:04.054323 7135 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0217 08:36:04.054494 7135 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0217 08:36:04.054612 7135 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0217 08:36:04.057225 7135 target.go:111] Terraform output is in /tmp/test3102302859/out --- PASS: TestNvidia (1.81s) === RUN TestMinimalGossip I0217 08:36:04.059230 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:04.059321 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:04.059341 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:04.059364 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:04.059379 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:04.059402 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:04.059420 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:04.059430 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:04.059447 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:04.059459 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:04.069357 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:04.069398 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:05.426281 7135 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0217 08:36:05.428838 7135 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0217 08:36:05.432198 7135 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0217 08:36:05.432473 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:05.432694 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:05.432902 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:05.433102 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:05.433188 7135 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0217 08:36:05.433393 7135 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0217 08:36:05.433664 7135 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0217 08:36:05.443276 7135 target.go:111] Terraform output is in /tmp/test139581249/out --- PASS: TestMinimalGossip (1.39s) === RUN TestMinimalGossipIRSA I0217 08:36:05.447551 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:05.447739 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:05.447776 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:05.447818 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:05.447852 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:05.447890 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:05.447924 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:05.447947 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:05.447976 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:05.447999 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:05.469918 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:05.469979 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:06.811383 7135 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0217 08:36:06.812798 7135 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0217 08:36:06.815341 7135 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0217 08:36:06.815490 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:06.815633 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:06.815697 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:06.815856 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:06.815918 7135 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0217 08:36:06.816039 7135 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0217 08:36:06.816166 7135 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0217 08:36:06.819161 7135 target.go:111] Terraform output is in /tmp/test3235628363/out --- PASS: TestMinimalGossipIRSA (1.37s) === RUN TestMinimalGCE I0217 08:36:06.821325 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:06.821998 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:36:08.783554 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:36:08.783643 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:36:08.783756 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0217 08:36:08.783779 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0217 08:36:08.783796 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0217 08:36:08.783852 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0217 08:36:08.785055 7135 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0217 08:36:08.788282 7135 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0217 08:36:08.792669 7135 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0217 08:36:08.793675 7135 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0217 08:36:08.793978 7135 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0217 08:36:08.797490 7135 target.go:111] Terraform output is in /tmp/test3907618254/out --- PASS: TestMinimalGCE (1.98s) === RUN TestMinimalGCEPrivate I0217 08:36:08.800759 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:08.802299 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:36:10.380424 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:36:10.380492 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:36:10.380587 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/main" W0217 08:36:10.380632 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/events" W0217 08:36:10.380652 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com" W0217 08:36:10.380702 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0217 08:36:10.381725 7135 executor.go:111] Tasks: 0 done / 65 total; 41 can run I0217 08:36:10.384374 7135 executor.go:111] Tasks: 41 done / 65 total; 17 can run I0217 08:36:10.389880 7135 executor.go:111] Tasks: 58 done / 65 total; 5 can run I0217 08:36:10.392186 7135 executor.go:111] Tasks: 63 done / 65 total; 2 can run I0217 08:36:10.392392 7135 executor.go:111] Tasks: 65 done / 65 total; 0 can run I0217 08:36:10.395916 7135 target.go:111] Terraform output is in /tmp/test1377801802/out --- PASS: TestMinimalGCEPrivate (1.60s) === RUN TestMinimalGCEInternalLoadBalancer I0217 08:36:10.399424 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:10.401044 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:36:12.000296 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:36:12.000358 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:36:12.000451 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/main" W0217 08:36:12.000468 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/events" W0217 08:36:12.000484 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com" W0217 08:36:12.000526 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0217 08:36:12.000557 7135 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0217 08:36:12.001669 7135 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0217 08:36:12.009267 7135 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0217 08:36:12.009746 7135 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0217 08:36:12.010021 7135 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0217 08:36:12.014549 7135 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0217 08:36:12.015408 7135 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0217 08:36:12.015584 7135 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0217 08:36:12.015830 7135 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0217 08:36:12.016062 7135 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0217 08:36:12.019985 7135 target.go:111] Terraform output is in /tmp/test3994259966/out --- PASS: TestMinimalGCEInternalLoadBalancer (1.62s) === RUN TestMinimalGCEPublicLoadBalancer I0217 08:36:12.023268 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:12.024881 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:36:13.639024 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:36:13.639091 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:36:13.639209 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/main" W0217 08:36:13.639231 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/events" W0217 08:36:13.639250 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com" W0217 08:36:13.639302 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0217 08:36:13.640691 7135 executor.go:111] Tasks: 0 done / 71 total; 43 can run I0217 08:36:13.643765 7135 executor.go:111] Tasks: 43 done / 71 total; 19 can run I0217 08:36:13.649321 7135 executor.go:111] Tasks: 62 done / 71 total; 7 can run I0217 08:36:13.650040 7135 executor.go:111] Tasks: 69 done / 71 total; 2 can run I0217 08:36:13.650174 7135 executor.go:111] Tasks: 71 done / 71 total; 0 can run I0217 08:36:13.654007 7135 target.go:111] Terraform output is in /tmp/test776832802/out --- PASS: TestMinimalGCEPublicLoadBalancer (1.63s) === RUN TestMinimalGCELongClusterName I0217 08:36:13.657094 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:13.658593 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:36:15.286644 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:36:15.286741 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:36:15.286860 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0217 08:36:15.286880 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0217 08:36:15.286901 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0217 08:36:15.286965 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0217 08:36:15.288289 7135 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0217 08:36:15.290557 7135 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0217 08:36:15.295010 7135 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0217 08:36:15.295729 7135 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0217 08:36:15.295895 7135 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0217 08:36:15.299883 7135 target.go:111] Terraform output is in /tmp/test4168357487/out --- PASS: TestMinimalGCELongClusterName (1.65s) === RUN TestMinimalGCEInternalLoadBalancerLongClusterName I0217 08:36:15.303690 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:15.305387 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:36:16.957627 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:36:16.957702 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:36:16.957845 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0217 08:36:16.957868 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0217 08:36:16.957889 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0217 08:36:16.957947 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0217 08:36:16.957989 7135 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0217 08:36:16.959402 7135 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0217 08:36:16.962231 7135 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0217 08:36:16.962637 7135 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0217 08:36:16.962821 7135 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0217 08:36:16.967202 7135 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0217 08:36:16.967958 7135 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0217 08:36:16.968161 7135 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0217 08:36:16.968305 7135 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0217 08:36:16.968436 7135 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0217 08:36:16.972303 7135 target.go:111] Terraform output is in /tmp/test1238627583/out --- PASS: TestMinimalGCEInternalLoadBalancerLongClusterName (1.67s) === RUN TestMinimalGCEDNSNone I0217 08:36:16.975659 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:16.977222 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:36:18.542702 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:36:18.542771 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:36:18.542890 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0217 08:36:18.542912 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0217 08:36:18.542933 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0217 08:36:18.542989 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0217 08:36:18.543025 7135 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0217 08:36:18.544480 7135 executor.go:111] Tasks: 0 done / 72 total; 41 can run I0217 08:36:18.547371 7135 executor.go:111] Tasks: 41 done / 72 total; 18 can run I0217 08:36:18.547742 7135 executor.go:111] Tasks: 59 done / 72 total; 2 can run I0217 08:36:18.547908 7135 executor.go:111] Tasks: 61 done / 72 total; 2 can run I0217 08:36:18.552165 7135 executor.go:111] Tasks: 63 done / 72 total; 4 can run I0217 08:36:18.552968 7135 executor.go:111] Tasks: 67 done / 72 total; 2 can run I0217 08:36:18.553145 7135 executor.go:111] Tasks: 69 done / 72 total; 1 can run I0217 08:36:18.553277 7135 executor.go:111] Tasks: 70 done / 72 total; 2 can run I0217 08:36:18.553433 7135 executor.go:111] Tasks: 72 done / 72 total; 0 can run I0217 08:36:18.557176 7135 target.go:111] Terraform output is in /tmp/test3327572024/out --- PASS: TestMinimalGCEDNSNone (1.58s) === RUN TestMinimalScaleway I0217 08:36:18.560249 7135 featureflag.go:164] FeatureFlag "Scaleway"=true I0217 08:36:18.560265 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:36:20.613877 7135 executor.go:111] Tasks: 0 done / 49 total; 37 can run I0217 08:36:20.616217 7135 executor.go:111] Tasks: 37 done / 49 total; 6 can run I0217 08:36:20.620391 7135 executor.go:111] Tasks: 43 done / 49 total; 6 can run I0217 08:36:20.621224 7135 executor.go:111] Tasks: 49 done / 49 total; 0 can run I0217 08:36:20.623723 7135 target.go:111] Terraform output is in /tmp/test1334095364/out I0217 08:36:20.626764 7135 featureflag.go:164] FeatureFlag "Scaleway"=false --- PASS: TestMinimalScaleway (2.07s) === RUN TestHA I0217 08:36:20.626891 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:20.627086 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:20.627127 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:20.627180 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:20.627219 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:20.627266 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:20.627341 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:20.627365 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:20.627396 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:20.627428 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:20.657829 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:20.661086 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:20.661168 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:20.661214 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:20.661256 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:21.874783 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:22.034716 7135 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0217 08:36:22.035153 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:22.035191 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:22.035271 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:22.039003 7135 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0217 08:36:22.047923 7135 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0217 08:36:22.048210 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:22.048501 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:22.048703 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:22.048909 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:22.049094 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:22.049150 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:22.049217 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:22.049529 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:22.049633 7135 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0217 08:36:22.049935 7135 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0217 08:36:22.050291 7135 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0217 08:36:22.057515 7135 target.go:111] Terraform output is in /tmp/test1293750013/out --- PASS: TestHA (1.44s) === RUN TestHighAvailabilityGCE I0217 08:36:22.062776 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:22.064425 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:36:23.693523 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:36:23.693614 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:36:23.693775 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/main" W0217 08:36:23.693798 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/events" W0217 08:36:23.693817 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com" W0217 08:36:23.693873 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0217 08:36:23.693950 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0217 08:36:23.694011 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0217 08:36:23.695703 7135 executor.go:111] Tasks: 0 done / 82 total; 49 can run I0217 08:36:23.698959 7135 executor.go:111] Tasks: 49 done / 82 total; 19 can run I0217 08:36:23.703426 7135 executor.go:111] Tasks: 68 done / 82 total; 8 can run I0217 08:36:23.704266 7135 executor.go:111] Tasks: 76 done / 82 total; 6 can run I0217 08:36:23.704514 7135 executor.go:111] Tasks: 82 done / 82 total; 0 can run I0217 08:36:23.708854 7135 target.go:111] Terraform output is in /tmp/test3688130903/out --- PASS: TestHighAvailabilityGCE (1.65s) === RUN TestComplex I0217 08:36:23.715651 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:23.715854 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:23.715890 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:23.715968 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:23.716001 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:23.716041 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:23.716074 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:23.716094 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:23.716122 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:23.716144 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:23.742442 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:36:23.745932 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:23.746003 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:25.798129 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:25.964424 7135 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0217 08:36:25.966220 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:25.966274 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:25.966378 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:25.972352 7135 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0217 08:36:25.975455 7135 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0217 08:36:25.976145 7135 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0217 08:36:25.976316 7135 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0217 08:36:25.976376 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:25.976446 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:25.976549 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:25.976628 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:25.980856 7135 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0217 08:36:25.980992 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:25.981182 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:25.981375 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:25.981937 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:25.982036 7135 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0217 08:36:25.982326 7135 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0217 08:36:25.982571 7135 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0217 08:36:25.989463 7135 target.go:111] Terraform output is in /tmp/test3582546371/out I0217 08:36:25.994092 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:25.994289 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:25.994326 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:25.994369 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:25.994400 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:25.994442 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:25.994476 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:25.994499 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:25.994538 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:25.994562 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:26.021528 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:36:26.024903 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:26.024968 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:27.240857 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:27.494239 7135 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0217 08:36:27.495189 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:27.495218 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:27.495301 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:27.497434 7135 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0217 08:36:27.500199 7135 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0217 08:36:27.500828 7135 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0217 08:36:27.501050 7135 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0217 08:36:27.501103 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:27.501155 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:27.501272 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:27.501355 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:27.505430 7135 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0217 08:36:27.505569 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:27.505767 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:27.505980 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:27.506388 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:27.506482 7135 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0217 08:36:27.506719 7135 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0217 08:36:27.506957 7135 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0217 08:36:27.513753 7135 target.go:111] Terraform output is in /tmp/test3317881557/out --- PASS: TestComplex (3.80s) === RUN TestCompress I0217 08:36:27.518177 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:27.518369 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:27.518406 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:27.518446 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:27.518476 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:27.518515 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:27.518546 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:27.518568 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:27.518596 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:27.518618 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:27.538112 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:27.540774 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:27.540843 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:28.801625 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:28.949231 7135 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0217 08:36:28.950322 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:28.950352 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:28.950415 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:28.952093 7135 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0217 08:36:28.956556 7135 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0217 08:36:28.956856 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:28.957076 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:28.958454 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:28.958846 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:28.958936 7135 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0217 08:36:28.959191 7135 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0217 08:36:28.959393 7135 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0217 08:36:28.964763 7135 target.go:111] Terraform output is in /tmp/test1592573202/out --- PASS: TestCompress (1.45s) === RUN TestExternalPolicies I0217 08:36:28.969038 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:28.969222 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:28.969259 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:28.969300 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:28.969331 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:28.969374 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:28.969408 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:28.969431 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:28.969463 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:28.969486 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:28.996318 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:28.999435 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:28.999504 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:30.242760 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:30.387415 7135 executor.go:111] Tasks: 0 done / 115 total; 47 can run I0217 08:36:30.388560 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:30.388590 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:30.388662 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:30.390112 7135 executor.go:111] Tasks: 47 done / 115 total; 22 can run I0217 08:36:30.392514 7135 executor.go:111] Tasks: 69 done / 115 total; 30 can run I0217 08:36:30.393206 7135 executor.go:111] Tasks: 99 done / 115 total; 4 can run W0217 08:36:30.393302 7135 api.go:53] PageSize not implemented W0217 08:36:30.393417 7135 api.go:53] PageSize not implemented I0217 08:36:30.397755 7135 executor.go:111] Tasks: 103 done / 115 total; 4 can run I0217 08:36:30.397919 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:30.398038 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:30.398297 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:30.398640 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:30.398734 7135 executor.go:111] Tasks: 107 done / 115 total; 2 can run I0217 08:36:30.399001 7135 executor.go:111] Tasks: 109 done / 115 total; 6 can run I0217 08:36:30.399262 7135 executor.go:111] Tasks: 115 done / 115 total; 0 can run I0217 08:36:30.406098 7135 target.go:111] Terraform output is in /tmp/test661479480/out --- PASS: TestExternalPolicies (1.44s) === RUN TestMinimalIPv6 I0217 08:36:30.410546 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:30.410755 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:30.410794 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:30.410833 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:30.410868 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:30.410910 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:30.410944 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:30.410965 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:30.410996 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:30.411019 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:30.438826 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:36:30.441857 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:30.441924 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:31.661814 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:31.813897 7135 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0217 08:36:31.814567 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:31.814588 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:31.814640 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:31.816407 7135 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0217 08:36:31.818952 7135 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0217 08:36:31.819648 7135 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0217 08:36:31.819931 7135 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0217 08:36:31.819982 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:31.820022 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:31.820114 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:31.820163 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:31.824363 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:36:31.824509 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:31.824642 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:31.825030 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:31.825107 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:31.825180 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:36:31.825428 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:36:31.825688 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:36:31.836891 7135 target.go:111] Terraform output is in /tmp/test787342129/out --- PASS: TestMinimalIPv6 (1.43s) === RUN TestMinimalIPv6Calico I0217 08:36:31.841845 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:31.842048 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:31.842087 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:31.842130 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:31.842165 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:31.842207 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:31.842283 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:31.842309 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:31.842342 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:31.842366 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:31.866453 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:36:31.869740 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:31.869811 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:33.086767 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:33.434641 7135 executor.go:111] Tasks: 0 done / 138 total; 47 can run I0217 08:36:33.438894 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:33.438939 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:33.439056 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:33.441924 7135 executor.go:111] Tasks: 47 done / 138 total; 25 can run I0217 08:36:33.444648 7135 executor.go:111] Tasks: 72 done / 138 total; 37 can run I0217 08:36:33.445375 7135 executor.go:111] Tasks: 109 done / 138 total; 9 can run I0217 08:36:33.445681 7135 executor.go:111] Tasks: 118 done / 138 total; 8 can run I0217 08:36:33.445739 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:33.445821 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:33.445915 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:33.445975 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:33.450224 7135 executor.go:111] Tasks: 126 done / 138 total; 4 can run I0217 08:36:33.450439 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:33.450727 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:33.451035 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:33.451461 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:33.451559 7135 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0217 08:36:33.451889 7135 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0217 08:36:33.452169 7135 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0217 08:36:33.459277 7135 target.go:111] Terraform output is in /tmp/test3779006672/out --- PASS: TestMinimalIPv6Calico (1.62s) === RUN TestMinimalIPv6Cilium I0217 08:36:33.464639 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:33.464843 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:33.464879 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:33.464922 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:33.464954 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:33.464996 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:33.465064 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:33.465087 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:33.465132 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:33.465158 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:33.488716 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:36:33.495695 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:33.495774 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:34.775629 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:34.971527 7135 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0217 08:36:34.974327 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:34.974359 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:34.974434 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:34.975102 7135 executor.go:111] Tasks: 47 done / 137 total; 25 can run I0217 08:36:34.977748 7135 executor.go:111] Tasks: 72 done / 137 total; 36 can run I0217 08:36:34.979467 7135 executor.go:111] Tasks: 108 done / 137 total; 9 can run I0217 08:36:34.980644 7135 executor.go:111] Tasks: 117 done / 137 total; 8 can run I0217 08:36:34.980988 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:34.981125 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:34.981185 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:34.981272 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:34.987234 7135 executor.go:111] Tasks: 125 done / 137 total; 4 can run I0217 08:36:34.987438 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:34.987670 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:34.987829 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:34.988272 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:34.988369 7135 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0217 08:36:34.988613 7135 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0217 08:36:34.988890 7135 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0217 08:36:34.995744 7135 target.go:111] Terraform output is in /tmp/test392531126/out --- PASS: TestMinimalIPv6Cilium (1.54s) === RUN TestMinimalIPv6NoSubnetPrefix I0217 08:36:35.000232 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:35.000411 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:35.000446 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:35.000489 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:35.000522 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:35.000565 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:35.000617 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:35.000641 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:35.000672 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:35.000696 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:35.024149 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:36:35.027466 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:35.027534 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:36.277689 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:36.423206 7135 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0217 08:36:36.424632 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:36.424685 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:36.424805 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:36.430639 7135 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0217 08:36:36.433313 7135 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0217 08:36:36.434097 7135 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0217 08:36:36.434422 7135 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0217 08:36:36.434489 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:36.434563 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:36.434675 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:36:36.434737 7135 loadbalancers.go:35] PageSize not implemented I0217 08:36:36.438929 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:36:36.439080 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:36.439283 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:36.439483 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:36.439916 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:36.440008 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:36:36.440267 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:36:36.440525 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:36:36.446783 7135 target.go:111] Terraform output is in /tmp/test3210433885/out --- PASS: TestMinimalIPv6NoSubnetPrefix (1.45s) === RUN TestMinimalWarmPool I0217 08:36:36.451245 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:36.451424 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:36.451459 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:36.451496 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:36.451526 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:36.451565 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:36.451597 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:36.451619 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:36.451649 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:36.451671 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:36.471741 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:36.474572 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:36.474636 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:37.705866 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:37.888573 7135 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0217 08:36:37.889079 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:37.889110 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:37.889184 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:37.891676 7135 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0217 08:36:37.896206 7135 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0217 08:36:37.896612 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:37.896802 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:37.897192 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:37.897289 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:37.897363 7135 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0217 08:36:37.897621 7135 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0217 08:36:37.897893 7135 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0217 08:36:37.903350 7135 target.go:111] Terraform output is in /tmp/test1721262706/out --- PASS: TestMinimalWarmPool (1.46s) === RUN TestMinimalEtcd I0217 08:36:37.908203 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:37.908391 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:37.908429 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:37.908471 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:37.908504 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:37.908545 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:37.908577 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:37.908600 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:37.908629 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:37.908650 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:37.932796 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:37.936481 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:37.936554 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:39.163532 7135 zones.go:93] ListHostedZonesPages { } W0217 08:36:39.301205 7135 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc W0217 08:36:39.301254 7135 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 10 W0217 08:36:39.303479 7135 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc I0217 08:36:39.314428 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:36:39.315316 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:39.315345 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:39.315428 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:39.316941 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:36:39.321449 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:36:39.321790 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:39.321935 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:39.322178 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:39.322497 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:39.322582 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:36:39.322840 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:36:39.323102 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:36:39.328811 7135 target.go:111] Terraform output is in /tmp/test2718342598/out --- PASS: TestMinimalEtcd (1.42s) === RUN TestMinimalGp3 I0217 08:36:39.333274 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:39.333478 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:39.333515 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:39.333556 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:39.333588 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:39.333629 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:39.333665 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:39.333687 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:39.333717 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:39.333740 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:39.358278 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:39.361782 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:39.361857 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:40.592424 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:40.729091 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:36:40.729871 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:40.729903 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:40.730017 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:40.732043 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:36:40.736860 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:36:40.737041 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:40.737464 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:40.737615 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:40.737844 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:40.737942 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:36:40.738174 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:36:40.738454 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:36:40.743845 7135 target.go:111] Terraform output is in /tmp/test3596810386/out --- PASS: TestMinimalGp3 (1.41s) === RUN TestMinimalLongClusterName I0217 08:36:40.748272 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:40.748470 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:40.748509 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:40.748549 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:40.748580 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:40.748619 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:40.748656 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:40.748683 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:40.748716 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:40.748739 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:40.768126 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:40.770787 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:40.770854 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0217 08:36:41.993398 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:42.142161 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:36:42.142951 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:42.142983 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:42.143069 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:42.145717 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:36:42.150350 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:36:42.150859 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:42.151051 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:42.151261 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:42.151714 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:42.151813 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:36:42.152099 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:36:42.152365 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:36:42.158573 7135 target.go:111] Terraform output is in /tmp/test1512158302/out --- PASS: TestMinimalLongClusterName (1.41s) === RUN TestExistingSG I0217 08:36:42.163154 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:42.163351 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:42.163387 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:42.163430 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:42.163463 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:42.163503 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:42.163536 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:42.163558 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:42.163588 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:42.163611 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:42.190486 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:42.193719 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:42.193789 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:42.193837 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:42.193878 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.425980 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:43.569523 7135 executor.go:111] Tasks: 0 done / 163 total; 53 can run I0217 08:36:43.570188 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:43.570221 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:43.570300 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:43.571932 7135 executor.go:111] Tasks: 53 done / 163 total; 26 can run I0217 08:36:43.574314 7135 executor.go:111] Tasks: 79 done / 163 total; 54 can run I0217 08:36:43.575066 7135 executor.go:111] Tasks: 133 done / 163 total; 6 can run W0217 08:36:43.575120 7135 api.go:53] PageSize not implemented W0217 08:36:43.575144 7135 api.go:53] PageSize not implemented W0217 08:36:43.575267 7135 api.go:53] PageSize not implemented W0217 08:36:43.575337 7135 api.go:53] PageSize not implemented I0217 08:36:43.579583 7135 executor.go:111] Tasks: 139 done / 163 total; 8 can run I0217 08:36:43.579737 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.579906 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.580101 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.580289 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.580360 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.580543 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.580675 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.580734 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.580807 7135 executor.go:111] Tasks: 147 done / 163 total; 4 can run I0217 08:36:43.581136 7135 executor.go:111] Tasks: 151 done / 163 total; 12 can run I0217 08:36:43.581458 7135 executor.go:111] Tasks: 163 done / 163 total; 0 can run I0217 08:36:43.589833 7135 target.go:111] Terraform output is in /tmp/test3802446871/out --- PASS: TestExistingSG (1.44s) === RUN TestBastionAdditionalUserData I0217 08:36:43.599130 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:43.599342 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:43.599376 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:43.599418 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:43.599449 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:43.599488 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:43.599522 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:43.599543 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:43.599572 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:43.599594 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:43.622672 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:43.625460 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.625521 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:43.625562 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:44.847286 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:44.999066 7135 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0217 08:36:45.000003 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:45.000038 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:45.000126 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:45.002823 7135 executor.go:111] Tasks: 47 done / 137 total; 30 can run I0217 08:36:45.005533 7135 executor.go:111] Tasks: 77 done / 137 total; 35 can run I0217 08:36:45.006068 7135 executor.go:111] Tasks: 112 done / 137 total; 6 can run W0217 08:36:45.006173 7135 api.go:53] PageSize not implemented W0217 08:36:45.006220 7135 api.go:53] PageSize not implemented W0217 08:36:45.006284 7135 api.go:53] PageSize not implemented I0217 08:36:45.010562 7135 executor.go:111] Tasks: 118 done / 137 total; 7 can run I0217 08:36:45.010735 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:45.010918 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:45.011111 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:45.011291 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:45.011363 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:45.011756 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:45.011841 7135 executor.go:111] Tasks: 125 done / 137 total; 3 can run I0217 08:36:45.012167 7135 executor.go:111] Tasks: 128 done / 137 total; 9 can run I0217 08:36:45.012499 7135 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0217 08:36:45.026099 7135 target.go:111] Terraform output is in /tmp/test1810104648/out --- PASS: TestBastionAdditionalUserData (1.43s) === RUN TestPrivateFlannel I0217 08:36:45.031501 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:45.031704 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:45.031740 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:45.031783 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:45.031815 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:45.031855 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:45.031927 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:45.031950 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:45.031980 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:45.032003 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:45.054151 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:36:45.056884 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:45.056948 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:45.056989 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:46.273682 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:46.436322 7135 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0217 08:36:46.440804 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:46.440854 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:46.440976 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:46.443921 7135 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0217 08:36:46.446791 7135 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0217 08:36:46.447328 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:46.447489 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:46.447571 7135 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0217 08:36:46.447728 7135 api.go:53] PageSize not implemented W0217 08:36:46.447849 7135 api.go:53] PageSize not implemented I0217 08:36:46.452274 7135 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0217 08:36:46.452504 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:46.452695 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:46.452850 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:46.453313 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:46.453411 7135 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0217 08:36:46.453648 7135 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0217 08:36:46.453927 7135 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0217 08:36:46.460507 7135 target.go:111] Terraform output is in /tmp/test216693510/out --- PASS: TestPrivateFlannel (1.43s) === RUN TestPrivateCalico I0217 08:36:46.465188 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:46.465374 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:46.465408 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:46.465452 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:46.465482 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:46.465520 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:46.465587 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:46.465609 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:46.465638 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:46.465662 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:46.488167 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:36:46.491115 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:46.491172 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:46.491210 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:47.713879 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:48.087790 7135 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0217 08:36:48.088237 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:48.088276 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:48.088362 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:48.090770 7135 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0217 08:36:48.093429 7135 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0217 08:36:48.093838 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:48.094005 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:48.094117 7135 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0217 08:36:48.094176 7135 api.go:53] PageSize not implemented W0217 08:36:48.094301 7135 api.go:53] PageSize not implemented I0217 08:36:48.098626 7135 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0217 08:36:48.098809 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:48.098937 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:48.099331 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:48.099405 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:48.099467 7135 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0217 08:36:48.099715 7135 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0217 08:36:48.099978 7135 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0217 08:36:48.107306 7135 target.go:111] Terraform output is in /tmp/test2706980165/out --- PASS: TestPrivateCalico (1.65s) === RUN TestPrivateCilium I0217 08:36:48.117034 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:48.117246 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:48.117309 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:48.117352 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:48.117386 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:48.117429 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:48.117465 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:48.117487 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:48.117517 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:48.117541 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:48.141722 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:48.144961 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:48.145029 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:48.145074 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:49.389473 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:49.569721 7135 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0217 08:36:49.570474 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:49.570504 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:49.570580 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:49.572399 7135 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0217 08:36:49.575044 7135 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0217 08:36:49.575484 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:49.575606 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:49.575689 7135 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0217 08:36:49.575742 7135 api.go:53] PageSize not implemented W0217 08:36:49.575759 7135 api.go:53] PageSize not implemented I0217 08:36:49.579970 7135 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0217 08:36:49.580127 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:49.580261 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:49.580568 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:49.580781 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:49.580867 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:36:49.581071 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:36:49.581337 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:36:49.588359 7135 target.go:111] Terraform output is in /tmp/test1869151909/out --- PASS: TestPrivateCilium (1.48s) === RUN TestPrivateCilium2 I0217 08:36:49.593352 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:49.593557 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:49.593596 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:49.593642 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:49.593675 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:49.593718 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:49.593793 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:49.593818 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:49.593862 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:49.593887 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:49.617025 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:36:49.620270 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:49.620338 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:49.620383 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:50.840316 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:51.414454 7135 executor.go:111] Tasks: 0 done / 138 total; 50 can run I0217 08:36:51.415120 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:51.415159 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:51.415245 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:51.419021 7135 executor.go:111] Tasks: 50 done / 138 total; 30 can run I0217 08:36:51.421805 7135 executor.go:111] Tasks: 80 done / 138 total; 36 can run I0217 08:36:51.422490 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:51.422621 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:51.422713 7135 executor.go:111] Tasks: 116 done / 138 total; 6 can run W0217 08:36:51.422911 7135 api.go:53] PageSize not implemented W0217 08:36:51.422961 7135 api.go:53] PageSize not implemented I0217 08:36:51.427425 7135 executor.go:111] Tasks: 122 done / 138 total; 8 can run I0217 08:36:51.427719 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:51.427940 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:51.428323 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:51.428400 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:51.428466 7135 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0217 08:36:51.428692 7135 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0217 08:36:51.428947 7135 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0217 08:36:51.436109 7135 target.go:111] Terraform output is in /tmp/test3737937062/out --- PASS: TestPrivateCilium2 (1.85s) === RUN TestPrivateCiliumAdvanced I0217 08:36:51.447743 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:51.447968 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:51.448005 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:51.448045 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:51.448079 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:51.448120 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:51.448154 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:51.448177 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:51.448206 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:51.448229 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:51.477572 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:51.480990 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:51.481062 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:51.481109 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:52.687025 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:52.865713 7135 executor.go:111] Tasks: 0 done / 142 total; 54 can run I0217 08:36:52.866159 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:52.866183 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:52.866365 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:52.872121 7135 executor.go:111] Tasks: 54 done / 142 total; 30 can run I0217 08:36:52.875202 7135 executor.go:111] Tasks: 84 done / 142 total; 36 can run I0217 08:36:52.875565 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:52.875703 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:52.875840 7135 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0217 08:36:52.875902 7135 api.go:53] PageSize not implemented W0217 08:36:52.876004 7135 api.go:53] PageSize not implemented I0217 08:36:52.881030 7135 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0217 08:36:52.881207 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:52.881405 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:52.881786 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:52.881838 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:52.881929 7135 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0217 08:36:52.882180 7135 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0217 08:36:52.882394 7135 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0217 08:36:52.889832 7135 target.go:111] Terraform output is in /tmp/test2486120451/out --- PASS: TestPrivateCiliumAdvanced (1.45s) === RUN TestPrivateCiliumENI I0217 08:36:52.895022 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:52.895226 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:52.895265 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:52.895303 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:52.895335 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:52.895379 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:52.895413 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:52.895436 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:52.895466 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:52.895491 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:52.922809 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:52.926443 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:52.926583 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:52.926672 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:54.187977 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:54.372026 7135 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0217 08:36:54.374309 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:54.374342 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:54.374451 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:54.376953 7135 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0217 08:36:54.379834 7135 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0217 08:36:54.380265 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:54.380396 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:54.380681 7135 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0217 08:36:54.380782 7135 api.go:53] PageSize not implemented W0217 08:36:54.380891 7135 api.go:53] PageSize not implemented I0217 08:36:54.387992 7135 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0217 08:36:54.388282 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:54.388476 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:54.388743 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:54.389122 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:54.389213 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:36:54.389471 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:36:54.389733 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:36:54.397284 7135 target.go:111] Terraform output is in /tmp/test206791393/out --- PASS: TestPrivateCiliumENI (1.51s) === RUN TestPrivateCanal I0217 08:36:54.402227 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:54.402428 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:54.402470 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:54.402511 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:54.402543 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:54.402583 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:54.402655 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:54.402679 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:54.402709 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:54.402732 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:54.425477 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:36:54.428374 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:54.428445 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:54.428490 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:55.642069 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:55.985846 7135 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0217 08:36:55.986600 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:55.986636 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:55.986737 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:55.989008 7135 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0217 08:36:55.991597 7135 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0217 08:36:55.992084 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:55.992228 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:55.992325 7135 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0217 08:36:55.992412 7135 api.go:53] PageSize not implemented W0217 08:36:55.992451 7135 api.go:53] PageSize not implemented I0217 08:36:55.996699 7135 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0217 08:36:55.996955 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:55.997133 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:55.997390 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:55.997708 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:55.997796 7135 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0217 08:36:55.998030 7135 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0217 08:36:55.998291 7135 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0217 08:36:56.005198 7135 target.go:111] Terraform output is in /tmp/test1462976434/out --- PASS: TestPrivateCanal (1.61s) === RUN TestPrivateKopeio I0217 08:36:56.010581 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:56.010802 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:56.010841 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:56.010882 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:56.010912 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:56.010953 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:56.010986 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:56.011009 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:56.011039 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:56.011063 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:56.035189 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:56.038128 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:56.038212 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:56.038284 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:57.247551 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:57.398702 7135 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0217 08:36:57.399562 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:57.399597 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:57.399706 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:57.401006 7135 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0217 08:36:57.403622 7135 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0217 08:36:57.404278 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:57.404825 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:57.404923 7135 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0217 08:36:57.404976 7135 api.go:53] PageSize not implemented W0217 08:36:57.405050 7135 api.go:53] PageSize not implemented I0217 08:36:57.409158 7135 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0217 08:36:57.409295 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:57.409487 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:57.409809 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:57.409920 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:57.410021 7135 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0217 08:36:57.410246 7135 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0217 08:36:57.410485 7135 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0217 08:36:57.417642 7135 target.go:111] Terraform output is in /tmp/test2379142208/out --- PASS: TestPrivateKopeio (1.41s) === RUN TestUnmanaged I0217 08:36:57.422449 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:57.422654 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:57.422730 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:57.422770 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:57.422802 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:57.422848 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:57.422881 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:57.422903 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:57.422932 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:57.422956 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:57.451184 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:57.454006 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:57.454073 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:57.454116 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:58.666167 7135 zones.go:93] ListHostedZonesPages { } I0217 08:36:58.814722 7135 executor.go:111] Tasks: 0 done / 126 total; 46 can run I0217 08:36:58.815132 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:36:58.815150 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:36:58.815207 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:36:58.818117 7135 executor.go:111] Tasks: 46 done / 126 total; 27 can run I0217 08:36:58.820632 7135 executor.go:111] Tasks: 73 done / 126 total; 33 can run I0217 08:36:58.821317 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:58.821459 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:58.821535 7135 executor.go:111] Tasks: 106 done / 126 total; 5 can run W0217 08:36:58.821589 7135 api.go:53] PageSize not implemented W0217 08:36:58.821665 7135 api.go:53] PageSize not implemented I0217 08:36:58.825817 7135 executor.go:111] Tasks: 111 done / 126 total; 7 can run I0217 08:36:58.825966 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:58.826143 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:58.826293 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:58.826684 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:58.826771 7135 executor.go:111] Tasks: 118 done / 126 total; 2 can run I0217 08:36:58.826987 7135 executor.go:111] Tasks: 120 done / 126 total; 6 can run I0217 08:36:58.827255 7135 executor.go:111] Tasks: 126 done / 126 total; 0 can run I0217 08:36:58.833701 7135 target.go:111] Terraform output is in /tmp/test474048593/out --- PASS: TestUnmanaged (1.42s) === RUN TestPrivateSharedSubnet I0217 08:36:58.838381 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:58.838584 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:58.838622 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:58.838667 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:58.838701 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:58.838745 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:58.838783 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:58.838807 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:58.838839 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:58.838865 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:58.865636 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:36:58.868385 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:58.868453 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:36:58.868495 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:00.066812 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:00.216741 7135 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0217 08:37:00.218504 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:00.218539 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:00.218648 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:00.219581 7135 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0217 08:37:00.219986 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:37:00.221962 7135 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0217 08:37:00.222413 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:00.222547 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:00.222636 7135 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0217 08:37:00.222695 7135 api.go:53] PageSize not implemented W0217 08:37:00.222732 7135 api.go:53] PageSize not implemented I0217 08:37:00.227006 7135 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0217 08:37:00.227162 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:00.227315 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:00.227524 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:00.227966 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:00.228054 7135 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0217 08:37:00.228306 7135 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0217 08:37:00.228600 7135 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0217 08:37:00.234911 7135 target.go:111] Terraform output is in /tmp/test3535205017/out --- PASS: TestPrivateSharedSubnet (1.40s) === RUN TestPrivateSharedIP I0217 08:37:00.241674 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:00.242365 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:00.242420 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:00.243706 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:00.243776 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:00.243852 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:00.243890 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:00.243911 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:00.243959 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:00.243987 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:00.267457 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:00.270444 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:00.270509 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:00.270556 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:01.508820 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:01.652677 7135 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0217 08:37:01.653538 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:01.653576 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:01.653658 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:01.655607 7135 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0217 08:37:01.655742 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:37:01.658254 7135 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0217 08:37:01.658587 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:01.658732 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:01.658861 7135 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0217 08:37:01.658925 7135 api.go:53] PageSize not implemented W0217 08:37:01.658967 7135 api.go:53] PageSize not implemented I0217 08:37:01.662879 7135 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0217 08:37:01.662992 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:01.663197 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:01.663357 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:01.663603 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:01.663695 7135 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0217 08:37:01.663922 7135 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0217 08:37:01.664169 7135 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0217 08:37:01.673800 7135 target.go:111] Terraform output is in /tmp/test3370533855/out --- PASS: TestPrivateSharedIP (1.44s) === RUN TestPrivateDns1 I0217 08:37:01.678447 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:01.678639 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:01.678674 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:01.678716 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:01.678747 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:01.678800 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:01.678833 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:01.678854 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:01.678884 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:01.678905 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0217 08:37:01.705403 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:01.705468 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:01.705510 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:03.125571 7135 executor.go:111] Tasks: 0 done / 135 total; 46 can run I0217 08:37:03.128467 7135 executor.go:111] Tasks: 46 done / 135 total; 28 can run I0217 08:37:03.128756 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "internal.example.com" I0217 08:37:03.128789 7135 zones.go:40] GetHostedZone { Id: "/hostedzone/Z2AFAKE1ZON3NO" } I0217 08:37:03.128859 7135 dnszone.go:248] Existing zone "internal.example.com." found; will configure TF to reuse I0217 08:37:03.128873 7135 dnszone.go:271] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding I0217 08:37:03.129063 7135 executor.go:111] Tasks: 74 done / 135 total; 39 can run I0217 08:37:03.129379 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:03.129495 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:03.131547 7135 executor.go:111] Tasks: 113 done / 135 total; 6 can run W0217 08:37:03.131617 7135 api.go:53] PageSize not implemented W0217 08:37:03.131696 7135 api.go:53] PageSize not implemented I0217 08:37:03.135912 7135 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0217 08:37:03.136084 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:03.136280 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:03.137749 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:03.138446 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:03.138647 7135 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0217 08:37:03.139427 7135 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0217 08:37:03.140497 7135 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0217 08:37:03.148923 7135 target.go:111] Terraform output is in /tmp/test2321467878/out --- PASS: TestPrivateDns1 (1.48s) === RUN TestPrivateDns2 I0217 08:37:03.153765 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:03.153991 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:03.154030 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:03.154073 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:03.154106 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:03.154148 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:03.154197 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:03.154221 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:03.154251 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:03.154273 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:03.176832 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:03.176884 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:03.176919 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:04.524933 7135 executor.go:111] Tasks: 0 done / 132 total; 45 can run I0217 08:37:04.528246 7135 executor.go:111] Tasks: 45 done / 132 total; 26 can run I0217 08:37:04.528616 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "private.example.com" I0217 08:37:04.528616 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:37:04.528661 7135 zones.go:40] GetHostedZone { Id: "/hostedzone/Z3AFAKE1ZOMORE" } I0217 08:37:04.528750 7135 dnszone.go:248] Existing zone "private.example.com." found; will configure TF to reuse I0217 08:37:04.528775 7135 dnszone.go:262] VPC "vpc-12345678" already associated with zone "private.example.com." I0217 08:37:04.528931 7135 executor.go:111] Tasks: 71 done / 132 total; 39 can run I0217 08:37:04.529091 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:04.529237 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:04.532094 7135 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0217 08:37:04.532163 7135 api.go:53] PageSize not implemented W0217 08:37:04.532289 7135 api.go:53] PageSize not implemented I0217 08:37:04.540341 7135 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0217 08:37:04.540510 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:04.540692 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:04.540901 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:04.541273 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:04.541365 7135 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0217 08:37:04.541622 7135 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0217 08:37:04.541871 7135 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0217 08:37:04.549450 7135 target.go:111] Terraform output is in /tmp/test1934656513/out --- PASS: TestPrivateDns2 (1.40s) === RUN TestDiscoveryFeatureGate I0217 08:37:04.554143 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:04.554347 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:04.554383 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:04.554422 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:04.554453 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:04.554498 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:04.554569 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:04.554593 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:04.554623 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:04.554646 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:04.575354 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:37:04.578297 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:04.578365 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:05.842430 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:06.021969 7135 executor.go:111] Tasks: 0 done / 113 total; 52 can run I0217 08:37:06.023399 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:06.023426 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:06.023498 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:06.025036 7135 executor.go:111] Tasks: 52 done / 113 total; 28 can run I0217 08:37:06.030391 7135 executor.go:111] Tasks: 80 done / 113 total; 25 can run I0217 08:37:06.030569 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:06.030808 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:06.031107 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:06.031194 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:06.031288 7135 executor.go:111] Tasks: 105 done / 113 total; 2 can run I0217 08:37:06.031500 7135 executor.go:111] Tasks: 107 done / 113 total; 6 can run I0217 08:37:06.031762 7135 executor.go:111] Tasks: 113 done / 113 total; 0 can run I0217 08:37:06.038640 7135 target.go:111] Terraform output is in /tmp/test368487320/out --- PASS: TestDiscoveryFeatureGate (1.49s) === RUN TestVFSServiceAccountIssuerDiscovery I0217 08:37:06.044551 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:06.044755 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:06.044793 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:06.044835 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:06.044868 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:06.044912 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:06.044947 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:06.044972 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:06.045005 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:06.045030 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:06.065254 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:06.068000 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:06.068070 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:07.314161 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:07.460192 7135 executor.go:111] Tasks: 0 done / 104 total; 47 can run I0217 08:37:07.460778 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:07.460806 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:07.460882 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:07.464710 7135 executor.go:111] Tasks: 47 done / 104 total; 24 can run I0217 08:37:07.469275 7135 executor.go:111] Tasks: 71 done / 104 total; 25 can run I0217 08:37:07.469720 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:07.469927 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:07.470295 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:07.470434 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:07.470529 7135 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0217 08:37:07.470783 7135 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0217 08:37:07.471056 7135 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0217 08:37:07.476830 7135 target.go:111] Terraform output is in /tmp/test1021306271/out --- PASS: TestVFSServiceAccountIssuerDiscovery (1.44s) === RUN TestAWSLBController I0217 08:37:07.481537 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:07.481735 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:07.481770 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:07.481805 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:07.481834 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:07.481875 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:07.481905 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:07.481930 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:07.481961 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:07.481983 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:07.502635 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:07.505397 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:07.505465 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:08.726876 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:09.346313 7135 executor.go:111] Tasks: 0 done / 116 total; 54 can run I0217 08:37:09.348161 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:09.348197 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:09.348272 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:09.350531 7135 executor.go:111] Tasks: 54 done / 116 total; 29 can run I0217 08:37:09.358973 7135 executor.go:111] Tasks: 83 done / 116 total; 25 can run I0217 08:37:09.359241 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:09.359653 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:09.359849 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:09.360026 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:09.360123 7135 executor.go:111] Tasks: 108 done / 116 total; 2 can run I0217 08:37:09.360348 7135 executor.go:111] Tasks: 110 done / 116 total; 6 can run I0217 08:37:09.360623 7135 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0217 08:37:09.369329 7135 target.go:111] Terraform output is in /tmp/test841220241/out --- PASS: TestAWSLBController (1.90s) === RUN TestManyAddons I0217 08:37:09.377993 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:09.378181 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:09.378217 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:09.378260 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:09.378289 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:09.378331 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:09.378362 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:09.378385 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:09.378412 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:09.378434 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:09.399580 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:09.402326 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:09.402388 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:10.624196 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:11.318516 7135 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0217 08:37:11.320642 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:11.320670 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:11.320745 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:11.322506 7135 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0217 08:37:11.326990 7135 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0217 08:37:11.327171 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:11.327473 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:11.327716 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:11.327900 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:11.328012 7135 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0217 08:37:11.328267 7135 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0217 08:37:11.328548 7135 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0217 08:37:11.335626 7135 target.go:111] Terraform output is in /tmp/test2315506490/out --- PASS: TestManyAddons (1.97s) === RUN TestManyAddonsCCMIRSA I0217 08:37:11.348122 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:11.348381 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:11.348437 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:11.348499 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:11.348544 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:11.348604 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:11.348652 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:11.348694 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:11.348734 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:11.348756 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:11.371160 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:11.374080 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:11.374141 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:12.632191 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:13.356812 7135 executor.go:111] Tasks: 0 done / 123 total; 59 can run I0217 08:37:13.357167 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:13.357188 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:13.357278 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:13.360147 7135 executor.go:111] Tasks: 59 done / 123 total; 30 can run I0217 08:37:13.364976 7135 executor.go:111] Tasks: 89 done / 123 total; 26 can run I0217 08:37:13.365429 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:13.365633 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:13.365987 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:13.366053 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:13.366127 7135 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0217 08:37:13.366382 7135 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0217 08:37:13.366622 7135 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0217 08:37:13.374610 7135 target.go:111] Terraform output is in /tmp/test2027277364/out --- PASS: TestManyAddonsCCMIRSA (2.04s) === RUN TestManyAddonsCCMIRSA23 I0217 08:37:13.390337 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:13.390534 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:13.390567 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:13.390622 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:13.390657 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:13.390699 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:13.390732 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:13.390753 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:13.390782 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:13.390804 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:13.412702 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0217 08:37:13.415638 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:13.415701 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:14.639430 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:15.367789 7135 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0217 08:37:15.368183 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:15.368226 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:15.368309 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:15.371620 7135 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0217 08:37:15.376760 7135 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0217 08:37:15.376996 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:15.377200 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:15.377590 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:15.377649 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:15.377754 7135 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0217 08:37:15.377996 7135 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0217 08:37:15.378252 7135 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0217 08:37:15.390538 7135 target.go:111] Terraform output is in /tmp/test3039843011/out --- PASS: TestManyAddonsCCMIRSA23 (2.01s) === RUN TestManyAddonsCCMIRSA24 I0217 08:37:15.402359 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:15.402547 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:15.402583 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:15.402622 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:15.402654 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:15.402694 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:15.402729 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:15.402752 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:15.402781 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:15.402804 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:15.424409 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:37:15.426959 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:15.427017 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:16.674405 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:17.407134 7135 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0217 08:37:17.408186 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:17.408215 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:17.408288 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:17.410526 7135 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0217 08:37:17.418043 7135 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0217 08:37:17.419436 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:17.420314 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:17.420736 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:17.421035 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:17.421148 7135 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0217 08:37:17.421528 7135 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0217 08:37:17.421807 7135 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0217 08:37:17.430384 7135 target.go:111] Terraform output is in /tmp/test3740263281/out --- PASS: TestManyAddonsCCMIRSA24 (2.04s) === RUN TestManyAddonsCCMIRSA25 I0217 08:37:17.440166 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:17.440351 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:17.440386 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:17.440431 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:17.440463 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:17.440508 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:17.440543 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:17.440566 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:17.440608 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:17.440633 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:17.462036 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0217 08:37:17.464780 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:17.464842 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:18.723417 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:19.451675 7135 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0217 08:37:19.452580 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:19.452609 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:19.452684 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:19.455516 7135 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0217 08:37:19.461345 7135 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0217 08:37:19.461748 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:19.461988 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:19.462241 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:19.462628 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:19.462721 7135 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0217 08:37:19.462962 7135 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0217 08:37:19.463241 7135 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0217 08:37:19.471719 7135 target.go:111] Terraform output is in /tmp/test1695751485/out --- PASS: TestManyAddonsCCMIRSA25 (2.05s) === RUN TestManyAddonsCCMIRSA26 I0217 08:37:19.485381 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:19.485586 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:19.485622 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:19.485663 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:19.485696 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:19.485738 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:19.485772 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:19.485794 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:19.485823 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:19.485846 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:19.508440 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0217 08:37:19.511568 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:19.511636 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:20.724494 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:21.480306 7135 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0217 08:37:21.483161 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:21.483200 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:21.483277 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:21.488553 7135 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0217 08:37:21.493054 7135 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0217 08:37:21.493331 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:21.493548 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:21.493690 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:21.493986 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:21.494069 7135 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0217 08:37:21.494303 7135 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0217 08:37:21.494543 7135 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0217 08:37:21.506659 7135 target.go:111] Terraform output is in /tmp/test127970913/out --- PASS: TestManyAddonsCCMIRSA26 (2.03s) === RUN TestManyAddonsGCE I0217 08:37:21.518771 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:37:23.540987 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:37:23.541073 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:37:23.541184 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/main" W0217 08:37:23.541208 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/events" W0217 08:37:23.541228 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com" W0217 08:37:23.541287 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0217 08:37:23.542643 7135 executor.go:111] Tasks: 0 done / 67 total; 44 can run I0217 08:37:23.546961 7135 executor.go:111] Tasks: 44 done / 67 total; 17 can run I0217 08:37:23.551837 7135 executor.go:111] Tasks: 61 done / 67 total; 4 can run I0217 08:37:23.552714 7135 executor.go:111] Tasks: 65 done / 67 total; 2 can run I0217 08:37:23.552902 7135 executor.go:111] Tasks: 67 done / 67 total; 0 can run I0217 08:37:23.557886 7135 target.go:111] Terraform output is in /tmp/test3772821962/out --- PASS: TestManyAddonsGCE (2.05s) === RUN TestCCM I0217 08:37:23.565669 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:23.565869 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:23.565908 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:23.565949 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:23.565983 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:23.566023 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:23.566057 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:23.566078 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:23.566107 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:23.566129 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:23.592334 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:23.595972 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:23.596047 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:24.852258 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:25.530881 7135 executor.go:111] Tasks: 0 done / 110 total; 51 can run I0217 08:37:25.532047 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:25.532080 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:25.532154 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:25.536834 7135 executor.go:111] Tasks: 51 done / 110 total; 24 can run I0217 08:37:25.540202 7135 executor.go:111] Tasks: 75 done / 110 total; 27 can run I0217 08:37:25.540526 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:25.540748 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:25.540959 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:25.541318 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:25.541409 7135 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0217 08:37:25.541664 7135 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0217 08:37:25.541942 7135 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0217 08:37:25.553296 7135 target.go:111] Terraform output is in /tmp/test1349582951/out --- PASS: TestCCM (2.00s) === RUN TestExternalDNS I0217 08:37:25.561591 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:25.561796 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:25.561834 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:25.561879 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:25.561911 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:25.561952 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:25.561986 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:25.562008 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:25.562037 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:25.562060 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:25.581554 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:25.584298 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:25.584369 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:26.797019 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:26.945698 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:37:26.950347 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:26.950394 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:26.950666 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:26.953143 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:37:26.957840 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:37:26.958105 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:26.958308 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:26.958437 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:26.958874 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:26.958955 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:37:26.959164 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:37:26.959427 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:37:26.965118 7135 target.go:111] Terraform output is in /tmp/test1492241264/out --- PASS: TestExternalDNS (1.41s) === RUN TestExternalDNSIRSA I0217 08:37:26.969627 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:26.969829 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:26.969865 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:26.969907 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:26.969940 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:26.969980 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:26.970015 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:26.970037 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:26.970066 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:26.970090 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:26.990826 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:26.993728 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:26.993799 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:28.283368 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:28.473754 7135 executor.go:111] Tasks: 0 done / 112 total; 51 can run I0217 08:37:28.474346 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:28.474389 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:28.474509 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:28.480176 7135 executor.go:111] Tasks: 51 done / 112 total; 28 can run I0217 08:37:28.485198 7135 executor.go:111] Tasks: 79 done / 112 total; 25 can run I0217 08:37:28.485551 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:28.485685 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:28.485941 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:28.486159 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:28.486217 7135 executor.go:111] Tasks: 104 done / 112 total; 2 can run I0217 08:37:28.486483 7135 executor.go:111] Tasks: 106 done / 112 total; 6 can run I0217 08:37:28.486730 7135 executor.go:111] Tasks: 112 done / 112 total; 0 can run I0217 08:37:28.492797 7135 target.go:111] Terraform output is in /tmp/test2238768598/out --- PASS: TestExternalDNSIRSA (1.53s) === RUN TestKarpenter I0217 08:37:28.497966 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:28.498151 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:28.498184 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:28.498223 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:28.498254 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:28.498293 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:28.498326 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:28.498347 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:28.498377 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:28.498399 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:28.522735 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:37:28.525567 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:28.525663 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:28.525707 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:29.746736 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:29.905801 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:29.905882 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:29.905949 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0217 08:37:30.027312 7135 pruning.go:115] manifest includes an object of GroupKind Secret, which will not be pruned W0217 08:37:30.027378 7135 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0217 08:37:30.027392 7135 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned W0217 08:37:30.027402 7135 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0217 08:37:30.027411 7135 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned I0217 08:37:30.046356 7135 executor.go:111] Tasks: 0 done / 122 total; 54 can run I0217 08:37:30.050100 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:30.050143 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:30.050265 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:30.054047 7135 executor.go:111] Tasks: 54 done / 122 total; 31 can run I0217 08:37:30.058677 7135 executor.go:111] Tasks: 85 done / 122 total; 29 can run I0217 08:37:30.058908 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:30.059043 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:30.059285 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:30.059482 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:30.059598 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:30.059685 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:30.059866 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:30.059965 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:30.060072 7135 executor.go:111] Tasks: 114 done / 122 total; 2 can run I0217 08:37:30.060319 7135 executor.go:111] Tasks: 116 done / 122 total; 6 can run I0217 08:37:30.060576 7135 executor.go:111] Tasks: 122 done / 122 total; 0 can run I0217 08:37:30.068801 7135 target.go:111] Terraform output is in /tmp/test851523953/out --- PASS: TestKarpenter (1.58s) === RUN TestSharedSubnet I0217 08:37:30.075548 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:30.075752 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:30.075790 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:30.075834 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:30.075865 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:30.075906 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:30.075939 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:30.075961 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:30.075990 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:30.076014 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:30.099187 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:30.102300 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:30.102370 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:31.344688 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:31.502754 7135 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0217 08:37:31.504197 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:31.504228 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:31.504319 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:31.505874 7135 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0217 08:37:31.506258 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:37:31.510262 7135 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0217 08:37:31.510528 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:31.510727 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:31.511071 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:31.511138 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:31.511194 7135 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0217 08:37:31.511390 7135 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0217 08:37:31.511557 7135 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0217 08:37:31.520782 7135 target.go:111] Terraform output is in /tmp/test1355771960/out --- PASS: TestSharedSubnet (1.45s) === RUN TestSharedVPC I0217 08:37:31.525415 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:31.525630 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:31.525672 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:31.525724 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:31.525767 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:31.525813 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:31.525854 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:31.525881 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:31.525913 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:31.525948 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:31.545820 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:31.548529 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:31.548609 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:32.789091 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:32.935399 7135 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0217 08:37:32.935787 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:32.935821 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:32.935901 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:32.941642 7135 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0217 08:37:32.942508 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:37:32.947150 7135 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0217 08:37:32.947348 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:32.947465 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:32.947740 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:32.948093 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:32.948177 7135 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0217 08:37:32.948390 7135 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0217 08:37:32.948655 7135 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0217 08:37:32.953767 7135 target.go:111] Terraform output is in /tmp/test2315136135/out --- PASS: TestSharedVPC (1.43s) === RUN TestSharedVPCIPv6 I0217 08:37:32.957980 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:32.958157 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:32.958192 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:32.958232 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:32.958264 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:32.958306 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:32.958342 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:32.958365 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:32.958394 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:32.958416 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:32.960111 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:37:32.960155 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:37:32.981871 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:37:32.981914 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0217 08:37:32.981993 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:37:32.985292 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:32.985359 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:34.237836 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:34.399204 7135 executor.go:111] Tasks: 0 done / 133 total; 45 can run I0217 08:37:34.400696 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:34.400732 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:34.400848 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:34.402393 7135 executor.go:111] Tasks: 45 done / 133 total; 29 can run I0217 08:37:34.402553 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:37:34.403229 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:37:34.408789 7135 executor.go:111] Tasks: 74 done / 133 total; 37 can run I0217 08:37:34.409787 7135 executor.go:111] Tasks: 111 done / 133 total; 6 can run I0217 08:37:34.409889 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:37:34.409985 7135 loadbalancers.go:35] PageSize not implemented I0217 08:37:34.410093 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:37:34.410160 7135 loadbalancers.go:35] PageSize not implemented I0217 08:37:34.414895 7135 executor.go:111] Tasks: 117 done / 133 total; 8 can run I0217 08:37:34.415210 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:34.415409 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:34.415764 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:34.415834 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:34.415896 7135 executor.go:111] Tasks: 125 done / 133 total; 2 can run I0217 08:37:34.416158 7135 executor.go:111] Tasks: 127 done / 133 total; 6 can run I0217 08:37:34.416460 7135 executor.go:111] Tasks: 133 done / 133 total; 0 can run I0217 08:37:34.423017 7135 target.go:111] Terraform output is in /tmp/test444199219/out --- PASS: TestSharedVPCIPv6 (1.47s) === RUN TestExistingIAM I0217 08:37:34.427708 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:34.427910 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:34.427948 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:34.427989 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:34.428021 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:34.428062 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:34.428101 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:34.428124 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:34.428154 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:34.428176 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:34.455134 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:34.458229 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:34.458295 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:34.458339 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:34.458376 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.683263 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:35.841400 7135 executor.go:111] Tasks: 0 done / 117 total; 51 can run I0217 08:37:35.841863 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:35.841899 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:35.841979 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:35.844250 7135 executor.go:111] Tasks: 51 done / 117 total; 19 can run I0217 08:37:35.853090 7135 executor.go:111] Tasks: 70 done / 117 total; 31 can run I0217 08:37:35.853286 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.853577 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.853768 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.853890 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.854023 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.854223 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.854303 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.854438 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.854539 7135 executor.go:111] Tasks: 101 done / 117 total; 4 can run I0217 08:37:35.854862 7135 executor.go:111] Tasks: 105 done / 117 total; 12 can run I0217 08:37:35.855172 7135 executor.go:111] Tasks: 117 done / 117 total; 0 can run I0217 08:37:35.863228 7135 target.go:111] Terraform output is in /tmp/test919213531/out --- PASS: TestExistingIAM (1.44s) === RUN TestPhaseNetwork I0217 08:37:35.868284 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:35.868505 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:35.868541 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:35.868580 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:35.868612 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:35.868653 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:35.868687 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:35.868709 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:35.868739 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:35.868762 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:35.890763 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:35.893670 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.893817 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:35.893866 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:37.151723 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:37.310130 7135 executor.go:111] Tasks: 0 done / 135 total; 47 can run I0217 08:37:37.310585 7135 executor.go:111] Tasks: 47 done / 135 total; 30 can run I0217 08:37:37.311032 7135 executor.go:111] Tasks: 77 done / 135 total; 36 can run I0217 08:37:37.311379 7135 executor.go:111] Tasks: 113 done / 135 total; 6 can run I0217 08:37:37.311522 7135 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0217 08:37:37.311659 7135 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0217 08:37:37.311709 7135 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0217 08:37:37.311752 7135 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0217 08:37:37.312600 7135 target.go:111] Terraform output is in /tmp/test3683957768/out --- PASS: TestPhaseNetwork (1.44s) === RUN TestExternalLoadBalancer I0217 08:37:37.313105 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:37.313281 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:37.313317 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:37.313356 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:37.313389 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:37.313430 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:37.313466 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:37.313489 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:37.313519 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:37.313541 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:37.336168 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:37.339479 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:37.339560 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.605648 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:38.748153 7135 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0217 08:37:38.750926 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:38.750962 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:38.751045 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:38.755608 7135 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0217 08:37:38.760567 7135 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0217 08:37:38.761085 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.761470 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.761661 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.762101 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.762198 7135 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0217 08:37:38.762468 7135 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0217 08:37:38.762700 7135 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0217 08:37:38.768350 7135 target.go:111] Terraform output is in /tmp/test399164570/out --- PASS: TestExternalLoadBalancer (1.46s) === RUN TestPhaseIAM integration_test.go:1062: unable to test w/o allowing failed validation --- SKIP: TestPhaseIAM (0.00s) === RUN TestPhaseCluster integration_test.go:1070: unable to test w/o allowing failed validation --- SKIP: TestPhaseCluster (0.00s) === RUN TestMixedInstancesASG I0217 08:37:38.772899 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:38.773094 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:38.773131 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:38.773172 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:38.773203 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:38.773246 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:38.773279 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:38.773302 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:38.773332 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:38.773355 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:38.800569 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:38.803490 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.803553 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.803591 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.803627 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.803662 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.803695 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:38.803730 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.010522 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:40.175857 7135 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0217 08:37:40.176359 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:40.176391 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:40.176470 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:40.178996 7135 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0217 08:37:40.183700 7135 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0217 08:37:40.183894 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.184073 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.184245 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.184363 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.184699 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.184755 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.184831 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.184914 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.184988 7135 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0217 08:37:40.185267 7135 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0217 08:37:40.185512 7135 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0217 08:37:40.192514 7135 target.go:111] Terraform output is in /tmp/test1027313055/out --- PASS: TestMixedInstancesASG (1.43s) === RUN TestMixedInstancesSpotASG I0217 08:37:40.201827 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:40.202048 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:40.202085 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:40.202126 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:40.202157 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:40.202196 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:40.202231 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:40.202253 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:40.202285 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:40.202307 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:40.228978 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:40.232109 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.232179 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.232222 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.232260 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.232296 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.232330 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:40.232363 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.459809 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:41.619928 7135 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0217 08:37:41.621711 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:41.621747 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:41.621831 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:41.623312 7135 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0217 08:37:41.627946 7135 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0217 08:37:41.628248 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.628460 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.628712 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.628793 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.628953 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.629130 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.629305 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.629375 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.629442 7135 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0217 08:37:41.629739 7135 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0217 08:37:41.630033 7135 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0217 08:37:41.637773 7135 target.go:111] Terraform output is in /tmp/test164788147/out --- PASS: TestMixedInstancesSpotASG (1.44s) === RUN TestAdditionalObjects I0217 08:37:41.643298 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:41.643500 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:41.643539 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:41.643581 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:41.643613 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:41.643657 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:41.643692 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:41.643716 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:41.643746 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:41.643770 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:41.670675 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0217 08:37:41.673291 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:41.673362 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:42.901900 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:43.042723 7135 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0217 08:37:43.044024 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:43.044052 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:43.044158 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:43.045838 7135 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0217 08:37:43.050732 7135 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0217 08:37:43.051099 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:43.051297 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:43.052443 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:43.052911 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:43.053125 7135 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0217 08:37:43.053709 7135 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0217 08:37:43.054787 7135 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0217 08:37:43.062109 7135 target.go:111] Terraform output is in /tmp/test1398387296/out --- PASS: TestAdditionalObjects (1.42s) === RUN TestContainerd I0217 08:37:43.066485 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:43.066683 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:43.066719 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:43.066759 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:43.066791 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:43.066832 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:43.066864 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:43.066889 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:43.066919 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:43.066941 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:43.087096 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:43.089801 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:43.089875 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:44.308021 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:44.454634 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:37:44.459150 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:44.459859 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:44.459963 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:44.462368 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:37:44.467195 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:37:44.467373 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:44.467620 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:44.467949 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:44.468020 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:44.468088 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:37:44.468311 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:37:44.468589 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:37:44.474046 7135 target.go:111] Terraform output is in /tmp/test326495099/out --- PASS: TestContainerd (1.41s) === RUN TestContainerdCustom I0217 08:37:44.478465 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:44.478663 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:44.478701 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:44.478743 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:44.478777 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:44.478817 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:44.478852 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:44.478875 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:44.478904 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:44.478926 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:44.500049 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:44.502851 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:44.502922 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:44.978666 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:45.133716 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:37:45.137474 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:45.137510 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:45.137597 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:45.138651 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:37:45.143340 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:37:45.143732 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.143899 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.144178 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.144588 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.144686 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:37:45.144970 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:37:45.145233 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:37:45.150815 7135 target.go:111] Terraform output is in /tmp/test443944072/out --- PASS: TestContainerdCustom (0.68s) === RUN TestDockerCustom I0217 08:37:45.155234 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:45.155440 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:45.155478 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:45.155524 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:45.155557 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:45.155597 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:45.155991 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:45.156016 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:45.156047 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:45.156071 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:45.180778 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0217 08:37:45.183568 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.183635 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.655387 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:45.803589 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:37:45.805288 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:45.805319 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:45.805396 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:45.806123 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:37:45.815850 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:37:45.816340 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.816470 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.816802 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.817048 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.817136 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:37:45.817451 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:37:45.817696 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:37:45.822894 7135 target.go:111] Terraform output is in /tmp/test741465071/out --- PASS: TestDockerCustom (0.67s) === RUN TestAPIServerNodes I0217 08:37:45.827042 7135 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0217 08:37:45.827061 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:45.827237 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:45.827295 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:45.827345 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:45.827378 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:45.827417 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:45.827453 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:45.827475 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:45.827510 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:45.827533 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:45.848454 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0217 08:37:45.851047 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.851108 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:45.851152 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:47.187412 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:47.340632 7135 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0217 08:37:47.341957 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:47.341984 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:47.342068 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:47.343327 7135 executor.go:111] Tasks: 47 done / 114 total; 28 can run I0217 08:37:47.349715 7135 executor.go:111] Tasks: 75 done / 114 total; 27 can run I0217 08:37:47.350428 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:47.351187 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:47.352000 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:47.352106 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:47.352258 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:47.353491 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:47.353586 7135 executor.go:111] Tasks: 102 done / 114 total; 3 can run I0217 08:37:47.354011 7135 executor.go:111] Tasks: 105 done / 114 total; 9 can run I0217 08:37:47.354438 7135 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0217 08:37:47.361179 7135 target.go:111] Terraform output is in /tmp/test3774325908/out I0217 08:37:47.366017 7135 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestAPIServerNodes (1.54s) === RUN TestNTHIMDSProcessor I0217 08:37:47.366165 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:47.366379 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:47.366423 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:47.366494 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:47.366543 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:47.366610 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:47.366657 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:47.366703 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:47.366760 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:47.366798 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:47.386623 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:47.389407 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:47.389490 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:48.617904 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:48.766785 7135 executor.go:111] Tasks: 0 done / 90 total; 44 can run I0217 08:37:48.767004 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:48.767024 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:48.767124 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:48.769894 7135 executor.go:111] Tasks: 44 done / 90 total; 19 can run I0217 08:37:48.774266 7135 executor.go:111] Tasks: 63 done / 90 total; 21 can run I0217 08:37:48.774440 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:48.774716 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:48.774865 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:48.775320 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:48.775418 7135 executor.go:111] Tasks: 84 done / 90 total; 2 can run I0217 08:37:48.775643 7135 executor.go:111] Tasks: 86 done / 90 total; 4 can run I0217 08:37:48.775882 7135 executor.go:111] Tasks: 90 done / 90 total; 0 can run I0217 08:37:48.784732 7135 target.go:111] Terraform output is in /tmp/test2661982814/out --- PASS: TestNTHIMDSProcessor (1.42s) === RUN TestNTHIMDSProcessorIRSA I0217 08:37:48.789341 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:48.789545 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:48.789580 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:48.789623 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:48.789655 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:48.789694 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:48.789731 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:48.789754 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:48.789784 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:48.789807 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:48.810293 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:48.813065 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:48.813133 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:50.047630 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:50.229917 7135 executor.go:111] Tasks: 0 done / 101 total; 50 can run I0217 08:37:50.232377 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:50.232404 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:50.232458 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:50.234139 7135 executor.go:111] Tasks: 50 done / 101 total; 24 can run I0217 08:37:50.241836 7135 executor.go:111] Tasks: 74 done / 101 total; 21 can run I0217 08:37:50.242190 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:50.242318 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:50.242708 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:50.242855 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:50.242942 7135 executor.go:111] Tasks: 95 done / 101 total; 2 can run I0217 08:37:50.243197 7135 executor.go:111] Tasks: 97 done / 101 total; 4 can run I0217 08:37:50.243441 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:37:50.249446 7135 target.go:111] Terraform output is in /tmp/test2402856054/out --- PASS: TestNTHIMDSProcessorIRSA (1.47s) === RUN TestCustomIRSA I0217 08:37:50.254466 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:50.254657 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:50.254693 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:50.254734 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:50.254765 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:50.254807 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:50.254839 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:50.254861 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:50.254891 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:50.254915 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:50.277816 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:50.281337 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:50.281405 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:51.547989 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:52.086769 7135 executor.go:111] Tasks: 0 done / 114 total; 52 can run I0217 08:37:52.087872 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:52.087909 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:52.087986 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:52.091306 7135 executor.go:111] Tasks: 52 done / 114 total; 29 can run I0217 08:37:52.095901 7135 executor.go:111] Tasks: 81 done / 114 total; 25 can run I0217 08:37:52.096153 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:52.096458 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:52.096737 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:52.096836 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:52.096936 7135 executor.go:111] Tasks: 106 done / 114 total; 2 can run I0217 08:37:52.097191 7135 executor.go:111] Tasks: 108 done / 114 total; 6 can run I0217 08:37:52.097456 7135 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0217 08:37:52.104374 7135 target.go:111] Terraform output is in /tmp/test3684624713/out --- PASS: TestCustomIRSA (1.86s) === RUN TestClusterNameDigit I0217 08:37:52.116398 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:52.116608 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:52.116645 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:52.116686 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:52.116721 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:52.116761 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:52.116797 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:52.116818 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:52.116847 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:52.116870 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:52.140125 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:37:52.142983 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:52.143048 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:53.364645 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:53.516722 7135 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0217 08:37:53.517155 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:53.517192 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:53.517302 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:53.520210 7135 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0217 08:37:53.524757 7135 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0217 08:37:53.525093 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:53.525289 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:53.525536 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:53.526038 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:53.526161 7135 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0217 08:37:53.526440 7135 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0217 08:37:53.526695 7135 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0217 08:37:53.533426 7135 target.go:111] Terraform output is in /tmp/test2493503466/out --- PASS: TestClusterNameDigit (1.42s) === RUN TestCASPriorityExpander I0217 08:37:53.538545 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:53.538744 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:53.538781 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:53.538828 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:53.538860 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:53.538900 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:53.538934 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:53.538957 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:53.538986 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:53.539008 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:53.563166 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0217 08:37:53.566043 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:53.566107 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:53.566148 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:53.566185 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0217 08:37:55.494546 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:55.666926 7135 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0217 08:37:55.669650 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:55.669737 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:55.669799 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:55.673659 7135 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0217 08:37:55.678390 7135 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0217 08:37:55.678595 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.678767 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.678902 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.678983 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.679161 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.679211 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.679394 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.679571 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.679664 7135 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0217 08:37:55.680162 7135 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0217 08:37:55.680495 7135 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0217 08:37:55.686995 7135 target.go:111] Terraform output is in /tmp/test3254063344/out --- PASS: TestCASPriorityExpander (2.15s) === RUN TestCASPriorityExpanderCustom I0217 08:37:55.692164 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:55.692364 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:55.692401 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:55.692443 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:55.692475 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:55.692515 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:55.692551 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:55.692573 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:55.692603 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:55.692625 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:37:55.723253 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0217 08:37:55.727657 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.727786 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.727846 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:55.727888 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0217 08:37:56.953465 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:57.133495 7135 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0217 08:37:57.134437 7135 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0217 08:37:57.134464 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:57.134539 7135 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0217 08:37:57.138012 7135 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0217 08:37:57.146705 7135 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0217 08:37:57.147094 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:57.147324 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:57.147550 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:57.147751 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:57.147933 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:57.148023 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:57.148152 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:57.148334 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:57.148430 7135 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0217 08:37:57.148789 7135 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0217 08:37:57.149108 7135 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0217 08:37:57.155375 7135 target.go:111] Terraform output is in /tmp/test14420397/out --- PASS: TestCASPriorityExpanderCustom (1.47s) === RUN TestLifecycleMinimalAWS I0217 08:37:57.160711 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:37:57.160902 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:37:57.160937 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:37:57.160979 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:37:57.161011 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:37:57.161052 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:37:57.161085 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:37:57.161107 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:37:57.161136 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:37:57.161158 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0217 08:37:57.179624 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0217 08:37:57.182054 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:57.182117 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0217 08:37:58.512894 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:58.671489 7135 iamrole.go:89] ListRoles: { } I0217 08:37:58.672749 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:37:58.673081 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:37:58.673089 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:37:58.673251 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:37:58.673515 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" }] }] } I0217 08:37:58.673538 7135 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.673507 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0217 08:37:58.673700 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0217 08:37:58.673743 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0217 08:37:58.673698 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0217 08:37:58.673770 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:37:58.673818 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:37:58.673871 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0217 08:37:58.673965 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0217 08:37:58.674503 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:37:58.674651 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:37:58.674826 7135 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.675023 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:37:58.675096 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:37:58.675253 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:37:58.675376 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:37:58.675418 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:37:58.675514 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:37:58.675839 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:37:58.675969 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0217 08:37:58.676066 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0217 08:37:58.676123 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0217 08:37:58.676203 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0217 08:37:58.676140 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:37:58.676178 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0217 08:37:58.676262 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:37:58.676236 7135 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0217 08:37:58.676301 7135 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0217 08:37:58.676363 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0217 08:37:58.676369 7135 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.676439 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:37:58.676476 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:37:58.676478 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0217 08:37:58.676631 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" } ] }], VpcId: "vpc-1" } I0217 08:37:58.676634 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0217 08:37:58.676825 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:37:58.676909 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:37:58.676946 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:37:58.676980 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:37:58.677126 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0217 08:37:58.677286 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:37:58.677421 7135 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0217 08:37:58.677486 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:37:58.677524 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:37:58.677553 7135 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0217 08:37:58.677600 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:37:58.677667 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:37:58.677708 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:37:58.677593 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0217 08:37:58.680305 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:37:58.680444 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:37:58.680624 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:37:58.680700 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:58.680822 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:58.680898 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.681187 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.681371 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0217 08:37:58.681509 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:37:58.681623 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:37:58.681663 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0217 08:37:58.681787 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.681891 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:37:58.681958 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0217 08:37:58.682073 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0217 08:37:58.682199 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" }] }] } I0217 08:37:58.682305 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.682430 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:58.682522 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:58.682583 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.682728 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.682832 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.682936 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0217 08:37:58.682974 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0217 08:37:58.683005 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.683113 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:37:58.683271 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:37:58.683498 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:37:58.683704 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:37:58.683745 7135 zones.go:93] ListHostedZonesPages { } I0217 08:37:58.683776 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:37:58.683839 7135 dns.go:235] Pre-creating DNS records I0217 08:37:58.683865 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:37:58.688380 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0217 08:37:58.690856 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:37:58.690925 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0217 08:37:59.966696 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:00.111858 7135 iamrole.go:89] ListRoles: { } I0217 08:38:00.113100 7135 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0217 08:38:00.113581 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.113741 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0217 08:38:00.113825 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:00.113852 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:00.113891 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:00.113920 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:00.114038 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.114441 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.115020 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:00.116190 7135 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0217 08:38:00.116287 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.116419 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:00.116480 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0217 08:38:00.116455 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0217 08:38:00.116597 7135 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0217 08:38:00.116547 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.116669 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0217 08:38:00.116846 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:00.116916 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:00.116986 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:00.117026 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:00.117092 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.120726 7135 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0217 08:38:00.120835 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:00.121047 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:00.121159 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:00.121276 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:00.121433 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:00.121637 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:00.121755 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:00.122103 7135 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0217 08:38:00.122271 7135 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0217 08:38:00.122405 7135 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0217 08:38:00.124494 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:00.124541 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:00.124573 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:00.124597 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:00.124619 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:00.124642 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:00.124663 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:00.124686 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:00.124712 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:00.124743 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:00.124770 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:00.124793 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:00.124814 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:00.124840 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:00.124862 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:00.124886 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:00.124911 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:00.124934 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:00.124958 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:00.124978 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:00.124999 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:00.125023 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:00.125048 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:00.125072 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:00.126046 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:00.126122 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:00.126140 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:00.126173 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.126210 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0217 08:38:00.126250 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.126294 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.126327 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.126368 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.126399 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.126428 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0217 08:38:00.126464 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.126501 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:00.126528 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0217 08:38:00.126565 7135 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0217 08:38:00.126592 7135 api.go:53] PageSize not implemented I0217 08:38:00.126608 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:00.126628 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:00.126644 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:00.126666 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:00.126682 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0217 08:38:00.126727 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:00.126761 7135 iamrole.go:89] ListRoles: { } I0217 08:38:00.126796 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:00.126819 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:00.126853 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:00.126888 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:00.126916 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:00.127389 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0217 08:38:00.127454 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0217 08:38:00.127440 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } autoscaling-group:master-us-test-1a.masters.minimal.example.com ok volume:vol-1 ok I0217 08:38:00.127521 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0217 08:38:00.127542 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } autoscaling-group:nodes.minimal.example.com ok I0217 08:38:00.127581 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0217 08:38:00.127563 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:00.127529 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.minimal.example.com. ok I0217 08:38:00.127626 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0217 08:38:00.127777 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:00.127798 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:00.127831 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-1 ok I0217 08:38:00.127902 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:00.127938 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0217 08:38:00.128085 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:00.128101 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0217 08:38:00.128124 7135 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0217 08:38:00.128165 7135 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-2 ok I0217 08:38:00.128232 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0217 08:38:00.128275 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0217 08:38:00.128349 7135 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0217 08:38:00.128364 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0217 08:38:00.128394 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0217 08:38:00.128439 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0217 08:38:00.128505 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0217 08:38:00.128518 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0217 08:38:00.128567 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0217 08:38:00.128646 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0217 08:38:00.128722 7135 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0217 08:38:00.128785 7135 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleMinimalAWS (2.97s) === RUN TestLifecycleMinimalOpenstack I0217 08:38:00.129374 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster minimal-openstack.k8s.local I0217 08:38:00.135806 7135 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:38:01.488728 7135 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0217 08:38:01.488768 7135 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0217 08:38:01.503207 7135 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2025/02/17 08:38:01 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:01 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0217 08:38:01.506669 7135 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0217 08:38:01.518104 7135 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0217 08:38:01.520987 7135 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2025/02/17 08:38:01 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:01 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:01 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0217 08:38:01.523254 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0217 08:38:01.523285 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0217 08:38:01.523501 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0217 08:38:02.527199 7135 executor.go:111] Tasks: 92 done / 92 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:38:03.866312 7135 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0217 08:38:03.866339 7135 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0217 08:38:03.884402 7135 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2025/02/17 08:38:03 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:03 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0217 08:38:03.888327 7135 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0217 08:38:03.896906 7135 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0217 08:38:03.899707 7135 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2025/02/17 08:38:03 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:03 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:03 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0217 08:38:03.901737 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0217 08:38:03.902384 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0217 08:38:03.902708 7135 executor.go:111] Tasks: 92 done / 92 total; 0 can run I0217 08:38:03.904034 7135 delete_cluster.go:128] Looking for cloud resources to delete 2025/02/17 08:38:03 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) Port:1a914617-da10-4f8e-81e1-9c3773fbe94c ok Network:1f800762-8673-4b58-a856-62399a513306 ok SecurityGroup:1ec7d58a-6209-4092-9d7e-dfa170733ec0 ok SSHKey:kubernetes-minimal-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok SecurityGroup:576bd65f-a489-4da2-baa3-6e7fd8af527a ok Port:28e39c49-ba17-4ce2-b569-9339c251e816 ok Instance:7e750f7b-0f37-41d0-a580-b4ddd4c2d98a ok Subnet:ee44a596-5348-4317-907b-2bbefe9729f4 ok Port:dd089c29-6680-442e-a218-a0bcaa69a9b7 ok ServerGroup:8b423811-fe74-4cd0-9237-1cd8957fa899 ok Instance:630baa1f-f4d2-4bf2-bc26-3e1035cadf38 ok ServerGroup:24a9892d-78b1-42c2-a63f-56dccf74d90f ok Instance:d213bfb9-9c02-4d98-869c-b85cdbbd290f ok SecurityGroup:49f7cd67-1876-4a6f-af94-008910671fee ok --- PASS: TestLifecycleMinimalOpenstack (4.88s) === RUN TestLifecycleMinimalGCE I0217 08:38:05.006472 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:479: running lifecycle test for cluster minimal-gce.example.com I0217 08:38:05.008118 7135 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:38:06.608604 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:38:06.608676 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:38:06.608757 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0217 08:38:06.608774 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0217 08:38:06.608790 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0217 08:38:06.608837 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0217 08:38:06.609892 7135 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0217 08:38:06.616045 7135 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0217 08:38:06.621193 7135 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0217 08:38:06.621884 7135 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0217 08:38:06.622031 7135 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0217 08:38:06.622100 7135 dns.go:235] Pre-creating DNS records ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:38:08.216500 7135 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0217 08:38:08.216622 7135 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0217 08:38:08.216763 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0217 08:38:08.216789 7135 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0217 08:38:08.216821 7135 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0217 08:38:08.216893 7135 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0217 08:38:08.218123 7135 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0217 08:38:08.220675 7135 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0217 08:38:08.225244 7135 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0217 08:38:08.226041 7135 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0217 08:38:08.226156 7135 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0217 08:38:08.227605 7135 delete_cluster.go:128] Looking for cloud resources to delete I0217 08:38:08.227665 7135 gce.go:99] Scanning zones: [us-test1-a] I0217 08:38:08.228042 7135 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" I0217 08:38:08.228069 7135 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" FirewallRule:node-to-node-minimal-gce-example-com ok Disk:a-etcd-main-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-ipv6-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/node-minimal-gce-example-com@testproject.iam.gserviceaccount.com ok Disk:a-etcd-events-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-ipv6-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-minimal-gce-example-com ok FirewallRule:node-to-master-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-ipv6-minimal-gce-example-com ok FirewallRule:master-to-master-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-master-us-test1-a-minimal-gce-example-com ok FirewallRule:master-to-node-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-ipv6-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/control-plane-minimal-g-fu1mg6@testproject.iam.gserviceaccount.com ok FirewallRule:ssh-external-to-master-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-nodes-minimal-gce-example-com ok InstanceTemplate:master-us-test1-a-minimal-do16cp-1739781486 ok InstanceTemplate:nodes-minimal-gce-example-com-1739781486 ok Subnet:us-test1-minimal-gce-example-com ok Network:minimal-gce-example-com ok --- PASS: TestLifecycleMinimalGCE (3.22s) === RUN TestLifecycleFloatingIPOpenstack I0217 08:38:08.229347 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster floatingip-openstack.k8s.local I0217 08:38:08.235506 7135 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:38:09.579340 7135 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0217 08:38:09.579368 7135 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0217 08:38:09.593895 7135 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2025/02/17 08:38:09 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:09 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0217 08:38:09.598729 7135 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0217 08:38:09.609925 7135 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0217 08:38:09.612711 7135 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2025/02/17 08:38:09 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:09 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:09 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0217 08:38:09.614680 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0217 08:38:09.614861 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0217 08:38:09.614988 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0217 08:38:10.618929 7135 executor.go:111] Tasks: 94 done / 94 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0217 08:38:11.956021 7135 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0217 08:38:11.956062 7135 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0217 08:38:11.971489 7135 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2025/02/17 08:38:11 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:11 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0217 08:38:11.980835 7135 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0217 08:38:11.985888 7135 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0217 08:38:11.987288 7135 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2025/02/17 08:38:11 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:11 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/02/17 08:38:11 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0217 08:38:11.989751 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0217 08:38:11.989878 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0217 08:38:11.990100 7135 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0217 08:38:11.990471 7135 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0217 08:38:11.991791 7135 delete_cluster.go:128] Looking for cloud resources to delete 2025/02/17 08:38:11 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) SecurityGroup:b5d2b3da-0247-4722-83d3-6ebd1dc4fe68 ok Instance:a673b787-875c-4317-93a1-0b7e7b0d3db3 ok SecurityGroup:1f67f3d4-e9d4-4519-9064-1fc923b5af5a ok Router-IF:749f5db1-3738-4f23-a172-b2b6178f0fce ok Network:13a486fb-0e01-449d-87bc-74f7b11e6150 ok Instance:7960b2bc-9acc-442f-a57a-d891480082e8 ok Port:f6f6bbef-83d8-4ffb-8a9d-afd31ea346e4 ok Instance:bf54fb66-dc46-44b6-8f9a-63b227db564d ok SSHKey:kubernetes-floatingip-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Subnet:749f5db1-3738-4f23-a172-b2b6178f0fce ok Router:86ad874e-b19d-4afe-930b-c3a3ad57ea8a ok Port:00a47e59-841c-4c27-befc-a6f407120cb3 ok Port:e87584dc-e490-421b-83ce-e7dcf54aa8d5 ok ServerGroup:309de898-2d3a-437d-81c6-5e9073354355 ok Port:cf0761bd-f3a0-4c6b-822c-60ffef28b7d4 ok ServerGroup:386f6d6f-46ec-42d7-9923-b76ee3afdc41 ok SecurityGroup:fdaa4d0d-69cf-4149-b382-a44db0dcdfa2 ok --- PASS: TestLifecycleFloatingIPOpenstack (4.87s) === RUN TestLifecyclePrivateCalico I0217 08:38:13.096189 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:13.096407 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:13.096446 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:13.096490 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:13.096524 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:13.096563 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:13.096600 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:13.096623 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:13.096655 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:13.096677 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatecalico.example.com I0217 08:38:13.119282 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:38:13.122222 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:13.122289 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:13.122331 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:14.349965 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:14.725622 7135 iamrole.go:89] ListRoles: { } I0217 08:38:14.726871 7135 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0217 08:38:14.728614 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } I0217 08:38:14.728798 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0217 08:38:14.729136 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] }] } I0217 08:38:14.729413 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:14.729585 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:14.729710 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:14.729892 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:14.730011 7135 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.730229 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:14.730425 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0217 08:38:14.730428 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:14.730545 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } I0217 08:38:14.730725 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0217 08:38:14.730700 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0217 08:38:14.730788 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0217 08:38:14.730858 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:14.730918 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:14.730963 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } I0217 08:38:14.730970 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:14.731085 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", Tags: [{ Key: "Name", Value: "bastions.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0217 08:38:14.731316 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:14.732141 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["privatecalico.example.com"] }] } I0217 08:38:14.732294 7135 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" }] }] } I0217 08:38:14.732380 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:14.733993 7135 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0217 08:38:14.734132 7135 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0217 08:38:14.734125 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0217 08:38:14.734180 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0217 08:38:14.734306 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0217 08:38:14.734277 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:14.734339 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0217 08:38:14.734439 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0217 08:38:14.734443 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0217 08:38:14.734443 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:14.734546 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:14.734594 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:14.734626 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:14.734604 7135 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatecalico-exa-hocohm", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatecalico-exa-hocohm" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0217 08:38:14.734657 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0217 08:38:14.734713 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0217 08:38:14.734700 7135 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0217 08:38:14.734690 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:14.734812 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0217 08:38:14.734851 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0217 08:38:14.734875 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0217 08:38:14.735030 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:14.735106 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0217 08:38:14.735172 7135 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0217 08:38:14.735201 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0217 08:38:14.735216 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:14.735300 7135 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0217 08:38:14.735295 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:14.735360 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:14.735403 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:14.735522 7135 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0217 08:38:14.735562 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:14.735641 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0217 08:38:14.735730 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0217 08:38:14.735716 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0217 08:38:14.735892 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:14.735978 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:14.736058 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0217 08:38:14.736158 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:14.736197 7135 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0217 08:38:14.736258 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:14.736324 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0217 08:38:14.736359 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:14.736387 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:14.736422 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:14.736452 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:14.736198 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatecalico.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0217 08:38:14.736488 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:14.736517 7135 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.736572 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:14.736609 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:14.736642 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:14.736673 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:14.736703 7135 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0217 08:38:14.736807 7135 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0217 08:38:14.736956 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } W0217 08:38:14.737113 7135 api.go:53] PageSize not implemented I0217 08:38:14.737145 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:14.737220 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:14.737143 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-udp-1to65535-masters.privatecalico.example.com" }] }] } I0217 08:38:14.737236 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:14.737342 7135 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatecalico-exa-hocohm", SubnetMappings: [{ SubnetId: "subnet-1" }], Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }], Type: "network" } I0217 08:38:14.737386 7135 tags.go:74] AddTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"], Tags: [{ Key: "Name", Value: "api.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0217 08:38:14.737453 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:14.737388 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.737481 7135 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0217 08:38:14.737504 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0217 08:38:14.737544 7135 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0217 08:38:14.737615 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.737783 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0217 08:38:14.737948 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0217 08:38:14.738094 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-2382to4000-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.738206 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-::/0" }] }] } I0217 08:38:14.738322 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" }] }] } I0217 08:38:14.738450 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:14.738552 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:14.738622 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:14.738674 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:14.738742 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:14.738800 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:14.738855 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:14.738887 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:14.738928 7135 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.738923 7135 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1", Port: 22, Protocol: "TCP" } W0217 08:38:14.739037 7135 api.go:53] PageSize not implemented I0217 08:38:14.738976 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.739056 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:14.739083 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:14.739166 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.739268 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.739365 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:14.739448 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.739559 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0217 08:38:14.739633 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0217 08:38:14.739705 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.739804 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.739903 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.740006 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:38:14.740047 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-::/0" }] }] } I0217 08:38:14.740157 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-4-0to0-masters.privatecalico.example.com" }] }] } I0217 08:38:14.740269 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-1to2379-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.740373 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-4003to65535-masters.privatecalico.example.com" }] }] } I0217 08:38:14.740478 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0217 08:38:14.740514 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0217 08:38:14.740545 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0217 08:38:14.740638 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0217 08:38:14.740673 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0217 08:38:14.740699 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0217 08:38:14.740805 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0217 08:38:14.740919 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:38:14.740958 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0217 08:38:14.741100 7135 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0217 08:38:14.741147 7135 api.go:53] PageSize not implemented I0217 08:38:14.741178 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } W0217 08:38:14.741211 7135 api.go:53] PageSize not implemented I0217 08:38:14.741183 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:14.741221 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:14.741246 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:14.741253 7135 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:14.741357 7135 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-1", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0217 08:38:14.741346 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:14.741448 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0217 08:38:14.741476 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:14.741484 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:14.741515 7135 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0217 08:38:14.741547 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:14.745610 7135 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0217 08:38:14.745703 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:14.745779 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:14.745881 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:14.745932 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0217 08:38:14.746082 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:14.746173 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:14.746557 7135 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0217 08:38:14.746780 7135 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0217 08:38:14.746970 7135 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0217 08:38:14.747004 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:14.747033 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:14.747090 7135 dns.go:235] Pre-creating DNS records I0217 08:38:14.747112 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:14.752504 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:38:14.755480 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:14.755544 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:14.755590 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:16.031383 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:16.390283 7135 iamrole.go:89] ListRoles: { } I0217 08:38:16.392242 7135 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0217 08:38:16.392518 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.392681 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.392944 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.393456 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:16.394004 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:16.393965 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.394120 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:16.394163 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:16.394237 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:16.395326 7135 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0217 08:38:16.395455 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.395614 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0217 08:38:16.395568 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0217 08:38:16.395630 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:16.395690 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0217 08:38:16.395658 7135 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0217 08:38:16.395740 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0217 08:38:16.395743 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0217 08:38:16.395888 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:16.395905 7135 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0217 08:38:16.395933 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0217 08:38:16.396069 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:16.396118 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.396228 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0217 08:38:16.396341 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:16.396382 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.396492 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:16.396521 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.396625 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:16.396657 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:16.396727 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.396825 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0217 08:38:16.396931 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:16.397048 7135 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0217 08:38:16.397146 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0217 08:38:16.397274 7135 api.go:53] PageSize not implemented I0217 08:38:16.397247 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:16.397330 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:16.397411 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:16.397430 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0217 08:38:16.397313 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:16.397462 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0217 08:38:16.397410 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:16.397500 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:16.397547 7135 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatecalico-example-0uch4k" } I0217 08:38:16.397493 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0217 08:38:16.397591 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0217 08:38:16.397541 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:16.397624 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } W0217 08:38:16.397775 7135 api.go:53] PageSize not implemented I0217 08:38:16.397792 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:16.397766 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:16.397907 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0217 08:38:16.397955 7135 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0217 08:38:16.397986 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0217 08:38:16.398025 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:16.398109 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:16.398656 7135 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0217 08:38:16.398718 7135 api.go:53] PageSize not implemented W0217 08:38:16.398738 7135 api.go:53] PageSize not implemented I0217 08:38:16.398727 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:16.398760 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:16.398773 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:16.398792 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0217 08:38:16.398805 7135 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0217 08:38:16.398829 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:16.398856 7135 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0217 08:38:16.398849 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:16.398967 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:16.399076 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:16.403059 7135 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0217 08:38:16.403161 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:16.403240 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:16.403343 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:16.403479 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:16.403622 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:16.404189 7135 executor.go:111] Tasks: 134 done / 142 total; 2 can run W0217 08:38:16.404269 7135 api.go:53] PageSize not implemented I0217 08:38:16.404286 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:16.404440 7135 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0217 08:38:16.404637 7135 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0217 08:38:16.407739 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:16.407789 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:16.407818 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:16.407841 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0217 08:38:16.407866 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:16.407891 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:16.407912 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:16.407934 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:16.407960 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:16.407988 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:16.408016 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:16.408041 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0217 08:38:16.408071 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0217 08:38:16.408096 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:16.408120 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:16.408139 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:16.408162 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:16.408185 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:16.408207 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:16.408232 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:16.408259 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:16.408281 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0217 08:38:16.408305 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:16.408331 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:16.408353 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:16.408379 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:16.408401 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:16.408421 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:16.408446 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:16.408469 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:16.408492 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:16.409712 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:16.409767 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:16.409782 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:16.409812 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.409857 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0217 08:38:16.409907 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.409954 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.409990 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.410030 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.410064 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.410096 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0217 08:38:16.410141 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.410182 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:16.410205 7135 natgateway.go:117] DescribeNatGateways: { } I0217 08:38:16.410235 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0217 08:38:16.410265 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } W0217 08:38:16.410304 7135 api.go:53] PageSize not implemented I0217 08:38:16.410318 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0217 08:38:16.410346 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:16.410365 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:16.410377 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0217 08:38:16.410405 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:16.410425 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:16.410441 7135 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" ] } I0217 08:38:16.410483 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:16.410514 7135 iamrole.go:89] ListRoles: { } I0217 08:38:16.410551 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:16.410573 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:16.410625 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:16.410665 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:16.410725 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0217 08:38:16.410753 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0217 08:38:16.410779 7135 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } autoscaling-group:master-us-test-1a.masters.privatecalico.example.com ok I0217 08:38:16.411291 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-group:nodes.privatecalico.example.com ok I0217 08:38:16.411370 7135 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0217 08:38:16.411370 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } autoscaling-group:bastion.privatecalico.example.com ok I0217 08:38:16.411387 7135 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatecalico-example-0uch4k" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4 ok load-balancer:api-privatecalico-example-0uch4k ok I0217 08:38:16.411433 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } iam-instance-profile:bastions.privatecalico.example.com ok I0217 08:38:16.411427 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:16.411516 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0217 08:38:16.411583 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } iam-instance-profile:masters.privatecalico.example.com ok I0217 08:38:16.411470 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0217 08:38:16.411643 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:16.411658 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-config:lt-2 ok I0217 08:38:16.411688 7135 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0217 08:38:16.411706 7135 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1 ok I0217 08:38:16.411748 7135 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0217 08:38:16.411770 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:16.411664 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:16.411810 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } route53-record:Z1AFAKE1ZON3YO/A/api.privatecalico.example.com ok W0217 08:38:16.411891 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:16.411834 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0217 08:38:16.411903 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0217 08:38:16.411917 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } iam-instance-profile:nodes.privatecalico.example.com ok I0217 08:38:16.411934 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-1 ok I0217 08:38:16.412002 7135 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0217 08:38:16.412054 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0217 08:38:16.412091 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:16.412135 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 } ] } W0217 08:38:16.412281 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:16.412297 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok autoscaling-config:lt-3 ok I0217 08:38:16.412398 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0217 08:38:16.412412 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatecalico.example.com" } I0217 08:38:16.412455 7135 iamrole.go:180] ListAttachedRolePolicies: bastions.privatecalico.example.com I0217 08:38:16.412452 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:16.412479 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatecalico.example.com" } I0217 08:38:16.412555 7135 iamrole.go:180] ListAttachedRolePolicies: masters.privatecalico.example.com I0217 08:38:16.412570 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0217 08:38:16.412599 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.privatecalico.example.com" } iam-role:masters.privatecalico.example.com ok I0217 08:38:16.412499 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 } ] } W0217 08:38:16.412640 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:16.412639 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatecalico.example.com" } I0217 08:38:16.412662 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0217 08:38:16.412681 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.privatecalico.example.com I0217 08:38:16.412693 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0217 08:38:16.412720 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatecalico.example.com" } iam-role:nodes.privatecalico.example.com ok I0217 08:38:16.412710 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0217 08:38:16.412746 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0217 08:38:16.412767 7135 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatecalico.example.com" } iam-role:bastions.privatecalico.example.com ok I0217 08:38:16.412762 7135 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0217 08:38:16.412852 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0217 08:38:16.412903 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0217 08:38:16.412971 7135 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0217 08:38:16.413038 7135 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateCalico (3.32s) === RUN TestLifecyclePrivateKopeio I0217 08:38:16.413558 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:16.413792 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:16.413827 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:16.413861 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:16.413890 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:16.413964 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:16.414011 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:16.414033 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:16.414063 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:16.414085 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatekopeio.example.com I0217 08:38:16.438337 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:16.441402 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:16.441468 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:16.441511 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:17.663539 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:17.822075 7135 iamrole.go:89] ListRoles: { } I0217 08:38:17.823861 7135 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0217 08:38:17.824535 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.824795 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:17.824794 7135 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.824945 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:17.824977 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } I0217 08:38:17.825045 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "bastions.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0217 08:38:17.825017 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.825218 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.825355 7135 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.825411 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:17.825611 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:17.825676 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.825897 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0217 08:38:17.825902 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } I0217 08:38:17.825975 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0217 08:38:17.825992 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0217 08:38:17.826034 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:17.826110 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:17.826166 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:17.826167 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } I0217 08:38:17.826299 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0217 08:38:17.826388 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:17.826562 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:17.826626 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" }] }] } I0217 08:38:17.827177 7135 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0217 08:38:17.827289 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.827382 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0217 08:38:17.827411 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0217 08:38:17.827425 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.827483 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0217 08:38:17.827483 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0217 08:38:17.827553 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0217 08:38:17.827573 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.827646 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0217 08:38:17.827718 7135 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0217 08:38:17.827683 7135 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatekopeio-exa-d8ef8e", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatekopeio-exa-d8ef8e" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0217 08:38:17.827778 7135 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0217 08:38:17.827751 7135 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0217 08:38:17.827776 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0217 08:38:17.827796 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.827953 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0217 08:38:17.828021 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0217 08:38:17.828027 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0217 08:38:17.828114 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0217 08:38:17.828141 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:17.828117 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0217 08:38:17.828164 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0217 08:38:17.828188 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:17.828241 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:17.828385 7135 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0217 08:38:17.828431 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:17.828467 7135 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0217 08:38:17.828532 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0217 08:38:17.828621 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.828687 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0217 08:38:17.828759 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0217 08:38:17.828772 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.828852 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.828935 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0217 08:38:17.829016 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0217 08:38:17.829011 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.8.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0217 08:38:17.829097 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:17.829152 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:17.829228 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:17.829079 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatekopeio.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0217 08:38:17.829291 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0217 08:38:17.829400 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] }], VpcId: "vpc-1" } I0217 08:38:17.829455 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0217 08:38:17.829508 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:17.829547 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0217 08:38:17.829582 7135 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0217 08:38:17.829648 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:17.829715 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:17.829750 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:17.829799 7135 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0217 08:38:17.829885 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:17.829930 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:17.830002 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:17.830042 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:17.830102 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0217 08:38:17.830152 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0217 08:38:17.830182 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:17.830220 7135 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" } ] } I0217 08:38:17.830274 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:17.830337 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0217 08:38:17.830378 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:17.830407 7135 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0217 08:38:17.830443 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:17.830485 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:17.830522 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:17.830549 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:17.830637 7135 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0217 08:38:17.830747 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0217 08:38:17.830813 7135 api.go:53] PageSize not implemented I0217 08:38:17.830831 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:17.830914 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:17.830926 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:17.830999 7135 tags.go:74] AddTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"], Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "api.privatekopeio.example.com" }] } I0217 08:38:17.830930 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:17.831065 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:17.831047 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:17.830981 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.8.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.831104 7135 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0217 08:38:17.831153 7135 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0217 08:38:17.831151 7135 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatekopeio-exa-d8ef8e", SubnetMappings: [{ SubnetId: "subnet-1" },{ SubnetId: "subnet-4" }], Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], Type: "network" } I0217 08:38:17.831191 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0217 08:38:17.831370 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0217 08:38:17.831553 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:17.831642 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:17.831780 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0217 08:38:17.831915 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:17.831977 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.832091 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0217 08:38:17.832160 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.832289 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0217 08:38:17.832319 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:17.832373 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0217 08:38:17.832424 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.832532 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:17.832593 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0217 08:38:17.832622 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:38:17.832656 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:17.832690 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-udp-1to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.832802 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-::/0" }] }] } I0217 08:38:17.832905 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:38:17.832945 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.833043 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-4003to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.833150 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }] } I0217 08:38:17.833224 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0217 08:38:17.833295 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:17.833334 7135 tags.go:42] CreateTags { Resources: ["nat-b2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0217 08:38:17.833365 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0217 08:38:17.833395 7135 tags.go:42] CreateTags { Resources: ["subnet-4"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0217 08:38:17.833424 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-::/0" }] }] } I0217 08:38:17.833524 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0217 08:38:17.833594 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-::/0" }] }] } I0217 08:38:17.833690 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0217 08:38:17.833723 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.833816 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:17.833884 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-2382to4000-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.834002 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0217 08:38:17.834035 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:17.834104 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0217 08:38:17.834199 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.834293 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:17.834326 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.834424 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-4" } I0217 08:38:17.834454 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.834549 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0217 08:38:17.834648 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0217 08:38:17.834679 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0217 08:38:17.834722 7135 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1", Port: 22, Protocol: "TCP" } I0217 08:38:17.834715 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-1to2379-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } W0217 08:38:17.834822 7135 api.go:53] PageSize not implemented I0217 08:38:17.834845 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:17.834816 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0217 08:38:17.834896 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-3" } I0217 08:38:17.834931 7135 tags.go:42] CreateTags { Resources: ["nat-a2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0217 08:38:17.834965 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:17.835000 7135 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0217 08:38:17.835027 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:17.835065 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0217 08:38:17.835134 7135 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0217 08:38:17.835193 7135 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0217 08:38:17.835276 7135 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0217 08:38:17.835345 7135 api.go:53] PageSize not implemented I0217 08:38:17.835382 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:17.835398 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:17.835379 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } W0217 08:38:17.835487 7135 api.go:53] PageSize not implemented I0217 08:38:17.835463 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:17.835531 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:17.835564 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:17.835550 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:17.835669 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-a2345678", RouteTableId: "rtb-2" } I0217 08:38:17.835627 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:17.835709 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-b2345678", RouteTableId: "rtb-3" } I0217 08:38:17.839844 7135 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0217 08:38:17.840151 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:17.840270 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:17.840354 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:17.840459 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:17.841022 7135 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0217 08:38:17.841260 7135 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0217 08:38:17.841485 7135 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0217 08:38:17.841522 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:17.841551 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:17.841603 7135 dns.go:235] Pre-creating DNS records I0217 08:38:17.841623 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:17.846710 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:17.849520 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:17.849584 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:17.849628 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:19.067108 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:19.223941 7135 iamrole.go:89] ListRoles: { } I0217 08:38:19.225873 7135 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0217 08:38:19.226076 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.226549 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:19.226671 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:19.226981 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.227347 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.227517 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:19.227563 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:19.227640 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:19.228255 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.229532 7135 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0217 08:38:19.229643 7135 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0217 08:38:19.229683 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:19.229761 7135 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0217 08:38:19.229816 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0217 08:38:19.229781 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0217 08:38:19.230035 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:19.230059 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0217 08:38:19.230150 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0217 08:38:19.230104 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.230187 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0217 08:38:19.230281 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0217 08:38:19.230335 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0217 08:38:19.230493 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:19.230550 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.230722 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0217 08:38:19.230869 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:19.230928 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.231063 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:19.231094 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.231191 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.231286 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:19.231354 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0217 08:38:19.231466 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:19.231540 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.231715 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:19.231759 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.231869 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:19.231899 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.232018 7135 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0217 08:38:19.232133 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0217 08:38:19.232255 7135 api.go:53] PageSize not implemented I0217 08:38:19.232231 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:19.232194 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:19.232308 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:19.232283 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:19.232337 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0217 08:38:19.232360 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:19.232381 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0217 08:38:19.232391 7135 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0217 08:38:19.232410 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0217 08:38:19.232442 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0217 08:38:19.232365 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:19.232471 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } W0217 08:38:19.232537 7135 api.go:53] PageSize not implemented I0217 08:38:19.232555 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:19.232570 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0217 08:38:19.232716 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0217 08:38:19.232936 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:19.233026 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:19.233146 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:19.233208 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:19.233326 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:19.233405 7135 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0217 08:38:19.233450 7135 api.go:53] PageSize not implemented I0217 08:38:19.233479 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:19.233490 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:19.233536 7135 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0217 08:38:19.233557 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:19.233556 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:19.233651 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:19.233658 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:19.233704 7135 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0217 08:38:19.233725 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } W0217 08:38:19.233819 7135 api.go:53] PageSize not implemented I0217 08:38:19.233852 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:19.238246 7135 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0217 08:38:19.238390 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:19.238516 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:19.238638 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:19.238773 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:19.239145 7135 executor.go:111] Tasks: 136 done / 144 total; 2 can run W0217 08:38:19.239225 7135 api.go:53] PageSize not implemented I0217 08:38:19.239241 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:19.239398 7135 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0217 08:38:19.239554 7135 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0217 08:38:19.242332 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:19.242387 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:19.242418 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:19.242444 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:19.242468 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:19.242491 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:19.242514 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:19.242541 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:19.242566 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:19.242594 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:19.242626 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0217 08:38:19.242655 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:19.242679 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:19.242704 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:19.242731 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:19.242754 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:19.242780 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0217 08:38:19.242806 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:19.242831 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:19.242855 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:19.242879 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0217 08:38:19.242909 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:19.242934 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:19.242957 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:19.242983 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0217 08:38:19.243010 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0217 08:38:19.243036 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:19.243059 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:19.243082 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:19.243109 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:19.243136 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:19.243161 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:19.244546 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:19.244610 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:19.244627 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:19.244664 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.244713 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0217 08:38:19.244767 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.244818 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.244854 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.244898 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.244931 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.244970 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0217 08:38:19.245024 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.245078 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:19.245105 7135 natgateway.go:117] DescribeNatGateways: { } I0217 08:38:19.245138 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0217 08:38:19.245173 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } W0217 08:38:19.245217 7135 api.go:53] PageSize not implemented I0217 08:38:19.245231 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0217 08:38:19.245264 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:19.245282 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:19.245295 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0217 08:38:19.245325 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:19.245344 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:19.245358 7135 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" ] } I0217 08:38:19.245406 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:19.245444 7135 iamrole.go:89] ListRoles: { } I0217 08:38:19.245482 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:19.245504 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:19.245539 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:19.245582 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:19.245624 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-3","rtb-2"] } I0217 08:38:19.245660 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0217 08:38:19.245684 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0217 08:38:19.246262 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0217 08:38:19.246317 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } iam-instance-profile:bastions.privatekopeio.example.com ok I0217 08:38:19.246292 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:19.246374 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0217 08:38:19.246380 7135 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0217 08:38:19.246426 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } autoscaling-group:bastion.privatekopeio.example.com ok I0217 08:38:19.246409 7135 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4 ok I0217 08:38:19.246482 7135 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0217 08:38:19.246366 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 } ] } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1 ok W0217 08:38:19.246540 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:19.246561 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:19.246651 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } iam-instance-profile:masters.privatekopeio.example.com ok I0217 08:38:19.246492 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:19.246701 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } autoscaling-group:master-us-test-1a.masters.privatekopeio.example.com ok iam-instance-profile:nodes.privatekopeio.example.com ok I0217 08:38:19.246627 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } route53-record:Z1AFAKE1ZON3YO/A/api.privatekopeio.example.com ok W0217 08:38:19.246736 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions autoscaling-group:nodes.privatekopeio.example.com ok I0217 08:38:19.246752 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } autoscaling-config:lt-3 ok I0217 08:38:19.246797 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } load-balancer:api-privatekopeio-example-tl2bv8 ok security-group:sg-3 ok keypair:key-1 ok autoscaling-config:lt-1 ok I0217 08:38:19.246856 7135 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0217 08:38:19.246909 7135 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0217 08:38:19.246943 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0217 08:38:19.246983 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:19.247015 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:19.247058 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0217 08:38:19.247214 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:19.247230 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok autoscaling-config:lt-2 ok I0217 08:38:19.247284 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0217 08:38:19.247387 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0217 08:38:19.247394 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatekopeio.example.com" } I0217 08:38:19.247438 7135 iamrole.go:180] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0217 08:38:19.247453 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0217 08:38:19.247442 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0217 08:38:19.247481 7135 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatekopeio.example.com" } iam-role:bastions.privatekopeio.example.com ok I0217 08:38:19.247520 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0217 08:38:19.247570 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0217 08:38:19.247562 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatekopeio.example.com" } I0217 08:38:19.247627 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0217 08:38:19.247609 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:19.247642 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0217 08:38:19.247669 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatekopeio.example.com" } iam-role:nodes.privatekopeio.example.com ok I0217 08:38:19.247699 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatekopeio.example.com" } I0217 08:38:19.247657 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:19.247741 7135 iamrole.go:180] ListAttachedRolePolicies: masters.privatekopeio.example.com W0217 08:38:19.247751 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:19.247753 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0217 08:38:19.247764 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0217 08:38:19.247778 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.privatekopeio.example.com" } iam-role:masters.privatekopeio.example.com ok I0217 08:38:19.247844 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0217 08:38:19.247892 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0217 08:38:19.247935 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0217 08:38:19.248000 7135 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0217 08:38:19.248056 7135 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateKopeio (2.83s) === RUN TestLifecycleIPv6 I0217 08:38:19.248522 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:19.248726 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:19.248759 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:19.248800 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:19.248828 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:19.248867 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:19.248903 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:19.248926 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:19.248954 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:19.248976 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal-ipv6.example.com I0217 08:38:19.275813 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:38:19.278801 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:19.278872 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:20.503518 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:20.655805 7135 iamrole.go:89] ListRoles: { } I0217 08:38:20.657876 7135 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0217 08:38:20.658157 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } I0217 08:38:20.658260 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] } I0217 08:38:20.658322 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.658446 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:20.658484 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:20.658596 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.658756 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:20.658861 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:20.658905 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.659028 7135 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.659095 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0217 08:38:20.659122 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0217 08:38:20.659143 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:20.659172 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:20.659199 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.659321 7135 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "minimal-ipv6.example.com" }] }] } I0217 08:38:20.659397 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:20.659428 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:20.659435 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } I0217 08:38:20.659466 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:20.659522 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] } I0217 08:38:20.659583 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.660693 7135 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0217 08:38:20.660781 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.660872 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0217 08:38:20.660982 7135 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0217 08:38:20.660939 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.660974 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0217 08:38:20.660934 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0217 08:38:20.661054 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0217 08:38:20.661048 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:20.661116 7135 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0217 08:38:20.661125 7135 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-minimal-ipv6-example--bne5ih", Port: 443, Protocol: "TCP", Tags: [{ Key: "Name", Value: "tcp-minimal-ipv6-example--bne5ih" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0217 08:38:20.661191 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:20.661231 7135 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0217 08:38:20.661233 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:20.661255 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0217 08:38:20.661302 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0217 08:38:20.661343 7135 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0217 08:38:20.661384 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0217 08:38:20.661385 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.661469 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0217 08:38:20.661548 7135 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] } I0217 08:38:20.661564 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0217 08:38:20.661615 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:20.661744 7135 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0217 08:38:20.661772 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0217 08:38:20.661904 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:20.661965 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:20.662003 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:20.662029 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.662091 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0217 08:38:20.662171 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0217 08:38:20.662171 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.662333 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:20.662405 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0217 08:38:20.662497 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0217 08:38:20.662586 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:20.662623 7135 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0217 08:38:20.662476 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal-ipv6.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0217 08:38:20.662688 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:20.662754 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:20.662790 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:20.662819 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:20.662882 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:20.662914 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:20.662944 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0217 08:38:20.662975 7135 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal-ipv6.example.com" } ] } I0217 08:38:20.663079 7135 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0217 08:38:20.663201 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.663275 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.663342 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", Ipv6CidrBlock: "2001:db8:0:111::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0217 08:38:20.663438 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:20.663420 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.4.0/22", Ipv6CidrBlock: "2001:db8:0:116::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0217 08:38:20.663485 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0217 08:38:20.663656 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0217 08:38:20.663774 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.663872 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0217 08:38:20.663980 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.664148 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-1to2379-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0217 08:38:20.664313 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" }] }] } I0217 08:38:20.664415 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:20.664475 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0217 08:38:20.664584 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.664658 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.664731 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:20.664792 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.664799 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.0.0/22", Ipv6CidrBlock: "2001:db8:0:115::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0217 08:38:20.664857 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:20.664780 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", Ipv6CidrBlock: "2001:db8:0:113::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "dualstack-us-test-1a.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0217 08:38:20.664923 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:20.664923 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", Ipv6CidrBlock: "2001:db8:0:114::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "dualstack-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0217 08:38:20.664982 7135 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.664983 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:20.665046 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:20.665103 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:20.665095 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", Ipv6CidrBlock: "2001:db8:0:112::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0217 08:38:20.665158 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:20.665195 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-2" } I0217 08:38:20.665197 7135 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.665238 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.665349 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0217 08:38:20.665448 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-3" } I0217 08:38:20.665506 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0217 08:38:20.665543 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:20.665597 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0217 08:38:20.665648 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0217 08:38:20.665699 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0217 08:38:20.665735 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0217 08:38:20.665765 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-udp-1to65535-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0217 08:38:20.665873 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-1" } I0217 08:38:20.665912 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0217 08:38:20.665991 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-4003to65535-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.666080 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" }] }] } I0217 08:38:20.666170 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.666256 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:20.666317 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-3" } I0217 08:38:20.666372 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0217 08:38:20.666406 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0217 08:38:20.666431 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-2382to4000-masters.minimal-ipv6.example.com" }] }] } I0217 08:38:20.666522 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:20.666553 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:20.666578 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.666664 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.666755 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.666864 7135 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0217 08:38:20.666920 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:20.666980 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:20.667040 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:20.667089 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:20.667096 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:20.667195 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:20.667183 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0217 08:38:20.667306 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-3" } I0217 08:38:20.667355 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:20.667364 7135 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "dualstack", Name: "api-minimal-ipv6-example--jhj9te", SubnetMappings: [{ SubnetId: "subnet-3" },{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "api.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], Type: "network" } I0217 08:38:20.667430 7135 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-3"] }] } I0217 08:38:20.667564 7135 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-3", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.667599 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:20.667724 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0217 08:38:20.667757 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-2" } I0217 08:38:20.667783 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-6"] }] } I0217 08:38:20.667809 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-6" } I0217 08:38:20.667829 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:20.667921 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-5"] }] } I0217 08:38:20.667952 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-5" } I0217 08:38:20.667982 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:20.668073 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0217 08:38:20.668099 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0217 08:38:20.668119 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0217 08:38:20.668143 7135 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:20.668187 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:20.668214 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:20.668252 7135 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1", Port: 443, Protocol: "TCP" } I0217 08:38:20.668305 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0217 08:38:20.668323 7135 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "false" },{ Key: "access_logs.s3.enabled", Value: "false" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0217 08:38:20.668347 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } W0217 08:38:20.668375 7135 api.go:53] PageSize not implemented I0217 08:38:20.668299 7135 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-2", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0217 08:38:20.668380 7135 tags.go:42] CreateTags { Resources: ["subnet-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0217 08:38:20.668442 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0217 08:38:20.668499 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:20.668565 7135 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-2" }] } I0217 08:38:20.668617 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-4" } I0217 08:38:20.668701 7135 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0217 08:38:20.668785 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0217 08:38:20.668802 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:20.668875 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:20.668787 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0217 08:38:20.668831 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:20.668910 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:20.668998 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0217 08:38:20.669030 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-2", RouteTableId: "rtb-1" } I0217 08:38:20.669039 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:20.669077 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:20.669141 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:20.669177 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:20.669190 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0217 08:38:20.669242 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0217 08:38:20.669323 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:20.669452 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-2", RouteTableId: "rtb-1" } I0217 08:38:20.669509 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:20.669636 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0217 08:38:20.673239 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:38:20.673392 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:20.673486 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:20.673578 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:20.673672 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:20.674034 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:38:20.674227 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:38:20.674504 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:38:20.674550 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:20.674581 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:20.674638 7135 dns.go:235] Pre-creating DNS records I0217 08:38:20.674659 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:20.684224 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0217 08:38:20.687234 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:20.687324 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:21.902356 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:22.054092 7135 iamrole.go:89] ListRoles: { } I0217 08:38:22.055918 7135 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0217 08:38:22.056196 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.056408 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:22.056552 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:22.056572 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.057041 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.057291 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:22.057341 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:22.057415 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:22.057461 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.058709 7135 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0217 08:38:22.058901 7135 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0217 08:38:22.058827 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0217 08:38:22.059035 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0217 08:38:22.058939 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0217 08:38:22.059095 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0217 08:38:22.059037 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.059140 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0217 08:38:22.059229 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0217 08:38:22.059424 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:22.059467 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0217 08:38:22.059630 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:22.059684 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.059860 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.060026 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.060188 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:22.060298 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:22.060414 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.060627 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:22.060993 7135 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0217 08:38:22.061180 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.061326 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.061465 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0217 08:38:22.061515 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:22.061609 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0217 08:38:22.061645 7135 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0217 08:38:22.061676 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0217 08:38:22.061791 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.061914 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:22.061970 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.062077 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0217 08:38:22.062128 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.062222 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0217 08:38:22.062253 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:22.062356 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:22.062523 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:22.062584 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:22.062640 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:22.062692 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0217 08:38:22.062717 7135 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0217 08:38:22.062741 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0217 08:38:22.062789 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.062868 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:22.062905 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:22.062975 7135 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0217 08:38:22.063042 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:22.063094 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:22.063166 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:22.063186 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0217 08:38:22.063218 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0217 08:38:22.063103 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:22.063244 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0217 08:38:22.063275 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0217 08:38:22.063303 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0217 08:38:22.063280 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:22.063351 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } W0217 08:38:22.063371 7135 api.go:53] PageSize not implemented I0217 08:38:22.063401 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:22.063467 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:22.063526 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0217 08:38:22.063566 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:22.063631 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:22.063694 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0217 08:38:22.063781 7135 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0217 08:38:22.063842 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:22.063868 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:22.063849 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:22.063907 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:22.063906 7135 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0217 08:38:22.063906 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:22.063919 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:22.063938 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0217 08:38:22.064005 7135 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0217 08:38:22.063985 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:22.064017 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:22.064062 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:22.064044 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:22.064077 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0217 08:38:22.064154 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:22.064178 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0217 08:38:22.064255 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:22.064274 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0217 08:38:22.068226 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:38:22.068312 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:22.068434 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:22.068479 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:22.068586 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:22.068943 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:38:22.069095 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:38:22.069249 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:38:22.072122 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:22.072172 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:22.072201 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:22.072224 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-2"] }] } I0217 08:38:22.072248 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0217 08:38:22.072274 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:22.072296 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0217 08:38:22.072322 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:22.072347 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:22.072369 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:22.072395 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:22.072421 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:22.072452 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:22.072479 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0217 08:38:22.072504 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0217 08:38:22.072529 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:22.072554 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:22.072575 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:22.072601 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:22.072624 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:22.072653 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0217 08:38:22.072676 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:22.072702 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:22.072727 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:22.072751 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:22.072774 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:22.072798 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:22.072824 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0217 08:38:22.072851 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0217 08:38:22.072880 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0217 08:38:22.072906 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0217 08:38:22.072932 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:22.072955 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:22.072975 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:22.073002 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:22.073028 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:22.073053 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:22.074722 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:22.074771 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:22.074787 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:22.074818 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.074861 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0217 08:38:22.074908 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.074953 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.074993 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.075032 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.075069 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.075107 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0217 08:38:22.075159 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.075219 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:22.075244 7135 natgateway.go:117] DescribeNatGateways: { } I0217 08:38:22.075278 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0217 08:38:22.075310 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } W0217 08:38:22.075350 7135 api.go:53] PageSize not implemented I0217 08:38:22.075365 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:22.075382 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:22.075394 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0217 08:38:22.075422 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:22.075440 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:22.075453 7135 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" ] } I0217 08:38:22.075496 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:22.075526 7135 iamrole.go:89] ListRoles: { } I0217 08:38:22.075566 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:22.075587 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:22.075619 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:22.075656 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:22.075695 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1","rtb-3"] } I0217 08:38:22.075729 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0217 08:38:22.075757 7135 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0217 08:38:22.075781 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0217 08:38:22.075806 7135 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } autoscaling-group:nodes.minimal-ipv6.example.com ok I0217 08:38:22.076340 7135 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0217 08:38:22.076382 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0217 08:38:22.076441 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } iam-instance-profile:masters.minimal-ipv6.example.com ok I0217 08:38:22.076405 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0217 08:38:22.076442 7135 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4 ok I0217 08:38:22.076482 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } autoscaling-group:master-us-test-1a.masters.minimal-ipv6.example.com ok I0217 08:38:22.076529 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } iam-instance-profile:nodes.minimal-ipv6.example.com ok I0217 08:38:22.076509 7135 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1 ok I0217 08:38:22.076487 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok autoscaling-config:lt-1 ok I0217 08:38:22.076470 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.internal.minimal-ipv6.example.com. ok I0217 08:38:22.076609 7135 egressonlyinternetgateways.go:171] DeleteEgressOnlyInternetGateway: { EgressOnlyInternetGatewayId: "eigw-2" } egress-only-internet-gateway:eigw-2 ok autoscaling-config:lt-2 ok I0217 08:38:22.076686 7135 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0217 08:38:22.076736 7135 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0217 08:38:22.076767 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-5" } subnet:subnet-5 ok I0217 08:38:22.076808 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0217 08:38:22.076847 7135 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-2" } nat-gateway:nat-2 ok I0217 08:38:22.076885 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:22.076927 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 } ] } W0217 08:38:22.077179 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:22.077198 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:22.077224 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:22.077287 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0217 08:38:22.077313 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0217 08:38:22.077355 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:22.077395 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0217 08:38:22.077493 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:22.077507 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0217 08:38:22.077536 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0217 08:38:22.077623 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-6" } subnet:subnet-6 ok I0217 08:38:22.077664 7135 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0217 08:38:22.077648 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal-ipv6.example.com" } I0217 08:38:22.077715 7135 iamrole.go:180] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0217 08:38:22.077709 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0217 08:38:22.077732 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0217 08:38:22.077765 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal-ipv6.example.com" } iam-role:masters.minimal-ipv6.example.com ok I0217 08:38:22.077754 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0217 08:38:22.077786 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal-ipv6.example.com" } I0217 08:38:22.077824 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0217 08:38:22.077837 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0217 08:38:22.077859 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal-ipv6.example.com" } I0217 08:38:22.077806 7135 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-2" } iam-role:nodes.minimal-ipv6.example.com ok elastic-ip:eipalloc-2 ok I0217 08:38:22.077898 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0217 08:38:22.077968 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0217 08:38:22.078013 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0217 08:38:22.078077 7135 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0217 08:38:22.078135 7135 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleIPv6 (2.83s) === RUN TestLifecycleSharedVPC I0217 08:38:22.078558 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:22.078752 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:22.078785 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:22.078816 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:22.078846 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:22.078883 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:22.078913 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:22.078935 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:22.078962 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:22.078984 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedvpc.example.com I0217 08:38:22.101943 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:22.104683 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:22.104758 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:23.371997 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:23.515086 7135 iamrole.go:89] ListRoles: { } I0217 08:38:23.516193 7135 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0217 08:38:23.516481 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:23.516656 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:23.516894 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:38:23.517011 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0217 08:38:23.517059 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0217 08:38:23.517143 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } I0217 08:38:23.517120 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:23.517225 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0217 08:38:23.517309 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:23.517537 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.517701 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:23.517844 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:23.517897 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-main.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:23.518067 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:23.517946 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } I0217 08:38:23.518147 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0217 08:38:23.519161 7135 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0217 08:38:23.519376 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0217 08:38:23.519298 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0217 08:38:23.519432 7135 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0217 08:38:23.519474 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0217 08:38:23.519521 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:38:23.519652 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0217 08:38:23.519645 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0217 08:38:23.519728 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:23.519775 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:23.519815 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:23.519894 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0217 08:38:23.519920 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0217 08:38:23.519996 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-12345678" } I0217 08:38:23.519991 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:23.520228 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0217 08:38:23.520279 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] }], VpcId: "vpc-12345678" } I0217 08:38:23.520398 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0217 08:38:23.520470 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:23.520504 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:23.520537 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:23.520571 7135 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" } ] } I0217 08:38:23.520679 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:23.520725 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:23.520911 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedvpc.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0217 08:38:23.524170 7135 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0217 08:38:23.524346 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.524485 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:23.524563 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.524734 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.524847 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.525014 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.525189 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-::/0" }] }] } I0217 08:38:23.525376 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-4003to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0217 08:38:23.525543 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:23.525679 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0217 08:38:23.525740 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:23.525827 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0217 08:38:23.525894 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.526036 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:23.526127 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:23.526198 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:23.526303 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:23.526390 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0217 08:38:23.526551 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-2382to4000-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.526674 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0217 08:38:23.526718 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-1to2379-masters.sharedvpc.example.com" }] }] } I0217 08:38:23.526824 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0217 08:38:23.526865 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.526969 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.527071 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-udp-1to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0217 08:38:23.527281 7135 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0217 08:38:23.527507 7135 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0217 08:38:23.527720 7135 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0217 08:38:23.527754 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:23.527785 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:23.527842 7135 dns.go:235] Pre-creating DNS records I0217 08:38:23.527866 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:23.533004 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:23.535765 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:23.535839 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:24.823670 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:24.959567 7135 iamrole.go:89] ListRoles: { } I0217 08:38:24.960786 7135 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0217 08:38:24.961098 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.961460 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:24.961643 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:38:24.961707 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0217 08:38:24.961729 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0217 08:38:24.961746 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:24.963164 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.964779 7135 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0217 08:38:24.964886 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0217 08:38:24.965006 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0217 08:38:24.965057 7135 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0217 08:38:24.965000 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.965129 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:24.965182 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.965298 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:24.965331 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:38:24.965408 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0217 08:38:24.965532 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:24.969568 7135 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0217 08:38:24.969735 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:24.969892 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:24.969999 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:24.970125 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:24.970175 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:24.970445 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:24.970563 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:24.971186 7135 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0217 08:38:24.971335 7135 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0217 08:38:24.971536 7135 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0217 08:38:24.973727 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:24.973778 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:24.973804 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:24.973827 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:24.973848 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:24.973870 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:24.973898 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:24.973949 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:24.973978 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:24.974001 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:24.974021 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:24.974046 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:24.974069 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:24.974093 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:24.974117 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:24.974143 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:24.974167 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:24.974188 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:24.974214 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:24.974239 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:24.974264 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:24.975368 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:24.975421 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:24.975436 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:24.975466 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.975505 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0217 08:38:24.975548 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.975592 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.975623 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.975653 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.975683 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.975711 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0217 08:38:24.975747 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.975787 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0217 08:38:24.975811 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } W0217 08:38:24.975846 7135 api.go:53] PageSize not implemented I0217 08:38:24.975863 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:24.975883 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:24.975898 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:24.975917 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:24.975933 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0217 08:38:24.975973 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:24.976005 7135 iamrole.go:89] ListRoles: { } I0217 08:38:24.976040 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:24.976063 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:24.976098 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:24.976130 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:24.976153 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com ok autoscaling-config:lt-2 ok I0217 08:38:24.976518 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-group:nodes.sharedvpc.example.com ok I0217 08:38:24.976570 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:24.976574 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0217 08:38:24.976642 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } iam-instance-profile:masters.sharedvpc.example.com ok I0217 08:38:24.976679 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0217 08:38:24.976612 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0217 08:38:24.976719 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } iam-instance-profile:nodes.sharedvpc.example.com ok W0217 08:38:24.976733 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:24.976748 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0217 08:38:24.976636 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.sharedvpc.example.com. ok I0217 08:38:24.976777 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } autoscaling-config:lt-1 ok keypair:key-1 ok I0217 08:38:24.976832 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:24.976886 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0217 08:38:24.977040 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:24.977062 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:24.977097 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0217 08:38:24.977177 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0217 08:38:24.977194 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedvpc.example.com" } I0217 08:38:24.977280 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0217 08:38:24.977296 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0217 08:38:24.977325 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedvpc.example.com" } iam-role:nodes.sharedvpc.example.com ok I0217 08:38:24.977363 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedvpc.example.com" } I0217 08:38:24.977423 7135 iamrole.go:180] ListAttachedRolePolicies: masters.sharedvpc.example.com I0217 08:38:24.977436 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0217 08:38:24.977464 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedvpc.example.com" } iam-role:masters.sharedvpc.example.com ok I0217 08:38:24.977531 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok --- PASS: TestLifecycleSharedVPC (2.90s) === RUN TestLifecycleComplex I0217 08:38:24.977983 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:24.978185 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:24.978219 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:24.978253 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:24.978283 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:24.978322 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:24.978355 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:24.978377 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:24.978410 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:24.978430 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster complex.example.com I0217 08:38:25.006481 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:25.009868 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:25.009941 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:26.224691 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:26.393756 7135 iamrole.go:89] ListRoles: { } I0217 08:38:26.395644 7135 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0217 08:38:26.395814 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } W0217 08:38:26.395909 7135 api.go:53] PageSize not implemented I0217 08:38:26.395992 7135 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0217 08:38:26.396016 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:26.396102 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:26.396159 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:26.396206 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } I0217 08:38:26.396269 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:26.396313 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com", Tags: [ { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0217 08:38:26.396367 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:26.396534 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-events.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:26.396663 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:26.396711 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:26.396828 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:26.396845 7135 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0217 08:38:26.396929 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0217 08:38:26.396957 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0217 08:38:26.396980 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:26.397013 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:26.397039 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-main.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:26.397151 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:26.397248 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:26.397360 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } I0217 08:38:26.397433 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] } I0217 08:38:26.397501 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0217 08:38:26.398991 7135 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0217 08:38:26.399136 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:26.399182 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:26.399240 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:26.399273 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0217 08:38:26.399295 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:26.399354 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:26.399367 7135 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-complex-example-com-vpjolq", Port: 443, Protocol: "TCP", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "tcp-complex-example-com-vpjolq" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0217 08:38:26.399478 7135 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:26.399470 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:26.399451 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0217 08:38:26.399531 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:26.399562 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:26.399603 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:26.399639 7135 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0217 08:38:26.399641 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0217 08:38:26.399642 7135 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tls-complex-example-com-5nursn", Port: 443, Protocol: "TLS", Tags: [ { Key: "Name", Value: "tls-complex-example-com-5nursn" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0217 08:38:26.399676 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:26.399721 7135 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:26.399739 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0217 08:38:26.399811 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.96.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-utility.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0217 08:38:26.399820 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:26.400001 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0217 08:38:26.400093 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:26.400139 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:26.400171 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0217 08:38:26.400282 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0217 08:38:26.400301 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:26.400445 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "api-elb.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0217 08:38:26.400529 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:26.400617 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:26.400688 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:26.400749 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:26.400802 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:26.400853 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:26.400952 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:26.400751 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/complex.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0217 08:38:26.400992 7135 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] } I0217 08:38:26.401060 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0217 08:38:26.401134 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:26.401168 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:26.401199 7135 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0217 08:38:26.401272 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:26.401308 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0217 08:38:26.401429 7135 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.2.0.0/16", VpcId: "vpc-1" } I0217 08:38:26.401403 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0217 08:38:26.401475 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:26.401514 7135 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] } I0217 08:38:26.401579 7135 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.1.0.0/16", VpcId: "vpc-1" } I0217 08:38:26.401614 7135 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0217 08:38:26.401649 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:26.401695 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:26.401726 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:26.401763 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:26.401848 7135 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0217 08:38:26.401977 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0217 08:38:26.402077 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0217 08:38:26.402197 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:26.402338 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.1.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-private.complex.example.com" } ] }], VpcId: "vpc-1" } I0217 08:38:26.402363 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }] } I0217 08:38:26.402562 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0217 08:38:26.402697 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:26.402818 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0217 08:38:26.402866 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:26.402961 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", RouteTableId: "rtb-1", TransitGatewayId: "tgw-123456" } I0217 08:38:26.403066 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0217 08:38:26.403205 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:26.403263 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:26.403332 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0217 08:38:26.403456 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0217 08:38:26.403617 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0217 08:38:26.403766 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:26.403835 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0217 08:38:26.403939 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0217 08:38:26.404007 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0217 08:38:26.404046 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0217 08:38:26.404188 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0217 08:38:26.404313 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0217 08:38:26.404432 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }] } I0217 08:38:26.404507 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0217 08:38:26.404543 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0217 08:38:26.404571 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-1.1.1.0/24-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0217 08:38:26.404692 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0217 08:38:26.404734 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-4003to65535-masters.complex.example.com" } ] }] } I0217 08:38:26.404854 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-2382to4000-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0217 08:38:26.404971 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0217 08:38:26.405084 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }] } I0217 08:38:26.405161 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-0.0.0.0/0" } ] }] } I0217 08:38:26.405277 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0217 08:38:26.405351 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:26.405465 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "192.168.1.10/32", RouteTableId: "rtb-1", TransitGatewayId: "tgw-0123456" } I0217 08:38:26.405504 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }] } I0217 08:38:26.405581 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0217 08:38:26.405691 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }] } I0217 08:38:26.405762 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-1to2379-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0217 08:38:26.405871 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0217 08:38:26.405981 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-udp-1to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0217 08:38:26.406094 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0217 08:38:26.406178 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0217 08:38:26.406225 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:26.406288 7135 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0217 08:38:26.406348 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:26.406364 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:26.406429 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:26.406458 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0217 08:38:26.406489 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-3" } I0217 08:38:26.406514 7135 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "api-complex-example-com-vd3t5n", SubnetMappings: [{ AllocationId: "eipalloc-012345a678b9cdefa", SubnetId: "subnet-1" }], Tags: [ { Key: "Name", Value: "api.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], Type: "network" } I0217 08:38:26.406600 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:26.406644 7135 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-test-1:000000000000:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0217 08:38:26.407124 7135 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0217 08:38:26.407181 7135 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "true" },{ Key: "access_logs.s3.enabled", Value: "true" },{ Key: "access_logs.s3.bucket", Value: "access-log-example" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0217 08:38:26.407235 7135 api.go:53] PageSize not implemented I0217 08:38:26.407296 7135 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0217 08:38:26.407339 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:26.407376 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:26.407381 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:26.407391 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:26.407420 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:26.407472 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:26.407509 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:26.407587 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:26.407578 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:26.407603 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:26.411750 7135 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0217 08:38:26.411895 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:26.411991 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:26.412169 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:26.412287 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:26.412959 7135 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0217 08:38:26.413196 7135 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0217 08:38:26.413426 7135 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0217 08:38:26.413472 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:26.413506 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:26.413568 7135 dns.go:235] Pre-creating DNS records I0217 08:38:26.413590 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:26.420230 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:26.423995 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:26.424072 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:27.643268 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:27.805931 7135 iamrole.go:89] ListRoles: { } I0217 08:38:27.807731 7135 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0217 08:38:27.808197 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.808380 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.808522 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:27.808552 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:27.808648 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:27.808723 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.808828 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } W0217 08:38:27.808866 7135 api.go:53] PageSize not implemented I0217 08:38:27.808954 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:27.809054 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.809145 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:27.809169 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:27.809215 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:27.810210 7135 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0217 08:38:27.810375 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.810399 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:27.810487 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:27.810527 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:27.810558 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:27.810567 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:27.810680 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:27.810712 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:27.810688 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:27.810723 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:27.810763 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:27.810796 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:27.810763 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.810914 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:27.810949 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.811058 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:27.811129 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:27.811192 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.811298 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:27.811327 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0217 08:38:27.811420 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:27.811541 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:27.811579 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:27.811644 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:27.811759 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:27.811913 7135 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0217 08:38:27.812051 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:27.812173 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:27.812233 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:27.812495 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:27.812678 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:27.812933 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:27.813158 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.813278 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:27.813358 7135 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0217 08:38:27.813410 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:27.813433 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:27.813508 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:27.813524 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:27.813557 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:27.813584 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:27.813613 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:27.813638 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:27.813661 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0217 08:38:27.813743 7135 api.go:53] PageSize not implemented I0217 08:38:27.813797 7135 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0217 08:38:27.813846 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:27.813885 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:27.813857 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:27.813915 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:27.813899 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:27.813955 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:27.813949 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:27.813972 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:27.813970 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:27.814059 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:27.814151 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:27.814192 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:27.814305 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:27.814327 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:27.818369 7135 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0217 08:38:27.818463 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:27.818590 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:27.818648 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:27.818772 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:27.819180 7135 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0217 08:38:27.819367 7135 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0217 08:38:27.819577 7135 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.sslCertificate=arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678] I0217 08:38:27.824558 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:27.827445 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:27.837302 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:27.840756 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:27.840822 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:29.056628 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:29.223346 7135 iamrole.go:89] ListRoles: { } I0217 08:38:29.225204 7135 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0217 08:38:29.225387 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:29.225533 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:29.225653 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:29.225719 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0217 08:38:29.225891 7135 api.go:53] PageSize not implemented I0217 08:38:29.225877 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:29.225979 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:29.226024 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0217 08:38:29.226155 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:29.226278 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:29.226409 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:29.227270 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:29.227398 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:29.229024 7135 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0217 08:38:29.229157 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:29.229286 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:29.229219 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:29.229326 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:29.229336 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:29.229376 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:29.229317 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:29.229455 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:29.229524 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:29.229548 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:29.229485 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:29.229645 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:29.229726 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:29.229785 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:29.229901 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:29.230021 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:29.230058 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:29.230127 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:29.230222 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:29.230290 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:29.230399 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:29.230429 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:29.230491 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:29.230526 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:29.230669 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:29.230834 7135 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0217 08:38:29.230935 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:29.231117 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:29.231319 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:29.231416 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:29.231533 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:29.231564 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:29.231705 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:29.231852 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:29.232084 7135 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0217 08:38:29.232157 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0217 08:38:29.232165 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0217 08:38:29.232213 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:29.232263 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:29.232295 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:29.232322 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:29.232351 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:29.232376 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:29.232403 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:29.232546 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { Names: ["api-complex-example-com-vd3t5n"] } I0217 08:38:29.232574 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:29.232596 7135 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/1" } I0217 08:38:29.232620 7135 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/2" } I0217 08:38:29.232643 7135 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0217 08:38:29.232713 7135 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0217 08:38:29.232763 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:29.232789 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } W0217 08:38:29.232819 7135 api.go:53] PageSize not implemented I0217 08:38:29.232858 7135 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0217 08:38:29.232903 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:29.232969 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:29.232972 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:29.233027 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:29.232990 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:29.233049 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:29.233073 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:29.233077 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:29.233153 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:29.233185 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:29.233362 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:29.233410 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:29.233523 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:29.233545 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:29.238595 7135 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0217 08:38:29.238739 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:29.238902 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:29.239053 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:29.239243 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:29.239910 7135 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0217 08:38:29.240223 7135 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0217 08:38:29.240448 7135 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0217 08:38:29.240492 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:29.240524 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:29.240587 7135 dns.go:235] Pre-creating DNS records I0217 08:38:29.247160 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:29.250920 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:29.251615 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:30.485119 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:30.648547 7135 iamrole.go:89] ListRoles: { } I0217 08:38:30.650088 7135 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0217 08:38:30.650398 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0217 08:38:30.650497 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0217 08:38:30.650775 7135 api.go:53] PageSize not implemented I0217 08:38:30.650729 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:30.650844 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:30.650973 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:30.651069 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:30.651369 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:30.651548 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:30.651698 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:30.651736 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:30.651817 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:30.651884 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:30.652984 7135 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0217 08:38:30.653106 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:30.653090 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:30.653177 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:30.653223 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:30.653328 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:30.653336 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:30.653381 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:30.653326 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0217 08:38:30.653436 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:30.653517 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:30.653549 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:30.653517 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:30.653619 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:30.653661 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:30.653795 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:30.653839 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:30.653902 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0217 08:38:30.654044 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:30.654114 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:30.654230 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:30.654281 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:30.654409 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:30.654441 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:30.654550 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:30.654645 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:30.654722 7135 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0217 08:38:30.654967 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:30.655047 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:30.655215 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:30.655312 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:30.655447 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:30.655684 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:30.655799 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:30.655887 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:30.656113 7135 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0217 08:38:30.656182 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:30.656193 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:30.656266 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:30.656283 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:30.656315 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:30.656349 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:30.656384 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:30.656409 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:30.656448 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0217 08:38:30.656531 7135 api.go:53] PageSize not implemented I0217 08:38:30.656581 7135 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0217 08:38:30.656622 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:30.656673 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:30.656662 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:30.656714 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:30.656696 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:30.656749 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:30.657212 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:30.657180 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:30.657245 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:30.657276 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:30.657341 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:30.657375 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:30.657455 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:30.657487 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:30.661679 7135 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0217 08:38:30.661811 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:30.661970 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:30.662124 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:30.662263 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:30.662707 7135 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0217 08:38:30.662927 7135 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0217 08:38:30.663073 7135 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.additionalSecurityGroups=sg-123456] I0217 08:38:30.665976 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:30.670731 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:30.684014 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:30.687552 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:30.687627 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:31.902191 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:32.066060 7135 iamrole.go:89] ListRoles: { } I0217 08:38:32.067706 7135 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0217 08:38:32.067888 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:32.068031 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:32.068137 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:32.068293 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:32.068276 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:32.068408 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0217 08:38:32.068475 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0217 08:38:32.068537 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:32.068596 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:32.068616 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:32.068651 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } W0217 08:38:32.068669 7135 api.go:53] PageSize not implemented I0217 08:38:32.068675 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:32.068748 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:32.070181 7135 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0217 08:38:32.070294 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:32.070401 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:32.070521 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:32.070540 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:32.070523 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:32.070628 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:32.070632 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:32.070613 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:32.070676 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:32.070709 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:32.070763 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:32.070784 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:32.070731 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:32.070863 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:32.070893 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:32.070927 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:32.071003 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:32.071103 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:32.071138 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:32.071201 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:32.071284 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:32.071373 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:32.071421 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:32.071471 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] }] } I0217 08:38:32.071561 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:32.071808 7135 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0217 08:38:32.071902 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:32.071979 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:32.072079 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:32.072557 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:32.072765 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:32.072836 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:32.073147 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:32.073313 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:32.073499 7135 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0217 08:38:32.073566 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:32.073613 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:32.073688 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:32.073704 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:32.073739 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:32.073767 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:32.073797 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:32.073822 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:32.073847 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0217 08:38:32.073937 7135 api.go:53] PageSize not implemented I0217 08:38:32.073992 7135 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0217 08:38:32.074056 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:32.074053 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0217 08:38:32.074092 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" W0217 08:38:32.074100 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:32.074111 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:32.074133 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:32.074115 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:32.074229 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:32.074296 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:32.074326 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:32.074463 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:32.074489 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:32.074561 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:32.074584 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:32.081650 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:38:32.081718 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:32.081813 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:32.081895 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:32.082044 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:32.082229 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:32.082265 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:32.082665 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:38:32.082834 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:38:32.082996 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:38:32.083047 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:32.083077 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:32.083141 7135 dns.go:235] Pre-creating DNS records I0217 08:38:32.090635 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:32.094351 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:32.094423 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:33.317120 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:33.462692 7135 iamrole.go:89] ListRoles: { } I0217 08:38:33.464379 7135 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0217 08:38:33.464621 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0217 08:38:33.464864 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:33.464884 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.465055 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:33.465147 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } W0217 08:38:33.465239 7135 api.go:53] PageSize not implemented I0217 08:38:33.465222 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.465323 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:33.465397 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:33.465465 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.465616 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.465692 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:33.465716 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:33.465761 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:33.466852 7135 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0217 08:38:33.467020 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:33.467105 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:33.467138 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:33.467087 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:33.467210 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:33.467249 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:33.467277 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:33.467300 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:33.467312 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:33.467243 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.467427 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:33.467516 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:33.467580 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.467684 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:33.467748 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.467842 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:33.467963 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:33.468024 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.468184 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:33.468220 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:33.468333 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:33.468413 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:33.468525 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:33.468561 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.468661 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:33.468732 7135 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0217 08:38:33.468924 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:33.469034 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:33.469209 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:33.469356 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:33.469493 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:33.469694 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:33.469903 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:33.470026 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:33.470121 7135 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0217 08:38:33.470189 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0217 08:38:33.470203 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0217 08:38:33.470252 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:33.470305 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:33.470339 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:33.470368 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:33.470398 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:33.470423 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:33.470445 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0217 08:38:33.470516 7135 api.go:53] PageSize not implemented I0217 08:38:33.470562 7135 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0217 08:38:33.470630 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0217 08:38:33.470676 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0217 08:38:33.470702 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:33.470717 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:33.470740 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:33.470765 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:33.470724 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:33.470870 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:33.470897 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:33.470996 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:33.471057 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:33.471206 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:33.471273 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:33.471291 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:33.477822 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:38:33.478080 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:33.478341 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:33.478587 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:33.478852 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:33.480604 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:38:33.480833 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:38:33.481732 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t3.large] I0217 08:38:33.485841 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:33.488844 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:33.488922 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:33.497943 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:33.501486 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:33.501568 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:33.501613 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:34.742354 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:34.906218 7135 iamrole.go:89] ListRoles: { } I0217 08:38:34.908244 7135 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0217 08:38:34.908420 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0217 08:38:34.908651 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:34.908774 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.908845 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0217 08:38:34.908948 7135 api.go:53] PageSize not implemented I0217 08:38:34.909202 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0217 08:38:34.909309 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:34.909372 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.909515 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.909689 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:34.909735 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:34.909799 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:34.909846 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.909995 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:34.912184 7135 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0217 08:38:34.912377 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.912635 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:34.912742 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:34.912884 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:34.912976 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:34.912987 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:34.912926 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:34.913089 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:34.913262 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:34.913274 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:34.913321 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:34.913387 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:34.913478 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.913695 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.913893 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:34.914199 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.914510 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:34.914672 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:34.914784 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:34.915076 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:34.915245 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:34.915741 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:34.915894 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.916034 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:34.916076 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:34.916363 7135 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0217 08:38:34.916532 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:34.917294 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:34.917362 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:34.917468 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:34.917627 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:34.917885 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:34.917995 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:34.918211 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:34.918332 7135 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0217 08:38:34.918392 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:34.918435 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:34.918514 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:34.918531 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:34.918566 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:34.918594 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:34.918625 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:34.918650 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:34.918675 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0217 08:38:34.918756 7135 api.go:53] PageSize not implemented I0217 08:38:34.918802 7135 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0217 08:38:34.918849 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:34.918896 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:34.918919 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:34.918979 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:34.918909 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:34.918999 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:34.919057 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:34.919078 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:34.919113 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:34.919190 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:34.919230 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:34.919249 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:34.919332 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:34.919355 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:34.923414 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:38:34.923517 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:34.923643 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:34.923702 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:34.923837 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:34.924465 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:38:34.924737 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:38:34.924953 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:38:34.924999 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:34.925031 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:34.925087 7135 dns.go:235] Pre-creating DNS records I0217 08:38:34.932082 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:34.935701 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:34.935776 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:34.935818 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.154877 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:36.310915 7135 iamrole.go:89] ListRoles: { } I0217 08:38:36.312271 7135 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0217 08:38:36.312556 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:36.312713 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:36.312832 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:36.312847 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:36.312908 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:36.312970 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:36.313010 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0217 08:38:36.312924 7135 api.go:53] PageSize not implemented I0217 08:38:36.313132 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:36.315164 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0217 08:38:36.315386 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:36.315635 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:36.315933 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:36.316372 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0217 08:38:36.318527 7135 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0217 08:38:36.318643 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] }] } I0217 08:38:36.318884 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:36.318802 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:36.318981 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:36.319058 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:36.319084 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:36.319017 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:36.319132 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:36.319159 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:36.319295 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:36.319196 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:36.319854 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:36.319893 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:36.319845 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:36.320014 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:36.320099 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:36.320246 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:36.320285 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:36.320434 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:36.320467 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:36.320612 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:36.320649 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:36.320730 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:36.320823 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:36.320893 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:36.321076 7135 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0217 08:38:36.321270 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:36.321360 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:36.321496 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:36.321596 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:36.321833 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:36.322052 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:36.322195 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] }] } I0217 08:38:36.322310 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:36.322474 7135 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0217 08:38:36.322534 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0217 08:38:36.322541 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0217 08:38:36.322589 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:36.322605 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:36.322637 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:36.322664 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:36.322694 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:36.322721 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:36.322744 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0217 08:38:36.322812 7135 api.go:53] PageSize not implemented I0217 08:38:36.322848 7135 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0217 08:38:36.322875 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:36.322916 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:36.322916 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:36.322956 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:36.322929 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:36.322978 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:36.323029 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:36.323050 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:36.323069 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:36.323160 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:36.323182 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:36.323242 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:36.323278 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:36.323290 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:36.327704 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:38:36.327802 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.327950 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.328075 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.328221 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.328672 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:38:36.328860 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:38:36.329010 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t2.medium] I0217 08:38:36.331406 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:36.334312 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.334379 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.334416 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.342412 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:36.345780 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.345845 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.345885 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:36.345921 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:37.560780 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:37.729219 7135 iamrole.go:89] ListRoles: { } I0217 08:38:37.731117 7135 executor.go:111] Tasks: 0 done / 136 total; 52 can run W0217 08:38:37.731299 7135 api.go:53] PageSize not implemented I0217 08:38:37.731380 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0217 08:38:37.731511 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:37.731618 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:37.731796 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:37.731803 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:37.731837 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:37.731920 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:37.731959 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0217 08:38:37.732035 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:37.732387 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:37.732527 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] }] } I0217 08:38:37.732689 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:37.732810 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:37.734704 7135 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0217 08:38:37.734855 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:37.734930 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:37.734960 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:37.734901 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:37.734939 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:37.735036 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:37.734995 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:37.735073 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:37.735051 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:37.735112 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:37.735195 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:37.735235 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:37.735304 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0217 08:38:37.735405 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:37.735464 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:37.735557 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:37.735675 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:37.735712 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:37.735814 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:37.735876 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:37.736057 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:37.736109 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:37.736181 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:37.736283 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:37.736511 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:37.736615 7135 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0217 08:38:37.736722 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:37.736827 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:37.736961 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:37.736995 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:37.737167 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:37.737367 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:37.737526 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:37.737631 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:37.737984 7135 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0217 08:38:37.738042 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:37.738101 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:37.738183 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:37.738199 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:37.738232 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:37.738259 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:37.738290 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:37.738316 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:37.738340 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0217 08:38:37.738418 7135 api.go:53] PageSize not implemented I0217 08:38:37.738471 7135 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0217 08:38:37.738538 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:37.738578 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:37.738598 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:37.738621 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:37.738596 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:37.738660 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:37.738678 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:37.738763 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:37.738800 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:37.738880 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:37.738922 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:37.738998 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:37.739044 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:37.739058 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:37.743209 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:38:37.743315 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:37.743441 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:37.743494 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:37.743631 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:37.744303 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:38:37.744613 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:38:37.744831 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:38:37.744876 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:37.744908 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:37.744966 7135 dns.go:235] Pre-creating DNS records I0217 08:38:37.755033 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0217 08:38:37.758364 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:37.758438 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:37.758479 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:37.758515 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:38.978048 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:39.139167 7135 iamrole.go:89] ListRoles: { } I0217 08:38:39.140864 7135 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0217 08:38:39.141316 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0217 08:38:39.141450 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0217 08:38:39.141630 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0217 08:38:39.141717 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.141813 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.141908 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0217 08:38:39.142082 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0217 08:38:39.142210 7135 api.go:53] PageSize not implemented I0217 08:38:39.142405 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.142551 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:39.142590 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:39.142657 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0217 08:38:39.142765 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.142899 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:39.145881 7135 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0217 08:38:39.146227 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.146553 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0217 08:38:39.146793 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:39.146677 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0217 08:38:39.146866 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:39.146945 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:39.146993 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0217 08:38:39.147134 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.147453 7135 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:39.147463 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:39.147593 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:39.147947 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0217 08:38:39.148014 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:39.148045 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0217 08:38:39.147645 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0217 08:38:39.148218 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:39.148284 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:39.148335 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.148439 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0217 08:38:39.148594 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.148781 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:39.148841 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.149546 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:39.149612 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:39.149694 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:39.149824 7135 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0217 08:38:39.150037 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:39.150275 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:39.150366 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:39.150511 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:39.150652 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:39.150937 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.151065 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0217 08:38:39.151095 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:39.151187 7135 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0217 08:38:39.151235 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:39.151290 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:39.151364 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:39.151380 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:39.151413 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:39.151442 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0217 08:38:39.151471 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0217 08:38:39.151496 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0217 08:38:39.151520 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0217 08:38:39.151595 7135 api.go:53] PageSize not implemented I0217 08:38:39.151634 7135 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0217 08:38:39.151674 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:39.151710 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:39.151708 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:39.151747 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:39.151728 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:39.151766 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:39.151791 7135 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0217 08:38:39.151815 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:39.151899 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:39.151930 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:39.152086 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:39.152112 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:39.152183 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0217 08:38:39.152201 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:39.156227 7135 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0217 08:38:39.156324 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:39.156441 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:39.156528 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:39.156663 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:39.157701 7135 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0217 08:38:39.157883 7135 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0217 08:38:39.158081 7135 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0217 08:38:39.158229 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:39.158277 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:39.158313 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:39.158336 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:39.158359 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:39.158380 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:39.158402 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:39.158428 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:39.158459 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:39.158492 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:39.158516 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:39.158539 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:39.158566 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:39.158589 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:39.158618 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:39.158647 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:39.158673 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:39.158698 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:39.158724 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:39.158747 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:39.158774 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0217 08:38:39.158801 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:39.158825 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:39.158847 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:39.158875 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:39.158901 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:39.158929 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:39.161320 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:39.161377 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:39.161394 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:39.161423 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.161468 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0217 08:38:39.161519 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.161564 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.161601 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.161643 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.161678 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.161714 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0217 08:38:39.161757 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.161812 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0217 08:38:39.161843 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } W0217 08:38:39.161888 7135 api.go:53] PageSize not implemented I0217 08:38:39.161904 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:39.161924 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:39.161936 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0217 08:38:39.161967 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:39.161986 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:39.162000 7135 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" ] } I0217 08:38:39.162052 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:39.162082 7135 iamrole.go:89] ListRoles: { } I0217 08:38:39.162115 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:39.162136 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:39.162170 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:39.162212 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:39.162254 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1"] } I0217 08:38:39.162735 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } autoscaling-group:nodes.complex.example.com ok subnet:subnet-3 ok I0217 08:38:39.162794 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok autoscaling-config:lt-2 ok autoscaling-group:master-us-test-1a.masters.complex.example.com ok I0217 08:38:39.162840 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok I0217 08:38:39.162870 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0217 08:38:39.162910 7135 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1 ok I0217 08:38:39.162889 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:39.162946 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } iam-instance-profile:nodes.complex.example.com ok I0217 08:38:39.162966 7135 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5 ok I0217 08:38:39.162997 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0217 08:38:39.163011 7135 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4 ok I0217 08:38:39.163039 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } iam-instance-profile:masters.complex.example.com ok I0217 08:38:39.162808 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.complex.example.com. ok I0217 08:38:39.162979 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }, { FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0217 08:38:39.163276 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:39.163297 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:39.163335 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0217 08:38:39.163387 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:39.163451 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 } ] } W0217 08:38:39.163624 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:39.163645 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0217 08:38:39.163672 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:39.163710 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0217 08:38:39.163731 7135 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0217 08:38:39.163776 7135 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0217 08:38:39.163852 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0217 08:38:39.163868 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.complex.example.com" } I0217 08:38:39.163937 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.complex.example.com I0217 08:38:39.163951 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0217 08:38:39.163951 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0217 08:38:39.163983 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.complex.example.com" } iam-role:nodes.complex.example.com ok I0217 08:38:39.164036 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.complex.example.com" } I0217 08:38:39.164076 7135 iamrole.go:180] ListAttachedRolePolicies: masters.complex.example.com I0217 08:38:39.164089 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0217 08:38:39.164117 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.complex.example.com" } iam-role:masters.complex.example.com ok I0217 08:38:39.164172 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0217 08:38:39.164238 7135 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0217 08:38:39.164303 7135 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleComplex (14.19s) === RUN TestLifecycleExternalLB I0217 08:38:39.164799 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:39.165024 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:39.165058 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:39.165093 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:39.165124 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:39.165164 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:39.165197 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:39.165221 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:39.165251 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:39.165274 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster externallb.example.com I0217 08:38:39.185620 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:39.188437 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:39.188520 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:40.457620 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:40.608054 7135 iamrole.go:89] ListRoles: { } I0217 08:38:40.609549 7135 executor.go:111] Tasks: 0 done / 107 total; 51 can run W0217 08:38:40.609754 7135 api.go:53] PageSize not implemented I0217 08:38:40.609756 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0217 08:38:40.609855 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0217 08:38:40.609889 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } W0217 08:38:40.609874 7135 api.go:53] PageSize not implemented I0217 08:38:40.610150 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } I0217 08:38:40.610227 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0217 08:38:40.610294 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:40.610451 7135 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.610469 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } I0217 08:38:40.610547 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:40.610553 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0217 08:38:40.610609 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } W0217 08:38:40.610657 7135 api.go:53] PageSize not implemented I0217 08:38:40.610695 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0217 08:38:40.610763 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0217 08:38:40.610786 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0217 08:38:40.610743 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:40.610857 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:40.610856 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0217 08:38:40.610896 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:40.610949 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0217 08:38:40.610978 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } I0217 08:38:40.610972 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:40.611122 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:40.611133 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:40.611237 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:40.611283 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.611399 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:40.611528 7135 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.611591 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0217 08:38:40.611617 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0217 08:38:40.611641 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:40.611674 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:40.612984 7135 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0217 08:38:40.613176 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["externallb.example.com"] }] } I0217 08:38:40.613265 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0217 08:38:40.613220 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0217 08:38:40.613372 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0217 08:38:40.613334 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:40.613457 7135 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0217 08:38:40.613403 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0217 08:38:40.613510 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:40.613483 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0217 08:38:40.613566 7135 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" } ] } I0217 08:38:40.613600 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0217 08:38:40.613740 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0217 08:38:40.613668 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0217 08:38:40.613858 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:40.614044 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:40.614176 7135 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0217 08:38:40.614219 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:40.614353 7135 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.614426 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:40.614463 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0217 08:38:40.614613 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:40.614684 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:40.614718 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:40.614746 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:40.614779 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:40.614809 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:40.614873 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:40.614912 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:40.614940 7135 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0217 08:38:40.615133 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/externallb.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0217 08:38:40.617481 7135 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0217 08:38:40.617666 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-udp-1to65535-masters.externallb.example.com" }] }] } I0217 08:38:40.617870 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0217 08:38:40.617980 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.618088 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.618187 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-4003to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.618344 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.618447 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:40.618554 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0217 08:38:40.618588 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0217 08:38:40.618672 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-1to2379-masters.externallb.example.com" }] }] } I0217 08:38:40.618846 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:40.618930 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:40.618977 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:40.619022 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0217 08:38:40.619127 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-::/0" }] }] } I0217 08:38:40.619230 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:40.619298 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:40.619380 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-2382to4000-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.619529 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.619635 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.619731 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" }] }] } I0217 08:38:40.619828 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:38:40.619872 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0217 08:38:40.619974 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:38:40.620010 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:40.620383 7135 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0217 08:38:40.620663 7135 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0217 08:38:40.620885 7135 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0217 08:38:40.620934 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:40.620962 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:40.621021 7135 dns.go:235] Pre-creating DNS records I0217 08:38:40.621047 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:40.625953 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:40.628595 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:40.628665 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:41.858423 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:42.000217 7135 iamrole.go:89] ListRoles: { } I0217 08:38:42.001367 7135 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0217 08:38:42.002586 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] }] } I0217 08:38:42.003003 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0217 08:38:42.003083 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0217 08:38:42.003106 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } W0217 08:38:42.003266 7135 api.go:53] PageSize not implemented W0217 08:38:42.004236 7135 api.go:53] PageSize not implemented I0217 08:38:42.004850 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0217 08:38:42.005131 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0217 08:38:42.005183 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0217 08:38:42.005168 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.005262 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0217 08:38:42.005407 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0217 08:38:42.005449 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } W0217 08:38:42.005499 7135 api.go:53] PageSize not implemented I0217 08:38:42.005782 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:42.006913 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:42.007091 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.007182 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:42.007208 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:42.007249 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:42.007662 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.008863 7135 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0217 08:38:42.009118 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0217 08:38:42.009056 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0217 08:38:42.009172 7135 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0217 08:38:42.009209 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["externallb.example.com"] }] } I0217 08:38:42.009330 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0217 08:38:42.009489 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:42.009569 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:42.009629 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:42.009701 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.009796 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.009904 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:42.009932 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:42.013301 7135 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0217 08:38:42.013583 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:42.013745 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:42.013914 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:42.014157 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:42.014264 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:42.014368 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:42.014476 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:42.015105 7135 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0217 08:38:42.015319 7135 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0217 08:38:42.015532 7135 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0217 08:38:42.017939 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:42.017987 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:42.018017 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:42.018041 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:42.018063 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:42.018093 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:42.018115 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:42.018140 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:42.018164 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:42.018192 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:42.018222 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:42.018244 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:42.018266 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:42.018292 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:42.018316 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:42.018340 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:42.018365 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:42.018392 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:42.018416 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:42.018436 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:42.018458 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:42.018484 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:42.018510 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:42.018535 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:42.019591 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:42.019640 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:42.019654 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:42.019684 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.019720 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0217 08:38:42.019763 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.019806 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.019840 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.019879 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.019913 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.019941 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0217 08:38:42.019977 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.020016 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0217 08:38:42.020045 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } W0217 08:38:42.020087 7135 api.go:53] PageSize not implemented I0217 08:38:42.020103 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:42.020121 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:42.020135 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:42.020152 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:42.020165 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0217 08:38:42.020201 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:42.020232 7135 iamrole.go:89] ListRoles: { } I0217 08:38:42.020265 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:42.020285 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:42.020314 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:42.020348 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:42.020373 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:42.020734 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:master-us-test-1a.masters.externallb.example.com ok autoscaling-group:nodes.externallb.example.com ok I0217 08:38:42.020783 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 } ] } W0217 08:38:42.020951 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:42.020967 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0217 08:38:42.020990 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0217 08:38:42.021018 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0217 08:38:42.021053 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } iam-instance-profile:nodes.externallb.example.com ok I0217 08:38:42.020919 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:42.021067 7135 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.externallb.example.com. ok I0217 08:38:42.021086 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0217 08:38:42.021110 7135 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0217 08:38:42.021124 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } iam-instance-profile:masters.externallb.example.com ok I0217 08:38:42.021134 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:42.021166 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0217 08:38:42.021252 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:42.021270 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:42.021302 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-1 ok I0217 08:38:42.021361 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0217 08:38:42.021497 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.externallb.example.com" } I0217 08:38:42.021542 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.externallb.example.com I0217 08:38:42.021512 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0217 08:38:42.021555 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0217 08:38:42.021584 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.externallb.example.com" } iam-role:nodes.externallb.example.com ok I0217 08:38:42.021610 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.externallb.example.com" } I0217 08:38:42.021642 7135 iamrole.go:180] ListAttachedRolePolicies: masters.externallb.example.com I0217 08:38:42.021653 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0217 08:38:42.021673 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.externallb.example.com" } iam-role:masters.externallb.example.com ok I0217 08:38:42.021722 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0217 08:38:42.021785 7135 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0217 08:38:42.021843 7135 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleExternalLB (2.86s) === RUN TestLifecycleSharedSubnet I0217 08:38:42.022343 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:42.022579 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:42.022614 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:42.022650 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:42.022680 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:42.022717 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:42.022751 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:42.022774 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:42.022806 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:42.022830 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedsubnet.example.com I0217 08:38:42.043506 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:42.046309 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:42.046378 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:43.308787 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:43.458720 7135 iamrole.go:89] ListRoles: { } I0217 08:38:43.459857 7135 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0217 08:38:43.460253 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } I0217 08:38:43.460366 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0217 08:38:43.460535 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:43.460886 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } I0217 08:38:43.460907 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] }] } I0217 08:38:43.460964 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0217 08:38:43.461083 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:43.461207 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:43.461254 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:43.461399 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0217 08:38:43.461509 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] }] } I0217 08:38:43.461645 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:43.461754 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:43.461795 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:38:43.461852 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0217 08:38:43.461874 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0217 08:38:43.463058 7135 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0217 08:38:43.463250 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0217 08:38:43.463285 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0217 08:38:43.463225 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0217 08:38:43.463349 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0217 08:38:43.463493 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0217 08:38:43.463494 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:38:43.463551 7135 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0217 08:38:43.463608 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:43.463648 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0217 08:38:43.463674 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }], VpcId: "vpc-12345678" } I0217 08:38:43.463738 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:43.463768 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:43.463791 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0217 08:38:43.463905 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0217 08:38:43.463966 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:43.463993 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:43.464012 7135 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "shared" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] } I0217 08:38:43.464980 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedsubnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0217 08:38:43.466414 7135 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0217 08:38:43.466546 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0217 08:38:43.466651 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-4003to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0217 08:38:43.466750 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-2382to4000-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0217 08:38:43.466915 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-1to2379-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0217 08:38:43.467084 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0217 08:38:43.467321 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0217 08:38:43.467570 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0217 08:38:43.467789 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:43.467924 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:43.468105 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedsubnet.example.com" }] }] } I0217 08:38:43.468310 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-udp-1to65535-masters.sharedsubnet.example.com" }] }] } I0217 08:38:43.468616 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0217 08:38:43.468794 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:43.468894 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:43.468982 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0217 08:38:43.469180 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0217 08:38:43.469445 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-::/0" }] }] } I0217 08:38:43.469688 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" }] }] } I0217 08:38:43.469852 7135 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0217 08:38:43.470051 7135 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0217 08:38:43.470291 7135 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0217 08:38:43.470330 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:43.470360 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:43.470415 7135 dns.go:235] Pre-creating DNS records I0217 08:38:43.470441 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:43.475055 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:43.477812 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:43.477877 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:44.702974 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:44.849947 7135 iamrole.go:89] ListRoles: { } I0217 08:38:44.851117 7135 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0217 08:38:44.851360 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:38:44.851497 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0217 08:38:44.851540 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0217 08:38:44.851652 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.851963 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:44.852880 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.853663 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:44.855447 7135 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0217 08:38:44.855591 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0217 08:38:44.855622 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0217 08:38:44.855788 7135 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0217 08:38:44.855753 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0217 08:38:44.855928 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:44.855984 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:44.856033 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0217 08:38:44.856165 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:38:44.859756 7135 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0217 08:38:44.860031 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:44.860184 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:44.860368 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:44.860496 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:44.861046 7135 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0217 08:38:44.861240 7135 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0217 08:38:44.861368 7135 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0217 08:38:44.863513 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:44.863557 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:44.863581 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:44.863605 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:44.863626 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:44.863653 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:44.863680 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:44.863706 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:44.863735 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:44.863757 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:44.863779 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:44.863800 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:44.863823 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:44.863846 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:44.863871 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:44.863893 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:44.863913 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:44.863959 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:44.863984 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:44.865083 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:44.865136 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:44.865152 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:44.865182 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.865219 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0217 08:38:44.865261 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.865305 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.865338 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.865370 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.865404 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.865430 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0217 08:38:44.865458 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.865491 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0217 08:38:44.865515 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } W0217 08:38:44.865553 7135 api.go:53] PageSize not implemented I0217 08:38:44.865572 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:44.865592 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:44.865608 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:44.865625 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:44.865640 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0217 08:38:44.865677 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:44.865707 7135 iamrole.go:89] ListRoles: { } I0217 08:38:44.865739 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:44.865760 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:44.865796 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:44.865826 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:44.866115 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0217 08:38:44.866168 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:44.866171 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0217 08:38:44.866230 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } iam-instance-profile:masters.sharedsubnet.example.com ok autoscaling-group:master-us-test-1a.masters.sharedsubnet.example.com ok autoscaling-group:nodes.sharedsubnet.example.com ok I0217 08:38:44.866292 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0217 08:38:44.866209 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0217 08:38:44.866374 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:44.866240 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:44.866352 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.sharedsubnet.example.com. ok I0217 08:38:44.866390 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } iam-instance-profile:nodes.sharedsubnet.example.com ok security-group:sg-2 ok autoscaling-config:lt-1 ok I0217 08:38:44.866451 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-2 ok I0217 08:38:44.866509 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:44.866554 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0217 08:38:44.866649 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:44.866665 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:44.866689 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0217 08:38:44.866760 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedsubnet.example.com" } I0217 08:38:44.866800 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0217 08:38:44.866812 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0217 08:38:44.866836 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedsubnet.example.com" } iam-role:nodes.sharedsubnet.example.com ok I0217 08:38:44.866858 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedsubnet.example.com" } I0217 08:38:44.866888 7135 iamrole.go:180] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0217 08:38:44.866898 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0217 08:38:44.866917 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedsubnet.example.com" } iam-role:masters.sharedsubnet.example.com ok --- PASS: TestLifecycleSharedSubnet (2.84s) === RUN TestLifecyclePrivateSharedSubnet I0217 08:38:44.867351 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:44.867557 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:44.867590 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:44.867626 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:44.867656 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:44.867695 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:44.867729 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:44.867751 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:44.867779 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:44.867800 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-subnet.example.com I0217 08:38:44.889815 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:44.892570 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:44.892635 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:44.892675 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:46.109582 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:46.263281 7135 iamrole.go:89] ListRoles: { } I0217 08:38:46.264934 7135 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0217 08:38:46.265358 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:46.265402 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:46.265534 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } I0217 08:38:46.265595 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0217 08:38:46.265616 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:46.265747 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:46.265798 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:46.265864 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:38:46.265930 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.266069 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0217 08:38:46.266050 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } I0217 08:38:46.266101 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0217 08:38:46.266135 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] } I0217 08:38:46.266176 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:46.266343 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:46.266461 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:46.266474 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } I0217 08:38:46.266537 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0217 08:38:46.267562 7135 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0217 08:38:46.267695 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0217 08:38:46.267674 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0217 08:38:46.267762 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0217 08:38:46.267874 7135 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0217 08:38:46.267862 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0217 08:38:46.267949 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:46.267909 7135 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-su-5ol32q", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-private-shared-su-5ol32q" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0217 08:38:46.267996 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:46.268011 7135 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0217 08:38:46.268044 7135 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0217 08:38:46.268087 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0217 08:38:46.268046 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:38:46.268151 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0217 08:38:46.268179 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0217 08:38:46.268229 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0217 08:38:46.268258 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0217 08:38:46.268376 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0217 08:38:46.268351 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0217 08:38:46.268558 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0217 08:38:46.268639 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:46.268676 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:46.268707 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0217 08:38:46.268853 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0217 08:38:46.268921 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:46.268961 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:46.268992 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0217 08:38:46.269133 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0217 08:38:46.269312 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0217 08:38:46.269387 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0217 08:38:46.269424 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:46.269458 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:46.269489 7135 tags.go:42] CreateTags { Resources: ["subnet-abcdef"], Tags: [{ Key: "kubernetes.io/role/elb", Value: "1" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Utility" }] } I0217 08:38:46.269549 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:46.269380 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-subnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0217 08:38:46.269615 7135 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Private" },{ Key: "kubernetes.io/role/internal-elb", Value: "1" }] } I0217 08:38:46.269755 7135 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0217 08:38:46.269911 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-2382to4000-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } W0217 08:38:46.270013 7135 api.go:53] PageSize not implemented I0217 08:38:46.270013 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:46.270089 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:46.270134 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:46.270102 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.270200 7135 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"], Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api.private-shared-subnet.example.com" }] } I0217 08:38:46.270250 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:46.270199 7135 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-su-5ol32q", SubnetMappings: [{ SubnetId: "subnet-abcdef" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], Type: "network" } I0217 08:38:46.270282 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0217 08:38:46.270275 7135 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0217 08:38:46.270317 7135 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0217 08:38:46.270329 7135 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1", Port: 22, Protocol: "TCP" } W0217 08:38:46.270399 7135 api.go:53] PageSize not implemented I0217 08:38:46.270417 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:46.270405 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.270662 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.270795 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0217 08:38:46.270987 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.271132 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0217 08:38:46.271252 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-4003to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.271469 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-1to2379-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.271594 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.271700 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.271817 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0217 08:38:46.271893 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-udp-1to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.272012 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.272121 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:46.272196 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.272297 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" }] }] } I0217 08:38:46.272396 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.272490 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.272589 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:46.272660 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.272759 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:46.272842 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:46.272928 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0217 08:38:46.273038 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.273168 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0217 08:38:46.273320 7135 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0217 08:38:46.273383 7135 api.go:53] PageSize not implemented I0217 08:38:46.273434 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:46.273441 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0217 08:38:46.273517 7135 api.go:53] PageSize not implemented I0217 08:38:46.273566 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:46.273539 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:46.273661 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:46.273729 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:46.277823 7135 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0217 08:38:46.278107 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:46.278220 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:46.278292 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:46.278394 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:46.278964 7135 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0217 08:38:46.279194 7135 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0217 08:38:46.279404 7135 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0217 08:38:46.279450 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:46.279480 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:46.279539 7135 dns.go:235] Pre-creating DNS records I0217 08:38:46.279561 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:46.285228 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:46.288233 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:46.288299 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:46.288344 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:47.540340 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:47.683522 7135 iamrole.go:89] ListRoles: { } I0217 08:38:47.684719 7135 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0217 08:38:47.685019 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.685332 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:38:47.685376 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0217 08:38:47.685392 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0217 08:38:47.686960 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:47.687423 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:47.689000 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.692434 7135 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0217 08:38:47.692550 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0217 08:38:47.692600 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0217 08:38:47.692728 7135 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0217 08:38:47.692682 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0217 08:38:47.692818 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:47.692863 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:38:47.692978 7135 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0217 08:38:47.692945 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0217 08:38:47.693122 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:47.693147 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0217 08:38:47.693206 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0217 08:38:47.693234 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0217 08:38:47.693179 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0217 08:38:47.693297 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:47.693339 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0217 08:38:47.693486 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0217 08:38:47.693623 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:47.694113 7135 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0217 08:38:47.694394 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:47.694475 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:47.694493 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0217 08:38:47.694462 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:47.694534 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } W0217 08:38:47.694474 7135 api.go:53] PageSize not implemented I0217 08:38:47.694567 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:47.694568 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0217 08:38:47.694616 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:47.694693 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0217 08:38:47.694732 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0217 08:38:47.694708 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:47.694818 7135 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } W0217 08:38:47.694884 7135 api.go:53] PageSize not implemented I0217 08:38:47.694900 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:47.694966 7135 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0217 08:38:47.695005 7135 api.go:53] PageSize not implemented I0217 08:38:47.695034 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:47.695041 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:47.695079 7135 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0217 08:38:47.695105 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:47.695190 7135 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0217 08:38:47.695098 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } W0217 08:38:47.695264 7135 api.go:53] PageSize not implemented I0217 08:38:47.695311 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:47.695379 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:47.699998 7135 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0217 08:38:47.700115 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:47.700247 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:47.700310 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:47.700441 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:47.701027 7135 executor.go:111] Tasks: 115 done / 123 total; 2 can run W0217 08:38:47.701202 7135 api.go:53] PageSize not implemented I0217 08:38:47.701225 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:47.701392 7135 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0217 08:38:47.701590 7135 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0217 08:38:47.704193 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:47.704246 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:47.704270 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:47.704292 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:47.704313 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:47.704339 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:47.704364 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:47.704391 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:47.704419 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0217 08:38:47.704445 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:47.704466 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:47.704486 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:47.704507 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:47.704530 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:47.704553 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:47.704576 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0217 08:38:47.704597 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:47.704620 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:47.704643 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:47.704665 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:47.704690 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:47.704714 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:47.705896 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:47.705950 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:47.705965 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:47.705996 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.706037 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0217 08:38:47.706087 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.706133 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.706163 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.706194 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.706227 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.706250 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0217 08:38:47.706275 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.706306 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0217 08:38:47.706328 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } W0217 08:38:47.706361 7135 api.go:53] PageSize not implemented I0217 08:38:47.706374 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0217 08:38:47.706402 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:47.706420 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:47.706432 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0217 08:38:47.706457 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:47.706474 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:47.706486 7135 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" ] } I0217 08:38:47.706528 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:47.706562 7135 iamrole.go:89] ListRoles: { } I0217 08:38:47.706595 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:47.706615 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:47.706644 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:47.706676 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:47.707090 7135 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4 ok I0217 08:38:47.707147 7135 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1 ok I0217 08:38:47.707179 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:47.707234 7135 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } load-balancer:api-private-shared-subnet-n2f8ak ok autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com ok autoscaling-group:bastion.private-shared-subnet.example.com ok I0217 08:38:47.707269 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:47.707135 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } autoscaling-group:nodes.private-shared-subnet.example.com ok I0217 08:38:47.707376 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } iam-instance-profile:nodes.private-shared-subnet.example.com ok I0217 08:38:47.707237 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.private-shared-subnet.example.com. ok I0217 08:38:47.707346 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 } ] } I0217 08:38:47.707437 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } W0217 08:38:47.707486 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:47.707504 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0217 08:38:47.707509 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } iam-instance-profile:bastions.private-shared-subnet.example.com ok I0217 08:38:47.707541 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0217 08:38:47.707583 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } iam-instance-profile:masters.private-shared-subnet.example.com ok I0217 08:38:47.707535 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0217 08:38:47.707695 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:47.707714 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0217 08:38:47.707738 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0217 08:38:47.707782 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:47.707823 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } W0217 08:38:47.707910 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:47.707928 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok autoscaling-config:lt-3 ok I0217 08:38:47.707968 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0217 08:38:47.708019 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok I0217 08:38:47.708102 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-subnet.example.com" } I0217 08:38:47.708140 7135 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0217 08:38:47.708163 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:47.708159 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-subnet.example.com" } I0217 08:38:47.708333 7135 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0217 08:38:47.708237 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } W0217 08:38:47.708368 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:47.708357 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0217 08:38:47.708391 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:47.708405 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0217 08:38:47.708465 7135 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-subnet.example.com" } iam-role:bastions.private-shared-subnet.example.com ok I0217 08:38:47.708497 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-subnet.example.com" } I0217 08:38:47.708545 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0217 08:38:47.708556 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0217 08:38:47.708577 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-subnet.example.com" } iam-role:nodes.private-shared-subnet.example.com ok I0217 08:38:47.708611 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-subnet.example.com" } iam-role:masters.private-shared-subnet.example.com ok --- PASS: TestLifecyclePrivateSharedSubnet (2.84s) === RUN TestLifecyclePrivateSharedIP I0217 08:38:47.709153 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:47.709387 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:47.709424 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:47.709461 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:47.709492 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:47.709531 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:47.709562 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:47.709584 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:47.709613 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:47.709635 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-ip.example.com I0217 08:38:47.732606 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:47.735623 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:47.735693 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:47.735739 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:48.970767 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:49.121776 7135 iamrole.go:89] ListRoles: { } I0217 08:38:49.123505 7135 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0217 08:38:49.123955 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:38:49.124072 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0217 08:38:49.124105 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0217 08:38:49.124095 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } I0217 08:38:49.124192 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0217 08:38:49.124426 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:49.124514 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:49.124605 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:49.124639 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } I0217 08:38:49.124734 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:49.124779 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:49.124772 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.private-shared-ip.example.com" }] } I0217 08:38:49.124914 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } I0217 08:38:49.124907 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:49.125008 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:49.124991 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] } I0217 08:38:49.125047 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:49.125173 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.126479 7135 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0217 08:38:49.126664 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0217 08:38:49.126597 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0217 08:38:49.126706 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0217 08:38:49.126726 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:49.126804 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0217 08:38:49.126833 7135 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0217 08:38:49.126912 7135 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0217 08:38:49.126869 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:49.126900 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-12345678" } I0217 08:38:49.126948 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0217 08:38:49.126971 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:49.126934 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0217 08:38:49.127044 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0217 08:38:49.127007 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0217 08:38:49.127123 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0217 08:38:49.127111 7135 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-ip-eepmph", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-private-shared-ip-eepmph" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0217 08:38:49.127188 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0217 08:38:49.127206 7135 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0217 08:38:49.127030 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0217 08:38:49.127213 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }], VpcId: "vpc-12345678" } I0217 08:38:49.127315 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:49.127360 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:49.127396 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0217 08:38:49.127563 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.private-shared-ip.example.com" }] }], VpcId: "vpc-12345678" } I0217 08:38:49.127637 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:49.127672 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:49.127701 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0217 08:38:49.127764 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:49.127795 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:49.127820 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:49.127954 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0217 08:38:49.127965 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0217 08:38:49.128120 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0217 08:38:49.128187 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:49.128263 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:38:49.128332 7135 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0217 08:38:49.128410 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:49.128449 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:49.128481 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:49.128511 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:49.128534 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0217 08:38:49.128571 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:49.128599 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0217 08:38:49.128693 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" } ] }], VpcId: "vpc-12345678" } I0217 08:38:49.128761 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:49.128792 7135 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0217 08:38:49.128639 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-ip.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0217 08:38:49.128951 7135 executor.go:111] Tasks: 74 done / 132 total; 36 can run W0217 08:38:49.129136 7135 api.go:53] PageSize not implemented I0217 08:38:49.129092 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-udp-1to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.129198 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:49.129268 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:49.129253 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:49.129329 7135 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"], Tags: [{ Key: "Name", Value: "api.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0217 08:38:49.129379 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:49.129311 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.129363 7135 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-ip-eepmph", SubnetMappings: [{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }], Type: "network" } I0217 08:38:49.129409 7135 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0217 08:38:49.129454 7135 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0217 08:38:49.129423 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-4003to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.129529 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-ip.example.com" }] }] } I0217 08:38:49.129631 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.129732 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:49.129811 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:49.129967 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.130207 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:49.130295 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:49.130377 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.130498 7135 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0217 08:38:49.130575 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:49.130690 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:49.130744 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.130854 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:49.130919 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.131028 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:49.131065 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0217 08:38:49.131146 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0217 08:38:49.131182 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0217 08:38:49.131120 7135 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1", Port: 22, Protocol: "TCP" } W0217 08:38:49.131241 7135 api.go:53] PageSize not implemented I0217 08:38:49.131271 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:49.131216 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.131322 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-ip.example.com" }] }] } I0217 08:38:49.131423 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0217 08:38:49.131531 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:49.131651 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.131793 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.131902 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0217 08:38:49.131947 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-1to2379-masters.private-shared-ip.example.com" }] }] } I0217 08:38:49.132060 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0217 08:38:49.132160 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0217 08:38:49.132277 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0217 08:38:49.132351 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-2382to4000-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.132450 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.132545 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.132642 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0217 08:38:49.132680 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0217 08:38:49.132717 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0217 08:38:49.132747 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0217 08:38:49.132849 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:49.132884 7135 tags.go:42] CreateTags { Resources: ["eipalloc-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "shared" }] } I0217 08:38:49.132954 7135 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0217 08:38:49.133015 7135 api.go:53] PageSize not implemented I0217 08:38:49.133052 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:49.133044 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:49.133072 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:49.133127 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0217 08:38:49.133169 7135 api.go:53] PageSize not implemented I0217 08:38:49.133226 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:49.133165 7135 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:49.133236 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:49.133361 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:49.133383 7135 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-12345678", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0217 08:38:49.133507 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0217 08:38:49.133566 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:49.133623 7135 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0217 08:38:49.137629 7135 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0217 08:38:49.137796 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:49.137892 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:49.137957 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:49.138085 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:49.138162 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:49.138350 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0217 08:38:49.138593 7135 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0217 08:38:49.138863 7135 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0217 08:38:49.139103 7135 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0217 08:38:49.139144 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:49.139174 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:49.139230 7135 dns.go:235] Pre-creating DNS records I0217 08:38:49.139250 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:49.144419 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:49.151436 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:49.151531 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:49.151577 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:50.397466 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:50.552446 7135 iamrole.go:89] ListRoles: { } I0217 08:38:50.553875 7135 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0217 08:38:50.554275 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.555140 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:50.555403 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.556090 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0217 08:38:50.556192 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0217 08:38:50.556237 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0217 08:38:50.556343 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:50.557160 7135 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0217 08:38:50.557310 7135 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0217 08:38:50.557284 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.557384 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0217 08:38:50.557352 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0217 08:38:50.557444 7135 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0217 08:38:50.557488 7135 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0217 08:38:50.557497 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0217 08:38:50.557565 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0217 08:38:50.557622 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0217 08:38:50.557674 7135 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0217 08:38:50.557807 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:50.557879 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.559275 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.559661 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:50.559737 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0217 08:38:50.559979 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0217 08:38:50.560262 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.560432 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:50.560501 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0217 08:38:50.560552 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:50.560699 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:50.561793 7135 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0217 08:38:50.562487 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:50.562583 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:50.562584 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:50.562663 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:50.562682 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0217 08:38:50.562690 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:50.562718 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0217 08:38:50.562744 7135 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0217 08:38:50.562775 7135 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0217 08:38:50.562803 7135 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } W0217 08:38:50.562870 7135 api.go:53] PageSize not implemented I0217 08:38:50.562888 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:50.562777 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:50.562937 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0217 08:38:50.563125 7135 api.go:53] PageSize not implemented I0217 08:38:50.563142 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:50.563200 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:50.563068 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:50.563229 7135 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0217 08:38:50.563330 7135 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0217 08:38:50.563943 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:50.564134 7135 executor.go:111] Tasks: 110 done / 132 total; 6 can run I0217 08:38:50.564207 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0217 08:38:50.564226 7135 api.go:53] PageSize not implemented I0217 08:38:50.564248 7135 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0217 08:38:50.564268 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0217 08:38:50.564289 7135 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0217 08:38:50.564280 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:50.564277 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:50.564389 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0217 08:38:50.564407 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:50.564508 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } W0217 08:38:50.564573 7135 api.go:53] PageSize not implemented I0217 08:38:50.564603 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:50.568903 7135 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0217 08:38:50.569004 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0217 08:38:50.569126 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:50.569251 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:50.569309 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:50.569430 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:50.569841 7135 executor.go:111] Tasks: 124 done / 132 total; 2 can run W0217 08:38:50.569916 7135 api.go:53] PageSize not implemented I0217 08:38:50.569931 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:50.570077 7135 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0217 08:38:50.570218 7135 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0217 08:38:50.572730 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:50.572781 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:50.572807 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:50.572831 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:50.572854 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:50.572879 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:50.572903 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:50.572930 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:50.572957 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0217 08:38:50.572987 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0217 08:38:50.573011 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:50.573032 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:50.573077 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:50.573104 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:50.573129 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0217 08:38:50.573152 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:50.573178 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:50.573201 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0217 08:38:50.573225 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0217 08:38:50.573249 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:50.573276 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:50.573299 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0217 08:38:50.573322 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:50.573344 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:50.573365 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:50.573392 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:50.573417 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:50.574608 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:50.574659 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:50.574675 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:50.574708 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.574751 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0217 08:38:50.574802 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.574851 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.574884 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.574916 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.574948 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.574980 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0217 08:38:50.575021 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.575061 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:50.575083 7135 natgateway.go:117] DescribeNatGateways: { } I0217 08:38:50.575115 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0217 08:38:50.575142 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } W0217 08:38:50.575178 7135 api.go:53] PageSize not implemented I0217 08:38:50.575190 7135 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0217 08:38:50.575219 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:50.575238 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:50.575249 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0217 08:38:50.575276 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:50.575292 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:50.575305 7135 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" ] } I0217 08:38:50.575348 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:50.575378 7135 iamrole.go:89] ListRoles: { } I0217 08:38:50.575414 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:50.575435 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:50.575470 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:50.575505 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:50.575530 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0217 08:38:50.575557 7135 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0217 08:38:50.575581 7135 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0217 08:38:50.576048 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0217 08:38:50.576098 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } iam-instance-profile:bastions.private-shared-ip.example.com ok I0217 08:38:50.576078 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:50.576138 7135 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } load-balancer:api-private-shared-ip-exa-ohatqj ok autoscaling-group:master-us-test-1a.masters.private-shared-ip.example.com ok I0217 08:38:50.576144 7135 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } autoscaling-group:bastion.private-shared-ip.example.com ok I0217 08:38:50.576197 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1 ok I0217 08:38:50.576233 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } iam-instance-profile:nodes.private-shared-ip.example.com ok I0217 08:38:50.576229 7135 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4 ok autoscaling-group:nodes.private-shared-ip.example.com ok I0217 08:38:50.576140 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0217 08:38:50.576346 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:50.576323 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0217 08:38:50.576366 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:50.576378 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } iam-instance-profile:masters.private-shared-ip.example.com ok I0217 08:38:50.576398 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0217 08:38:50.576288 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.private-shared-ip.example.com. ok I0217 08:38:50.576486 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } W0217 08:38:50.576603 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:50.576624 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok autoscaling-config:lt-3 ok I0217 08:38:50.576674 7135 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok autoscaling-config:lt-2 ok I0217 08:38:50.576756 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok I0217 08:38:50.576838 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0217 08:38:50.576924 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 } ] } W0217 08:38:50.577063 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:50.577090 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0217 08:38:50.577121 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0217 08:38:50.577199 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0217 08:38:50.577329 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0217 08:38:50.577339 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-ip.example.com" } I0217 08:38:50.577384 7135 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0217 08:38:50.577378 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0217 08:38:50.577399 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-ip.example.com" } I0217 08:38:50.577436 7135 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0217 08:38:50.577430 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:50.577448 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0217 08:38:50.577487 7135 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-ip.example.com" } iam-role:bastions.private-shared-ip.example.com ok I0217 08:38:50.577514 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0217 08:38:50.577469 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0217 08:38:50.577542 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-ip.example.com" } iam-role:masters.private-shared-ip.example.com ok W0217 08:38:50.577552 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:50.577570 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-ip.example.com" } I0217 08:38:50.577586 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0217 08:38:50.577604 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0217 08:38:50.577616 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0217 08:38:50.577639 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-ip.example.com" } iam-role:nodes.private-shared-ip.example.com ok I0217 08:38:50.577701 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0217 08:38:50.577752 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok --- PASS: TestLifecyclePrivateSharedIP (2.87s) === RUN TestLifecycleManyAddons I0217 08:38:50.578242 7135 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:38:50.578471 7135 internetgateways.go:66] CreateInternetGateway: { } I0217 08:38:50.578508 7135 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:38:50.578544 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:38:50.578595 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:38:50.578636 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:38:50.578667 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:38:50.578689 7135 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:38:50.578719 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:38:50.578739 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0217 08:38:50.601117 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:50.604142 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:50.604212 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:51.832884 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:52.499614 7135 iamrole.go:89] ListRoles: { } I0217 08:38:52.500998 7135 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0217 08:38:52.501580 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0217 08:38:52.501690 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal.example.com" }] } I0217 08:38:52.501969 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:52.502378 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:52.502471 7135 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0217 08:38:52.502577 7135 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal.example.com" }] } I0217 08:38:52.502640 7135 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.502740 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:52.502906 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:52.503029 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:52.503081 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0217 08:38:52.503112 7135 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0217 08:38:52.503132 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:52.503166 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:52.503196 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:52.503327 7135 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0217 08:38:52.503427 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:52.503465 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:52.503665 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:52.503914 7135 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.504037 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:52.504077 7135 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.507553 7135 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0217 08:38:52.507724 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:52.507811 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0217 08:38:52.507870 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0217 08:38:52.507841 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:52.507980 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0217 08:38:52.508066 7135 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0217 08:38:52.508103 7135 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0217 08:38:52.508123 7135 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0217 08:38:52.508132 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0217 08:38:52.508282 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeTags\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0217 08:38:52.508312 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0217 08:38:52.508385 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:52.508424 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:52.508470 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:52.508632 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:52.508769 7135 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0217 08:38:52.508817 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:52.508967 7135 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.508962 7135 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" } ] }], VpcId: "vpc-1" } I0217 08:38:52.509037 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:52.509084 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:52.509115 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0217 08:38:52.509200 7135 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0217 08:38:52.509232 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:52.509265 7135 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] } I0217 08:38:52.509328 7135 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal.example.com" }] }], VpcId: "vpc-1" } I0217 08:38:52.509391 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:52.509432 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:52.509472 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:52.509742 7135 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"acm:DescribeCertificate\",\n \"acm:ListCertificates\",\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"cognito-idp:DescribeUserPoolClient\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:CreateSnapshot\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcPeeringConnections\",\n \"ec2:DescribeVpcs\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"elasticloadbalancing:DescribeListenerCertificates\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeRules\",\n \"elasticloadbalancing:DescribeTags\",\n \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteSnapshot\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddListenerCertificates\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteRule\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyRule\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:RemoveListenerCertificates\",\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:SetIpAddressType\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\",\n \"elasticloadbalancing:SetSecurityGroups\",\n \"elasticloadbalancing:SetSubnets\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateRule\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0217 08:38:52.512053 7135 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0217 08:38:52.512167 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:52.512294 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:52.512455 7135 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:38:52.512565 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" }] }] } I0217 08:38:52.512719 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" }] }] } I0217 08:38:52.512831 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.512993 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.513170 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:52.513254 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:52.513332 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0217 08:38:52.513399 7135 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0217 08:38:52.513520 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.513667 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" }] }] } I0217 08:38:52.513799 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:52.513868 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.514002 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" }] }] } I0217 08:38:52.514117 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.514265 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.514375 7135 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.514482 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:52.514567 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:52.514631 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0217 08:38:52.514762 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.514864 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" }] }] } I0217 08:38:52.514972 7135 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0217 08:38:52.515012 7135 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0217 08:38:52.515172 7135 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0217 08:38:52.515406 7135 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0217 08:38:52.515616 7135 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0217 08:38:52.515668 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:52.515699 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:52.515758 7135 dns.go:235] Pre-creating DNS records I0217 08:38:52.515785 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:52.520686 7135 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0217 08:38:52.523475 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:52.523540 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:53.743008 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:54.387508 7135 iamrole.go:89] ListRoles: { } I0217 08:38:54.389032 7135 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0217 08:38:54.390775 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.391248 7135 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0217 08:38:54.391680 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.392416 7135 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0217 08:38:54.392528 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.392674 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:38:54.392713 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.392837 7135 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:38:54.392875 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:54.395161 7135 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0217 08:38:54.395296 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.395471 7135 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0217 08:38:54.395525 7135 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0217 08:38:54.395498 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:54.395614 7135 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:38:54.395720 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0217 08:38:54.395948 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:54.396030 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.396184 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0217 08:38:54.396368 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:54.396456 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.396628 7135 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:38:54.400036 7135 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0217 08:38:54.400158 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:54.400337 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:54.400617 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:54.400752 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:54.400828 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:54.400999 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:54.401071 7135 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0217 08:38:54.401660 7135 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0217 08:38:54.401861 7135 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0217 08:38:54.402093 7135 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0217 08:38:54.404615 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0217 08:38:54.404670 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0217 08:38:54.404702 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0217 08:38:54.404727 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0217 08:38:54.404748 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0217 08:38:54.404776 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0217 08:38:54.404800 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0217 08:38:54.404823 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0217 08:38:54.404848 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0217 08:38:54.404878 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0217 08:38:54.404905 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0217 08:38:54.404927 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0217 08:38:54.404947 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0217 08:38:54.404970 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0217 08:38:54.404992 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:38:54.405013 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0217 08:38:54.405037 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:38:54.405078 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0217 08:38:54.405101 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0217 08:38:54.405123 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0217 08:38:54.405144 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0217 08:38:54.405171 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0217 08:38:54.405198 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:38:54.405225 7135 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0217 08:38:54.406617 7135 delete_cluster.go:128] Looking for cloud resources to delete W0217 08:38:54.406671 7135 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0217 08:38:54.406688 7135 keypairs.go:95] DescribeKeyPairs: { } I0217 08:38:54.406722 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.406764 7135 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0217 08:38:54.406809 7135 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.406858 7135 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.406898 7135 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.406943 7135 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.406978 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.407010 7135 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0217 08:38:54.407047 7135 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.407103 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0217 08:38:54.407134 7135 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0217 08:38:54.407172 7135 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0217 08:38:54.407201 7135 api.go:53] PageSize not implemented I0217 08:38:54.407219 7135 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0217 08:38:54.407240 7135 loadbalancers.go:35] PageSize not implemented I0217 08:38:54.407272 7135 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0217 08:38:54.407295 7135 targetgroups.go:35] PageSize not implemented I0217 08:38:54.407312 7135 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0217 08:38:54.407353 7135 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0217 08:38:54.407388 7135 iamrole.go:89] ListRoles: { } I0217 08:38:54.407825 7135 zones.go:93] ListHostedZonesPages { } I0217 08:38:54.407850 7135 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0217 08:38:54.407887 7135 internetgateways.go:101] DescribeInternetGateways: { } I0217 08:38:54.407925 7135 routetable.go:53] DescribeRouteTables: { } I0217 08:38:54.407953 7135 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0217 08:38:54.408321 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-1 ok I0217 08:38:54.408391 7135 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } I0217 08:38:54.408414 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } autoscaling-group:master-us-test-1a.masters.minimal.example.com ok keypair:key-1 ok I0217 08:38:54.408457 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0217 08:38:54.408465 7135 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } autoscaling-group:nodes.minimal.example.com ok I0217 08:38:54.408494 7135 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } volume:vol-2 ok I0217 08:38:54.408532 7135 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0217 08:38:54.408515 7135 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } iam-instance-profile:masters.minimal.example.com ok I0217 08:38:54.408566 7135 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0217 08:38:54.408440 7135 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.minimal.example.com. ok I0217 08:38:54.408591 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0217 08:38:54.408631 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0217 08:38:54.408764 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:54.408788 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0217 08:38:54.408833 7135 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0217 08:38:54.408870 7135 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0217 08:38:54.408958 7135 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0217 08:38:54.408968 7135 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0217 08:38:54.409039 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0217 08:38:54.409050 7135 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0217 08:38:54.409076 7135 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0217 08:38:54.409109 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0217 08:38:54.409141 7135 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0217 08:38:54.409165 7135 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0217 08:38:54.409200 7135 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0217 08:38:54.409213 7135 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0217 08:38:54.409241 7135 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0217 08:38:54.409293 7135 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0217 08:38:54.409355 7135 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0217 08:38:54.409413 7135 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleManyAddons (3.83s) === RUN TestGetFilters --- PASS: TestGetFilters (0.00s) === RUN TestGetInstanceSelectorOpts --- PASS: TestGetInstanceSelectorOpts (0.00s) === RUN TestValidateAllPrivateOrPublicSubnets --- PASS: TestValidateAllPrivateOrPublicSubnets (0.00s) === RUN TestValidateUserSubnetsWithClusterSubnets --- PASS: TestValidateUserSubnetsWithClusterSubnets (0.00s) === RUN TestCreateInstanceGroup --- PASS: TestCreateInstanceGroup (0.00s) === RUN TestDecorateWithInstanceGroupSpecs --- PASS: TestDecorateWithInstanceGroupSpecs (0.00s) === RUN TestDecorateWithMixedInstancesPolicy --- PASS: TestDecorateWithMixedInstancesPolicy (0.00s) === RUN TestDecorateWithClusterAutoscalerLabels --- PASS: TestDecorateWithClusterAutoscalerLabels (0.00s) === RUN TestNewTemplateContext --- PASS: TestNewTemplateContext (0.00s) PASS ok k8s.io/kops/cmd/kops 196.270s === RUN TestBuildProxyRequest === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/livez === RUN TestBuildProxyRequest/http://127.0.0.1:3990/healthz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ready === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz? === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude --- PASS: TestBuildProxyRequest (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/livez (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/healthz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ready (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz? (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude (0.00s) PASS ok k8s.io/kops/cmd/kube-apiserver-healthcheck 0.003s === RUN TestAliasForNodesInRole --- PASS: TestAliasForNodesInRole (0.00s) === RUN TestEnsureDotSuffix --- PASS: TestEnsureDotSuffix (0.00s) === RUN TestParseZoneSpec --- PASS: TestParseZoneSpec (0.00s) === RUN TestParseZoneRules I0217 08:35:38.163279 7137 zonespec.go:75] No rules specified, will permit management of all zones --- PASS: TestParseZoneRules (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/dns 0.003s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/util 0.003s === RUN TestPodController I0217 08:35:38.180061 7139 pod.go:59] starting pod controller I0217 08:35:38.180256 7139 stoppable.go:62] shutting down controller --- PASS: TestPodController (0.00s) PASS I0217 08:35:38.180340 7139 pod.go:107] Got stop signal I0217 08:35:38.180360 7139 pod.go:65] shutting down pod controller ok k8s.io/kops/dns-controller/pkg/watchers 0.022s === RUN TestEquivalent --- PASS: TestEquivalent (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider 0.003s Parsing flags. Getting new test interface. Running tests... === RUN TestZonesList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035610} route53_test.go:93: Got zone list: [0xc000035640] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b8148} --- PASS: TestZonesList (0.00s) === RUN TestZonesID route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035770} route53_test.go:93: Got zone list: [0xc0000357a0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b8160} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess route53_test.go:79: Got zones {0xc0000358a0} route53_test.go:170: Successfully added managed DNS zone: &{0xc0003e55c0 0xc0000b8180} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035a50} route53_test.go:93: Got zone list: [0xc000035a80] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b81a0} route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035be0} route53_test.go:93: Got zone list: [0xc000035c10] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b81c8} route53_test.go:187: Successfully added resource record set: {0xc0003e1ef0 0xc0000b81e8} --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035ef0} route53_test.go:93: Got zone list: [0xc000035f20] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b8278} route53_test.go:199: Successfully added resource record set: {0xc00040a120 0xc0000b8298} route53_test.go:118: Got 1 recordsets: [0xc00040e140] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040e2d0} route53_test.go:93: Got zone list: [0xc00040e300] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b8338} route53_test.go:221: Successfully added resource record set: {0xc00040a2d0 0xc0000b8358} route53_test.go:228: Correctly failed to add duplicate resource record {0xc00040a2d0 0xc0000b8358}: attempt to create duplicate rrset www11.example.com::A --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040e6c0} route53_test.go:93: Got zone list: [0xc00040e6f0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b8418} route53_test.go:246: Successfully removed resource set {0xc00040a510 0xc0000b8438} after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040e9d0} route53_test.go:93: Got zone list: [0xc00040ea00] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b84c8} route53_test.go:264: Successfully removed resource set {0xc00040a6c0 0xc0000b84e8} after adding route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040ed10} route53_test.go:93: Got zone list: [0xc00040ed40] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b8580} commontests.go:192: Successfully added resource record set: {0xc00040a870 0xc0000b85a0} commontests.go:45: Correctly replaced resource record {0xc00040a870 0xc0000b85a0} -> {0xc00040a990 0xc0000b85f0} commontests.go:142: Got 1 recordsets: [0xc00040f050] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040f280} route53_test.go:93: Got zone list: [0xc00040f2b0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b86a8} commontests.go:192: Successfully added resource record set: {0xc00040ac60 0xc0000b86c8} commontests.go:70: Correctly replaced resource record {0xc00040ac60 0xc0000b86c8} -> {0xc00040ad80 0xc0000b8718} commontests.go:142: Got 1 recordsets: [0xc00040f5c0] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040f840} route53_test.go:93: Got zone list: [0xc00040f870] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b87e0} commontests.go:192: Successfully added resource record set: {0xc00040b050 0xc0000b8800} commontests.go:142: Got 2 recordsets: [0xc00040fae0 0xc00040fb00] commontests.go:142: Got 2 recordsets: [0xc00040fb70 0xc00040fb90] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00040fd90} route53_test.go:93: Got zone list: [0xc00040fdc0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e5380 0xc0000b8908} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53 0.009s === RUN TestZonesList --- PASS: TestZonesList (0.00s) === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestRemove --- PASS: TestRemove (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/do 0.006s === RUN TestZonesList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f52a0} clouddns_test.go:71: Got zone list: [0xc00080c720] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080c6f0} --- PASS: TestZonesList (0.00s) === RUN TestZonesID clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f53a0} clouddns_test.go:71: Got zone list: [0xc00080c7e0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080c7b0} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess clouddns_test.go:131: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f54c0} clouddns_test.go:133: Got zones, making new Zone clouddns_test.go:149: Successfully added managed DNS zone: &{0xc000547c00 0xc00080c8a0} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f5640} clouddns_test.go:71: Got zone list: [0xc00080c960] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080c930} clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f5760} clouddns_test.go:71: Got zone list: [0xc00080ca98] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080ca68} clouddns_test.go:165: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f58a0} clouddns_test.go:71: Got zone list: [0xc00080cc00] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080cbd0} clouddns_test.go:176: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:96: Got 1 recordsets: [<(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f5a00} clouddns_test.go:71: Got zone list: [0xc00080ce10] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080cde0} clouddns_test.go:198: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:205: Correctly failed to add duplicate resource record <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>: attempt to insert duplicate rrset {www11.example.com [10.10.10.10 169.20.20.20] 180 A} --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f5b60} clouddns_test.go:71: Got zone list: [0xc00080cfa8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080cf78} clouddns_test.go:223: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f5ca0} clouddns_test.go:71: Got zone list: [0xc00080d110] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080d0e0} clouddns_test.go:241: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f5e00} clouddns_test.go:71: Got zone list: [0xc00080d2d8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080d2a8} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:45: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc0000f5f60} clouddns_test.go:71: Got zone list: [0xc00080d5a8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080d578} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:70: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc00057e160} clouddns_test.go:71: Got zone list: [0xc00080d8d8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080d8a8} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0005435b8 0xc00057e340} clouddns_test.go:71: Got zone list: [0xc00080dcb0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000547a80 0xc00080dc80} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns 0.041s === RUN TestContract --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/openstack/designate 0.019s === RUN TestZonesListValid --- PASS: TestZonesListValid (0.00s) === RUN TestZonesListShouldFail --- PASS: TestZonesListShouldFail (0.00s) === RUN TestAddValid --- PASS: TestAddValid (0.00s) === RUN TestAddShouldFail --- PASS: TestAddShouldFail (0.00s) === RUN TestRemoveValid --- PASS: TestRemoveValid (0.00s) === RUN TestRemoveShouldFail --- PASS: TestRemoveShouldFail (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/scaleway 0.004s === RUN TestBootstarapBuilder_Simple --- PASS: TestBootstarapBuilder_Simple (0.00s) PASS ok k8s.io/kops/nodeup/pkg/bootstrap 0.049s === RUN TestBuildAzure --- PASS: TestBuildAzure (0.00s) === RUN TestBuildAWSCustomNodeIPFamilies --- PASS: TestBuildAWSCustomNodeIPFamilies (0.00s) === RUN TestContainerdBuilder_Docker_19_03_13 I0217 08:35:42.482581 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.482827 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.482863 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.482893 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.482925 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.482982 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.483016 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.483032 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.483063 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.483088 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.491543 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_13 (0.01s) === RUN TestContainerdBuilder_Docker_19_03_14 I0217 08:35:42.495212 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.495356 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.495378 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.495405 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.495425 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.495452 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.495474 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.495493 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.495517 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.495533 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.496437 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_14 (0.00s) === RUN TestContainerdBuilder_Simple I0217 08:35:42.499702 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.499815 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.499843 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.499865 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.499885 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.499910 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.499932 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.499948 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.499969 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.499983 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.500854 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:42.502331 7995 assetstore.go:108] Matching assets for "^bin/(containerd|ctr)": I0217 08:35:42.502345 7995 assetstore.go:111] bin/containerd I0217 08:35:42.502351 7995 assetstore.go:111] bin/containerd-shim I0217 08:35:42.502356 7995 assetstore.go:111] bin/containerd-shim-runc-v1 I0217 08:35:42.502361 7995 assetstore.go:111] bin/containerd-shim-runc-v2 I0217 08:35:42.502365 7995 assetstore.go:111] bin/containerd-stress I0217 08:35:42.502370 7995 assetstore.go:111] bin/ctr I0217 08:35:42.502411 7995 assetstore.go:108] Matching assets for "/runc\\.(amd64|arm64)$": I0217 08:35:42.502422 7995 assetstore.go:111] https://github.com/opencontainers/runc/releases/download/v1.1.0/runc.amd64 --- PASS: TestContainerdBuilder_Simple (0.01s) === RUN TestContainerdBuilder_Flatcar I0217 08:35:42.506749 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.506913 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.506941 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.506971 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.507001 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.507031 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.507059 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.507075 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.507099 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.507118 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.508249 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:42.509770 7995 containerd.go:60] Detected Flatcar; won't install containerd --- PASS: TestContainerdBuilder_Flatcar (0.00s) === RUN TestContainerdBuilder_SkipInstall I0217 08:35:42.510737 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.510886 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.510918 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.510939 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.510961 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.510991 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.511012 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.511029 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.511050 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.511064 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.511944 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:42.513514 7995 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestContainerdBuilder_SkipInstall (0.00s) === RUN TestContainerdBuilder_BuildFlags --- PASS: TestContainerdBuilder_BuildFlags (0.00s) === RUN TestContainerdConfig --- PASS: TestContainerdConfig (0.00s) === RUN TestAppendGPURuntimeContainerdConfig --- PASS: TestAppendGPURuntimeContainerdConfig (0.00s) === RUN TestDockerBuilder_19_03_11 I0217 08:35:42.514142 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.514237 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.514265 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.514282 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.514352 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.514369 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.514384 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.514397 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.514415 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.514424 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.515062 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:42.516019 7995 assetstore.go:108] Matching assets for "^docker/": I0217 08:35:42.516029 7995 assetstore.go:111] docker/containerd I0217 08:35:42.516033 7995 assetstore.go:111] docker/containerd-shim I0217 08:35:42.516036 7995 assetstore.go:111] docker/ctr I0217 08:35:42.516039 7995 assetstore.go:111] docker/docker I0217 08:35:42.516042 7995 assetstore.go:111] docker/docker-init I0217 08:35:42.516045 7995 assetstore.go:111] docker/docker-proxy I0217 08:35:42.516047 7995 assetstore.go:111] docker/dockerd I0217 08:35:42.516050 7995 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_19_03_11 (0.00s) === RUN TestDockerBuilder_LogFlags I0217 08:35:42.517607 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.517688 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.517704 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.517718 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.517731 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.517747 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.517761 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.517772 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.517784 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.517793 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.518294 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:42.519202 7995 assetstore.go:108] Matching assets for "^docker/": I0217 08:35:42.519212 7995 assetstore.go:111] docker/containerd I0217 08:35:42.519215 7995 assetstore.go:111] docker/containerd-shim I0217 08:35:42.519226 7995 assetstore.go:111] docker/ctr I0217 08:35:42.519229 7995 assetstore.go:111] docker/docker I0217 08:35:42.519231 7995 assetstore.go:111] docker/docker-init I0217 08:35:42.519234 7995 assetstore.go:111] docker/docker-proxy I0217 08:35:42.519237 7995 assetstore.go:111] docker/dockerd I0217 08:35:42.519240 7995 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_LogFlags (0.00s) === RUN TestDockerBuilder_SkipInstall I0217 08:35:42.520889 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.520983 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.520997 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.521012 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.521036 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.521055 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.521069 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.521081 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.521107 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.521127 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.521748 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:42.522768 7995 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestDockerBuilder_SkipInstall (0.00s) === RUN TestDockerBuilder_HealthCheck I0217 08:35:42.522881 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.522974 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.522988 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.523013 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.523026 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.523042 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.523066 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.523080 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.523105 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.523116 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.523771 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:42.524848 7995 assetstore.go:108] Matching assets for "^docker/": I0217 08:35:42.524859 7995 assetstore.go:111] docker/docker I0217 08:35:42.524871 7995 assetstore.go:111] docker/docker-containerd I0217 08:35:42.524875 7995 assetstore.go:111] docker/docker-containerd-ctr I0217 08:35:42.524877 7995 assetstore.go:111] docker/docker-containerd-shim I0217 08:35:42.524880 7995 assetstore.go:111] docker/docker-init I0217 08:35:42.524882 7995 assetstore.go:111] docker/docker-proxy I0217 08:35:42.524885 7995 assetstore.go:111] docker/docker-runc I0217 08:35:42.524887 7995 assetstore.go:111] docker/dockerd --- PASS: TestDockerBuilder_HealthCheck (0.00s) === RUN TestDockerBuilder_BuildFlags --- PASS: TestDockerBuilder_BuildFlags (0.00s) === RUN TestContainerdHooksBuilder I0217 08:35:42.527327 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.527432 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.527447 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.527460 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.527708 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.527725 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.527739 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.527749 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.527763 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.527771 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.529130 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdHooksBuilder (0.00s) === RUN TestDockerHooksBuilder I0217 08:35:42.530437 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.530529 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.530543 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.530557 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.530569 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.530585 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.530597 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.530618 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.530649 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.530658 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.534363 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestDockerHooksBuilder (0.01s) === RUN TestKopsControllerBuilder I0217 08:35:42.536586 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.536730 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.536751 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.536776 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.536795 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.536822 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.536855 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.536871 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.536891 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.536906 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.538294 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKopsControllerBuilder (0.00s) === RUN Test_KubeAPIServer_BuildFlags --- PASS: Test_KubeAPIServer_BuildFlags (0.00s) === RUN TestKubeAPIServerBuilder I0217 08:35:42.543553 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.543665 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.543683 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.543703 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.543722 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.543746 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.543765 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.543783 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.543803 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.543829 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.545249 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilder (0.01s) === RUN TestAuditConfigAPIServerBuilder I0217 08:35:42.553351 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.553455 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.553473 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.553496 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.553516 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.553539 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.553559 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.553575 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.553593 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.553618 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.555439 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestAuditConfigAPIServerBuilder (0.01s) === RUN TestOIDCConfigAPIServerBuilder I0217 08:35:42.562479 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.562578 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.562593 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.562620 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.562637 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.562659 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.562678 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.562691 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.562708 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.562724 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.564106 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestOIDCConfigAPIServerBuilder (0.01s) === RUN TestDeddicatedAPIServerBuilder I0217 08:35:42.567748 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.567831 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.567843 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.567858 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.567870 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.567884 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.567896 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.567905 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.567917 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.567924 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.568745 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestDeddicatedAPIServerBuilder (0.01s) === RUN TestWithoutEtcdEventsAPIServerBuilder I0217 08:35:42.573415 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.573513 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.573530 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.573548 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.573561 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.573584 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.573600 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.573610 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.573624 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.573634 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.574625 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestWithoutEtcdEventsAPIServerBuilder (0.00s) === RUN TestAwsIamAuthenticator I0217 08:35:42.578322 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.578400 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.578413 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.578427 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.578440 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.578456 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.578469 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.578479 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.578492 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.578501 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.579429 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestAwsIamAuthenticator (0.01s) === RUN TestKubeAPIServerBuilderAMD64 I0217 08:35:42.584962 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:42.585046 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:42.585059 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:42.585073 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:42.585085 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:42.585101 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:42.585114 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:42.585124 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:42.585136 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:42.585144 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:42.586033 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderAMD64 (1.59s) === RUN TestKubeAPIServerBuilderARM64 I0217 08:35:44.176208 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:44.176328 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:44.176349 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:44.176373 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:44.176390 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:44.176412 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:44.176430 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:44.176441 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:44.176459 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:44.176473 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:44.177648 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderARM64 (1.13s) === RUN TestKubeControllerManagerBuilder I0217 08:35:45.307403 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:45.307570 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:45.307599 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:45.307633 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:45.307657 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:45.307688 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:45.307715 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:45.307732 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:45.307756 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:45.307773 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:45.309570 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilder (0.01s) === RUN TestKubeControllerManagerBuilderAMD64 I0217 08:35:45.315794 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:45.315993 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:45.316024 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:45.316054 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:45.316078 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:45.316112 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:45.316139 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:45.316155 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:45.316178 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:45.316194 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:45.317999 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderAMD64 (1.13s) === RUN TestKubeControllerManagerBuilderARM64 I0217 08:35:46.446309 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:46.446445 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:46.446466 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:46.446490 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:46.446507 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:46.446532 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:46.446555 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:46.446567 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:46.446584 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:46.446597 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:46.447829 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderARM64 (1.14s) === RUN TestKubeProxyBuilder_buildPod === RUN TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 --- PASS: TestKubeProxyBuilder_buildPod (0.00s) --- PASS: TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 (0.00s) === RUN TestKubeProxyBuilder I0217 08:35:47.582487 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:47.582608 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:47.582627 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:47.582649 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:47.582665 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:47.582687 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:47.582705 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:47.582714 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:47.582730 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:47.582743 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:47.583744 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilder (0.00s) === RUN TestKubeProxyBuilderAMD64 I0217 08:35:47.585867 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:47.585947 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:47.585960 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:47.585973 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:47.585987 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:47.586002 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:47.586015 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:47.586024 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:47.586037 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:47.586047 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:47.586941 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderAMD64 (1.14s) === RUN TestKubeProxyBuilderARM64 I0217 08:35:48.721711 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:48.721941 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:48.721978 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:48.722021 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:48.722052 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:48.722095 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:48.722130 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:48.722153 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:48.722186 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:48.722211 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:48.724465 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderARM64 (1.13s) === RUN TestParseDefault --- PASS: TestParseDefault (0.00s) === RUN TestParse --- PASS: TestParse (0.00s) === RUN TestKubeSchedulerBuilder I0217 08:35:49.857570 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:49.857798 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:49.857832 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:49.857870 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:49.857899 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:49.857938 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:49.857970 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:49.857992 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:49.858021 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:49.858044 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:49.860133 7995 zones.go:93] ListHostedZonesPages { } W0217 08:35:49.863432 7995 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilder (0.01s) === RUN TestKubeSchedulerBuilderAMD64 I0217 08:35:49.865669 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:49.865843 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:49.865871 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:49.865900 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:49.865927 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:49.865975 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:49.866001 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:49.866025 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:49.866054 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:49.866073 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:49.868131 7995 zones.go:93] ListHostedZonesPages { } W0217 08:35:50.997796 7995 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderAMD64 (1.13s) === RUN TestKubeSchedulerBuilderARM64 I0217 08:35:51.000160 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:51.000376 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:51.000413 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:51.000459 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:51.000490 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:51.000529 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:51.000565 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:51.000594 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:51.000647 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:51.000669 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:51.002851 7995 zones.go:93] ListHostedZonesPages { } W0217 08:35:52.127993 7995 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderARM64 (1.13s) === RUN TestKubectlBuilder I0217 08:35:52.130307 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:52.130497 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:52.130532 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:52.130569 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:52.130600 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:52.130662 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:52.130695 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:52.130718 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:52.130748 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:52.130772 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:52.132887 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:52.135241 7995 assetstore.go:159] Resolved asset kubectl: to /path/to/kubectl/asset --- PASS: TestKubectlBuilder (0.01s) === RUN TestTaintsApplied --- PASS: TestTaintsApplied (0.00s) === RUN Test_RunKubeletBuilder I0217 08:35:52.137808 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:52.137986 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:52.138015 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:52.138043 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:52.138070 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:52.138107 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:52.138133 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:52.138157 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:52.138184 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:52.138202 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:52.139830 7995 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilder (0.01s) === RUN Test_RunKubeletBuilderWarmPool I0217 08:35:52.146516 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:52.146717 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:52.146749 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:52.146789 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:52.146818 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:52.146855 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:52.146885 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:52.146907 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:52.146936 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:52.146957 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:52.148637 7995 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilderWarmPool (0.01s) === RUN Test_BuildComponentConfigFile --- PASS: Test_BuildComponentConfigFile (0.00s) === RUN TestProtokubeBuilder I0217 08:35:52.153568 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:52.153746 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:52.153776 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:52.153808 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:52.153836 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:52.153869 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:52.153897 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:52.153919 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:52.153966 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:52.153986 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:52.156056 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:52.158368 7995 assetstore.go:108] Matching assets for "protokube$": I0217 08:35:52.158395 7995 assetstore.go:111] /opt/kops/bin/protokube I0217 08:35:52.158407 7995 assetstore.go:129] Found single matching asset for expr "protokube$": "protokube" I0217 08:35:52.158432 7995 assetstore.go:108] Matching assets for "channels$": I0217 08:35:52.158442 7995 assetstore.go:111] /opt/kops/bin/channels I0217 08:35:52.158451 7995 assetstore.go:129] Found single matching asset for expr "channels$": "channels" --- PASS: TestProtokubeBuilder (0.01s) === RUN TestSecretBuilder I0217 08:35:52.160194 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:52.160361 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:52.160394 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:52.160443 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:52.160473 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:52.160507 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:52.160534 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:52.160556 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:52.160584 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:52.160619 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:52.162608 7995 zones.go:93] ListHostedZonesPages { } --- PASS: TestSecretBuilder (0.01s) === RUN TestUpdateServiceBuilderAutomaticUpgrade I0217 08:35:52.165644 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:52.165812 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:52.165840 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:52.165872 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:52.165901 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:52.165935 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:52.165962 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:52.165985 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:52.166012 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:52.166030 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:52.168001 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:52.170228 7995 update_service.go:91] Detected OS {deb ubuntu focal 20.04}; installing unattended-upgrades package --- PASS: TestUpdateServiceBuilderAutomaticUpgrade (0.01s) === RUN TestUpdateServiceBuilderExternal I0217 08:35:52.170720 7995 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:52.170901 7995 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:52.170933 7995 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:52.170962 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:52.170990 7995 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:52.171024 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:52.171052 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:52.171075 7995 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:52.171102 7995 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:52.171120 7995 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:52.173069 7995 zones.go:93] ListHostedZonesPages { } I0217 08:35:52.175338 7995 update_service.go:86] UpdatePolicy requests automatic updates; skipping installation of package "unattended-upgrades" --- PASS: TestUpdateServiceBuilderExternal (0.00s) PASS ok k8s.io/kops/nodeup/pkg/model 9.752s === RUN TestWarmPoolSpec_IsEnabled === RUN TestWarmPoolSpec_IsEnabled/nil === RUN TestWarmPoolSpec_IsEnabled/empty === RUN TestWarmPoolSpec_IsEnabled/1 === RUN TestWarmPoolSpec_IsEnabled/0 --- PASS: TestWarmPoolSpec_IsEnabled (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/nil (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/empty (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/1 (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/0 (0.00s) === RUN TestWarmPoolSpec_ResolveDefaults === RUN TestWarmPoolSpec_ResolveDefaults/MinSize === RUN TestWarmPoolSpec_ResolveDefaults/MaxSize === RUN TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook --- PASS: TestWarmPoolSpec_ResolveDefaults (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MinSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MaxSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook (0.00s) === RUN Test_ParseInstanceGroupRole --- PASS: Test_ParseInstanceGroupRole (0.00s) === RUN TestParseConfigYAML === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{}" --- PASS: TestParseConfigYAML (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{}" (0.00s) === RUN Test_SemverOrdering --- PASS: Test_SemverOrdering (0.00s) PASS ok k8s.io/kops/pkg/apis/kops 0.025s === RUN TestRoundTripTypes --- PASS: TestRoundTripTypes (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/install 0.024s === RUN TestUseCiliumEtcd --- PASS: TestUseCiliumEtcd (0.00s) === RUN Test_FindSubnet --- PASS: Test_FindSubnet (0.00s) === RUN Test_FindZonesForInstanceGroup --- PASS: Test_FindZonesForInstanceGroup (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/model 0.021s === RUN TestGetNodeRole === RUN TestGetNodeRole/RoleNone === RUN TestGetNodeRole/RoleNewerLabel === RUN TestGetNodeRole/RoleOlderLabel --- PASS: TestGetNodeRole (0.00s) --- PASS: TestGetNodeRole/RoleNone (0.00s) --- PASS: TestGetNodeRole/RoleNewerLabel (0.00s) --- PASS: TestGetNodeRole/RoleOlderLabel (0.00s) === RUN Test_ParseKubernetesVersion === RUN Test_ParseKubernetesVersion/1.3.7 === RUN Test_ParseKubernetesVersion/v1.4.0-beta.8 === RUN Test_ParseKubernetesVersion/1.5.0 === RUN Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ === RUN Test_ParseKubernetesVersion/#00 E0217 08:35:42.440340 7999 versions.go:96] unable to parse Kubernetes version "" === RUN Test_ParseKubernetesVersion/abc E0217 08:35:42.440460 7999 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: Test_ParseKubernetesVersion (0.00s) --- PASS: Test_ParseKubernetesVersion/1.3.7 (0.00s) --- PASS: Test_ParseKubernetesVersion/v1.4.0-beta.8 (0.00s) --- PASS: Test_ParseKubernetesVersion/1.5.0 (0.00s) --- PASS: Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ (0.00s) --- PASS: Test_ParseKubernetesVersion/#00 (0.00s) --- PASS: Test_ParseKubernetesVersion/abc (0.00s) === RUN Test_IsKubernetesGTEWithPatch --- PASS: Test_IsKubernetesGTEWithPatch (0.00s) === RUN Test_IsKubernetesGTEWithoutPatch --- PASS: Test_IsKubernetesGTEWithoutPatch (0.00s) === RUN Test_IsKubernetesGTEWithPre --- PASS: Test_IsKubernetesGTEWithPre (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/util 0.009s === RUN TestAWSValidateExternalCloudConfig --- PASS: TestAWSValidateExternalCloudConfig (0.00s) === RUN TestValidateInstanceGroupSpec I0217 08:35:42.760987 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761073 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761101 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761123 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761140 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestValidateInstanceGroupSpec (0.00s) === RUN TestMixedInstancePolicies I0217 08:35:42.761298 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761325 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761353 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761378 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761404 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761422 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761443 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761468 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761488 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761507 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761525 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761546 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761563 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761579 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761595 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761621 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761651 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761667 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0217 08:35:42.761683 8137 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestMixedInstancePolicies (0.00s) === RUN TestInstanceMetadataOptions I0217 08:35:42.761808 8137 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } I0217 08:35:42.761891 8137 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } --- PASS: TestInstanceMetadataOptions (0.00s) === RUN TestLoadBalancerSubnets --- PASS: TestLoadBalancerSubnets (0.00s) === RUN TestAWSAuthentication --- PASS: TestAWSAuthentication (0.00s) === RUN TestAWSAdditionalRoutes === RUN TestAWSAdditionalRoutes/valid_pcx === RUN TestAWSAdditionalRoutes/valid_instance === RUN TestAWSAdditionalRoutes/valid_nat === RUN TestAWSAdditionalRoutes/valid_transit_gateway === RUN TestAWSAdditionalRoutes/valid_internet_gateway === RUN TestAWSAdditionalRoutes/valid_egress_only_internet_gateway === RUN TestAWSAdditionalRoutes/bad_cluster_cidr === RUN TestAWSAdditionalRoutes/bad_cidr === RUN TestAWSAdditionalRoutes/bad_target === RUN TestAWSAdditionalRoutes/target_more_specific === RUN TestAWSAdditionalRoutes/target_more_specific_additionalCIDR === RUN TestAWSAdditionalRoutes/duplicates_cidr === RUN TestAWSAdditionalRoutes/shared_subnet === RUN TestAWSAdditionalRoutes/not_a_private_subnet --- PASS: TestAWSAdditionalRoutes (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_pcx (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_instance (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_nat (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_transit_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_egress_only_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cluster_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_target (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific_additionalCIDR (0.00s) --- PASS: TestAWSAdditionalRoutes/duplicates_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/shared_subnet (0.00s) --- PASS: TestAWSAdditionalRoutes/not_a_private_subnet (0.00s) === RUN TestValidEtcdChanges --- PASS: TestValidEtcdChanges (0.00s) === RUN TestValidateInstanceProfile --- PASS: TestValidateInstanceProfile (0.00s) === RUN TestValidMasterInstanceGroup --- PASS: TestValidMasterInstanceGroup (0.00s) === RUN TestValidBootDevice --- PASS: TestValidBootDevice (0.00s) === RUN TestValidNodeLabels --- PASS: TestValidNodeLabels (0.00s) === RUN TestValidateIGCloudLabels --- PASS: TestValidateIGCloudLabels (0.00s) === RUN TestIGCloudLabelIsIGName --- PASS: TestIGCloudLabelIsIGName (0.00s) === RUN TestValidTaints --- PASS: TestValidTaints (0.00s) === RUN TestIGUpdatePolicy === RUN TestIGUpdatePolicy/missing === RUN TestIGUpdatePolicy/automatic === RUN TestIGUpdatePolicy/external === RUN TestIGUpdatePolicy/empty === RUN TestIGUpdatePolicy/unknown --- PASS: TestIGUpdatePolicy (0.00s) --- PASS: TestIGUpdatePolicy/missing (0.00s) --- PASS: TestIGUpdatePolicy/automatic (0.00s) --- PASS: TestIGUpdatePolicy/external (0.00s) --- PASS: TestIGUpdatePolicy/empty (0.00s) --- PASS: TestIGUpdatePolicy/unknown (0.00s) === RUN TestValidInstanceGroup --- PASS: TestValidInstanceGroup (0.00s) === RUN Test_Validate_DNS --- PASS: Test_Validate_DNS (0.00s) === RUN TestValidateCIDR --- PASS: TestValidateCIDR (0.00s) === RUN TestValidateSubnets --- PASS: TestValidateSubnets (0.00s) === RUN TestValidateKubeAPIServer --- PASS: TestValidateKubeAPIServer (0.00s) === RUN Test_Validate_DockerConfig_Storage --- PASS: Test_Validate_DockerConfig_Storage (0.00s) === RUN Test_Validate_Networking_Flannel --- PASS: Test_Validate_Networking_Flannel (0.00s) === RUN Test_Validate_AdditionalPolicies --- PASS: Test_Validate_AdditionalPolicies (0.00s) === RUN Test_Validate_Calico === RUN Test_Validate_Calico/empty_specs === RUN Test_Validate_Calico/positive_Typha_replica_count === RUN Test_Validate_Calico/negative_Typha_replica_count === RUN Test_Validate_Calico/with_etcd_version === RUN Test_Validate_Calico/IPv4_autodetection_method === RUN Test_Validate_Calico/IPv6_autodetection_method === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name === RUN Test_Validate_Calico/AWS_source/destination_checks_off === RUN Test_Validate_Calico/AWS_source/destination_checks_enabled === RUN Test_Validate_Calico/AWS_source/destination_checks_disabled === RUN Test_Validate_Calico/AWS_source/destination_checks_left_as_is === RUN Test_Validate_Calico/encapsulation_none_with_IPv4 === RUN Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 === RUN Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 === RUN Test_Validate_Calico/unknown_Calico_IPIP_mode === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPv6_without_encapsulation --- PASS: Test_Validate_Calico (0.00s) --- PASS: Test_Validate_Calico/empty_specs (0.00s) --- PASS: Test_Validate_Calico/positive_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/negative_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/with_etcd_version (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_off (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_enabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_disabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_left_as_is (0.00s) --- PASS: Test_Validate_Calico/encapsulation_none_with_IPv4 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/unknown_Calico_IPIP_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPv6_without_encapsulation (0.00s) === RUN Test_Validate_Cilium --- PASS: Test_Validate_Cilium (0.00s) === RUN Test_Validate_RollingUpdate --- PASS: Test_Validate_RollingUpdate (0.00s) === RUN Test_Validate_NodeLocalDNS --- PASS: Test_Validate_NodeLocalDNS (0.00s) === RUN Test_Validate_CloudConfiguration === RUN Test_Validate_CloudConfiguration/neither === RUN Test_Validate_CloudConfiguration/all_false === RUN Test_Validate_CloudConfiguration/all_true === RUN Test_Validate_CloudConfiguration/os_false === RUN Test_Validate_CloudConfiguration/os_true === RUN Test_Validate_CloudConfiguration/all_false,_os_false === RUN Test_Validate_CloudConfiguration/all_false,_os_true === RUN Test_Validate_CloudConfiguration/all_true,_os_false === RUN Test_Validate_CloudConfiguration/all_true,_os_true --- PASS: Test_Validate_CloudConfiguration (0.00s) --- PASS: Test_Validate_CloudConfiguration/neither (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_true (0.00s) === RUN TestValidateSAExternalPermissions === RUN TestValidateSAExternalPermissions/Duplicate_SA === RUN TestValidateSAExternalPermissions/Missing_permissions === RUN TestValidateSAExternalPermissions/Setting_both_arn_and_inline === RUN TestValidateSAExternalPermissions/Empty_SA_name === RUN TestValidateSAExternalPermissions/Empty_SA_namespace --- PASS: TestValidateSAExternalPermissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Duplicate_SA (0.00s) --- PASS: TestValidateSAExternalPermissions/Missing_permissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Setting_both_arn_and_inline (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_name (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_namespace (0.00s) === RUN Test_Validate_Nvidia_Cluster --- PASS: Test_Validate_Nvidia_Cluster (0.00s) === RUN Test_Validate_Nvidia_Ig --- PASS: Test_Validate_Nvidia_Ig (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/validation 0.067s === RUN TestManagedFieldsMigrator === RUN TestManagedFieldsMigrator/csa-migration === RUN TestManagedFieldsMigrator/merge-owners === RUN TestManagedFieldsMigrator/ssa-unchanged === RUN TestManagedFieldsMigrator/unknown-unchanged --- PASS: TestManagedFieldsMigrator (0.00s) --- PASS: TestManagedFieldsMigrator/csa-migration (0.00s) --- PASS: TestManagedFieldsMigrator/merge-owners (0.00s) --- PASS: TestManagedFieldsMigrator/ssa-unchanged (0.00s) --- PASS: TestManagedFieldsMigrator/unknown-unchanged (0.00s) PASS ok k8s.io/kops/pkg/applylib/applyset 0.008s === RUN TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub W0217 08:35:42.737523 8142 builder.go:232] failed to digest image "proxy.example.com/weaveworks/weave-kube": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub (0.01s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub W0217 08:35:42.738318 8142 builder.go:232] failed to digest image "proxy.example.com/debian": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL W0217 08:35:42.739092 8142 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL W0217 08:35:42.740458 8142 builder.go:232] failed to digest image "proxy.example.com/google_containers/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags W0217 08:35:42.741135 8142 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags (0.00s) === RUN TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges W0217 08:35:42.741696 8142 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host W0217 08:35:42.742339 8142 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges (0.00s) === RUN TestRemapEmptySection --- PASS: TestRemapEmptySection (0.00s) === RUN Test_BuildVFSPath E0217 08:35:42.742823 8142 copyfile.go:209] Unable to determine VFS path from supplied URL: https://foo/k8s-for-greeks-kops/kubernetes-release/release/v1.7.2/bin/linux/amd64/kubectl E0217 08:35:42.742830 8142 copyfile.go:210] S3, Google Cloud Storage, and File Paths are supported. E0217 08:35:42.742835 8142 copyfile.go:211] For S3, please make sure that the supplied file repository URL adhere to S3 naming conventions, https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region. E0217 08:35:42.742839 8142 copyfile.go:212] For GCS, please make sure that the supplied file repository URL adheres to https://storage.googleapis.com/ --- PASS: Test_BuildVFSPath (0.00s) PASS ok k8s.io/kops/pkg/assets 0.042s === RUN TestBackoff --- PASS: TestBackoff (0.00s) PASS ok k8s.io/kops/pkg/backoff 0.004s === RUN TestSSHCredentialStoreOnConfigBase --- PASS: TestSSHCredentialStoreOnConfigBase (0.00s) === RUN TestSSHCredentialStoreOnOwnCFS --- PASS: TestSSHCredentialStoreOnOwnCFS (0.00s) PASS ok k8s.io/kops/pkg/client/simple/vfsclientset 0.064s === RUN TestToAzureVMName === RUN TestToAzureVMName/test_case_0 === RUN TestToAzureVMName/test_case_1 --- PASS: TestToAzureVMName (0.00s) --- PASS: TestToAzureVMName/test_case_0 (0.00s) --- PASS: TestToAzureVMName/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/cloudinstances 0.023s === RUN TestSetClusterBadInput --- PASS: TestSetClusterBadInput (0.00s) === RUN TestSetClusterFields --- PASS: TestSetClusterFields (0.00s) === RUN TestSetCiliumFields --- PASS: TestSetCiliumFields (0.00s) === RUN TestSetInstanceGroupsBadInput --- PASS: TestSetInstanceGroupsBadInput (0.00s) === RUN TestSetInstanceGroupsFields --- PASS: TestSetInstanceGroupsFields (0.00s) === RUN TestUnsetClusterBadInput --- PASS: TestUnsetClusterBadInput (0.00s) === RUN TestUnsetClusterFields --- PASS: TestUnsetClusterFields (0.00s) === RUN TestUnsetCiliumFields --- PASS: TestUnsetCiliumFields (0.00s) === RUN TestUnsetInstanceGroupsBadInput --- PASS: TestUnsetInstanceGroupsBadInput (0.00s) === RUN TestUnsetInstanceGroupsFields --- PASS: TestUnsetInstanceGroupsFields (0.00s) PASS ok k8s.io/kops/pkg/commands 0.092s === RUN Test_cacheFilePath --- PASS: Test_cacheFilePath (0.00s) PASS ok k8s.io/kops/pkg/commands/helpers 0.095s === RUN TestGetStructVal --- PASS: TestGetStructVal (0.00s) === RUN TestWrongStructField --- PASS: TestWrongStructField (0.00s) PASS ok k8s.io/kops/pkg/configbuilder 0.029s === RUN Test_Diff_1 --- PASS: Test_Diff_1 (0.00s) === RUN Test_Diff_2 --- PASS: Test_Diff_2 (0.00s) === RUN Test_Diff_3 --- PASS: Test_Diff_3 (0.00s) === RUN Test_Diff_ChangedLine --- PASS: Test_Diff_ChangedLine (0.00s) === RUN Test_Diff_4 --- PASS: Test_Diff_4 (0.00s) PASS ok k8s.io/kops/pkg/diff 0.004s === RUN TestIsGossipHostname --- PASS: TestIsGossipHostname (0.00s) PASS ok k8s.io/kops/pkg/dns 0.004s === RUN TestHasExtraFields === RUN TestHasExtraFields/minimal === RUN TestHasExtraFields/extraFields === RUN TestHasExtraFields/spec2 === RUN TestHasExtraFields/isolateMasters === RUN TestHasExtraFields/instanceGroup --- PASS: TestHasExtraFields (0.01s) --- PASS: TestHasExtraFields/minimal (0.01s) --- PASS: TestHasExtraFields/extraFields (0.00s) --- PASS: TestHasExtraFields/spec2 (0.00s) --- PASS: TestHasExtraFields/isolateMasters (0.00s) --- PASS: TestHasExtraFields/instanceGroup (0.00s) PASS ok k8s.io/kops/pkg/edit 0.039s === RUN TestFlagToFalse I0217 08:35:42.723793 8345 featureflag_test.go:32] Created flag Unittest1 I0217 08:35:42.723840 8345 featureflag.go:164] FeatureFlag "UnitTest1"=false I0217 08:35:42.723849 8345 featureflag.go:164] FeatureFlag "UnitTest1"=true --- PASS: TestFlagToFalse (0.00s) === RUN TestSetenv I0217 08:35:42.723913 8345 featureflag.go:164] FeatureFlag "UnitTest2"=false --- PASS: TestSetenv (0.00s) === RUN TestGetPositive --- PASS: TestGetPositive (0.00s) === RUN TestGetNegative --- PASS: TestGetNegative (0.00s) PASS ok k8s.io/kops/pkg/featureflag 0.004s === RUN TestBuildKCMFlags --- PASS: TestBuildKCMFlags (0.00s) === RUN TestKubeletConfigSpec --- PASS: TestKubeletConfigSpec (0.00s) === RUN TestBuildAPIServerFlags --- PASS: TestBuildAPIServerFlags (0.00s) PASS ok k8s.io/kops/pkg/flagbuilder 0.030s === RUN TestRenderInstanceGroupZones W0217 08:35:42.814488 8621 instancegroup.go:42] error fetching zones for instancegroup: cannot find subnet "badsubnet" (declared in instance group "", not found in cluster) --- PASS: TestRenderInstanceGroupZones (0.00s) === RUN TestRenderInstanceGroupSubnets --- PASS: TestRenderInstanceGroupSubnets (0.00s) PASS ok k8s.io/kops/pkg/formatter 0.023s === RUN TestWarmPoolOnlyRoll I0217 08:35:54.923445 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.923535 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.923550 9887 instancegroups.go:136] deleting warm pool instance "node-1" --- PASS: TestWarmPoolOnlyRoll (0.00s) === RUN TestRollingUpdateDisabledSurgeOS rollingupdate_os_test.go:96: Failing in new release PR when build is not yet published --- SKIP: TestRollingUpdateDisabledSurgeOS (0.00s) === RUN TestRollingUpdateAllNeedUpdate I0217 08:35:54.923914 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:54.923931 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:54.925078 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.925096 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:54.930266 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.930311 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.930326 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.930337 9887 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0217 08:35:54.931913 9887 instancegroups.go:431] Draining the node: "master-1a.local". I0217 08:35:54.932339 9887 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0217 08:35:54.932432 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:54.932453 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:54.933575 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.933593 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:54.938777 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.938815 9887 instancegroups.go:431] Draining the node: "master-1b.local". I0217 08:35:54.939443 9887 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0217 08:35:54.939490 9887 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0217 08:35:54.939506 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:54.940622 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.940644 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:54.945828 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.945871 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.945883 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.945893 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:54.946615 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:54.947157 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:54.947183 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:54.948296 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.948315 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:54.953585 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.953640 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:54.954369 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:54.954397 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:54.955528 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.955549 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:54.960749 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.960804 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:54.961585 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:54.961610 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:54.962719 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.962740 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:54.967949 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.967974 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.967983 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.967990 9887 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0217 08:35:54.968498 9887 instancegroups.go:431] Draining the node: "node-2a.local". I0217 08:35:54.968823 9887 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0217 08:35:54.968847 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:54.969950 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.969965 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:54.975157 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.975213 9887 instancegroups.go:431] Draining the node: "node-2b.local". I0217 08:35:54.975909 9887 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0217 08:35:54.975934 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:54.977049 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.977071 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:54.982244 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.982287 9887 instancegroups.go:431] Draining the node: "node-2c.local". I0217 08:35:54.982743 9887 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0217 08:35:54.982760 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:54.983867 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:54.983885 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:54.989087 9887 instancegroups.go:540] Cluster validated. I0217 08:35:54.989114 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdate (0.07s) === RUN TestRollingUpdateAllNeedUpdateCloudonly I0217 08:35:54.989389 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:54.989404 9887 instancegroups.go:469] waiting for 1ms after terminating instance W0217 08:35:54.990513 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.990538 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.990553 9887 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0217 08:35:54.990560 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:54.990569 9887 instancegroups.go:469] waiting for 1ms after terminating instance W0217 08:35:54.991653 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.991673 9887 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0217 08:35:54.991680 9887 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0217 08:35:54.991692 9887 instancegroups.go:469] waiting for 1ms after terminating instance W0217 08:35:54.992790 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.992807 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.992862 9887 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0217 08:35:54.992871 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:54.992897 9887 instancegroups.go:469] waiting for 1ms after terminating instance W0217 08:35:54.993971 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.994001 9887 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0217 08:35:54.994009 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:54.994020 9887 instancegroups.go:469] waiting for 1ms after terminating instance W0217 08:35:54.995116 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.995142 9887 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0217 08:35:54.995151 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:54.995167 9887 instancegroups.go:469] waiting for 1ms after terminating instance W0217 08:35:54.996257 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.996271 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.996294 9887 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0217 08:35:54.996303 9887 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0217 08:35:54.996317 9887 instancegroups.go:469] waiting for 1ms after terminating instance W0217 08:35:54.997408 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.997437 9887 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0217 08:35:54.997447 9887 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0217 08:35:54.997462 9887 instancegroups.go:469] waiting for 1ms after terminating instance W0217 08:35:54.998564 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0217 08:35:54.998589 9887 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0217 08:35:54.998597 9887 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0217 08:35:54.998612 9887 instancegroups.go:469] waiting for 1ms after terminating instance W0217 08:35:54.999697 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0217 08:35:54.999711 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateCloudonly (0.01s) === RUN TestRollingUpdateAllNeedUpdateNoFailOnValidate I0217 08:35:54.999890 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:54.999902 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.001014 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.001039 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.001052 9887 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.001082 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.001095 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.001105 9887 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.001112 9887 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0217 08:35:55.001712 9887 instancegroups.go:431] Draining the node: "master-1a.local". I0217 08:35:55.002236 9887 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0217 08:35:55.002288 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:55.002307 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.003403 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.003418 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.003426 9887 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.003445 9887 instancegroups.go:431] Draining the node: "master-1b.local". I0217 08:35:55.003746 9887 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0217 08:35:55.003770 9887 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0217 08:35:55.003781 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.004863 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.004890 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.004899 9887 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.004918 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.004925 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.004930 9887 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.004936 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:55.005254 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.005494 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.005506 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.006596 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.006609 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.006617 9887 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.006630 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.006896 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.006908 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.008017 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.008032 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.008040 9887 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.008055 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:55.008373 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:55.008386 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.009475 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.009488 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.009495 9887 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.009501 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.009507 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.009512 9887 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.009518 9887 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0217 08:35:55.009832 9887 instancegroups.go:431] Draining the node: "node-2a.local". I0217 08:35:55.010072 9887 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0217 08:35:55.010085 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.011190 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.011205 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.011214 9887 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.011227 9887 instancegroups.go:431] Draining the node: "node-2b.local". I0217 08:35:55.011482 9887 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0217 08:35:55.011494 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.012585 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.012606 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.012620 9887 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.012635 9887 instancegroups.go:431] Draining the node: "node-2c.local". I0217 08:35:55.012931 9887 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0217 08:35:55.012945 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.014042 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.014065 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0217 08:35:55.014078 9887 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0217 08:35:55.014092 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateNoFailOnValidate (0.01s) === RUN TestRollingUpdateNoneNeedUpdate I0217 08:35:55.014309 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdate (0.00s) === RUN TestRollingUpdateNoneNeedUpdateWithForce I0217 08:35:55.014437 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:55.014452 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.015545 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.015560 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.020747 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.020816 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.020831 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.020840 9887 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0217 08:35:55.021358 9887 instancegroups.go:431] Draining the node: "master-1a.local". I0217 08:35:55.021752 9887 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0217 08:35:55.021802 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:55.021822 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.022917 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.022929 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.028137 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.028188 9887 instancegroups.go:431] Draining the node: "master-1b.local". I0217 08:35:55.028644 9887 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0217 08:35:55.028680 9887 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0217 08:35:55.028694 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.029796 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.029814 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.035021 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.035064 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.035077 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.035088 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:55.035664 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.036010 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.036028 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.037638 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.037665 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.042862 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.042929 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.043604 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.043629 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.045158 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.045179 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.050378 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.050423 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:55.050888 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:55.050908 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.051963 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.051974 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.057155 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.057192 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.057207 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.057217 9887 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0217 08:35:55.057904 9887 instancegroups.go:431] Draining the node: "node-2a.local". I0217 08:35:55.058378 9887 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0217 08:35:55.058401 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.059789 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.059808 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.065002 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.065045 9887 instancegroups.go:431] Draining the node: "node-2b.local". I0217 08:35:55.065456 9887 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0217 08:35:55.065473 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.066573 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.066590 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.072404 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.072444 9887 instancegroups.go:431] Draining the node: "node-2c.local". I0217 08:35:55.072850 9887 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0217 08:35:55.072867 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.073968 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.073986 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.079292 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.079325 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdateWithForce (0.06s) === RUN TestRollingUpdateEmptyGroup I0217 08:35:55.079464 9887 rollingupdate.go:111] Cloud Instance Group length is zero. Not doing a rolling-update. --- PASS: TestRollingUpdateEmptyGroup (0.00s) === RUN TestRollingUpdateUnknownRole --- PASS: TestRollingUpdateUnknownRole (0.00s) === RUN TestRollingUpdateAllNeedUpdateFailsValidation I0217 08:35:55.080226 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:55.080239 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.081358 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.081376 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0217 08:35:55.081385 9887 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateFailsValidation (0.00s) === RUN TestRollingUpdateAllNeedUpdateErrorsValidation I0217 08:35:55.081535 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:55.081546 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.082631 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.082643 9887 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0217 08:35:55.082651 9887 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateFailsValidation I0217 08:35:55.082744 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.082753 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0217 08:35:55.082759 9887 instancegroups.go:509] Cluster did not validate within 0s E0217 08:35:55.082764 9887 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateFailsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateErrorsValidation I0217 08:35:55.083243 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.083263 9887 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0217 08:35:55.083283 9887 instancegroups.go:509] Cluster did not validate within 0s E0217 08:35:55.083290 9887 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateClusterFailsValidationAfterOneMaster I0217 08:35:55.085046 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:55.085074 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.086202 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.086223 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.091369 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.091417 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.091432 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.091439 9887 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0217 08:35:55.091827 9887 instancegroups.go:431] Draining the node: "master-1a.local". I0217 08:35:55.092119 9887 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0217 08:35:55.092158 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:55.092172 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.093276 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.093292 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0217 08:35:55.093300 9887 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterFailsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneMaster I0217 08:35:55.093467 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:55.093478 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.094613 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.094659 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.099868 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.099931 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.099949 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.099957 9887 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0217 08:35:55.100508 9887 instancegroups.go:431] Draining the node: "master-1a.local". I0217 08:35:55.100957 9887 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0217 08:35:55.101014 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:55.101034 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.102170 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.102186 9887 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0217 08:35:55.102194 9887 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateNonRelatedInstanceGroupFailure I0217 08:35:55.102370 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.102379 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.102383 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:55.102729 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.102983 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.102995 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.104084 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.104100 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.109277 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.109305 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.109698 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.109714 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.110825 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.110837 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.116009 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.116037 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:55.116416 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:55.116435 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.117568 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.117585 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.122794 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.122824 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNonRelatedInstanceGroupFailure (0.02s) === RUN TestRollingUpdateRelatedInstanceGroupFailure I0217 08:35:55.123028 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.123042 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0217 08:35:55.123050 9887 instancegroups.go:509] Cluster did not validate within 0s E0217 08:35:55.123056 9887 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateRelatedInstanceGroupFailure (0.00s) === RUN TestRollingUpdateMasterGroupFailure I0217 08:35:55.123171 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.123185 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0217 08:35:55.123192 9887 instancegroups.go:509] Cluster did not validate within 0s E0217 08:35:55.123197 9887 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateMasterGroupFailure (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupNil I0217 08:35:55.123306 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.123316 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0217 08:35:55.123321 9887 instancegroups.go:509] Cluster did not validate within 0s E0217 08:35:55.123326 9887 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupNil (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupExitableError I0217 08:35:55.123432 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.123440 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.123445 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:55.123915 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.124468 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.124493 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.125584 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.125595 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.130750 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.130775 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.131125 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.131140 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.132256 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.132270 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.137444 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.137500 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:55.137985 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:55.138008 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.139123 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.139137 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.144314 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.144332 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.144343 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0217 08:35:55.144353 9887 instancegroups.go:509] Cluster did not validate within 0s E0217 08:35:55.144361 9887 rollingupdate.go:218] failed to roll InstanceGroup "node-2": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupExitableError (0.02s) === RUN TestRollingUpdateClusterFailsValidationAfterOneNode I0217 08:35:55.144538 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.144559 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.144568 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:55.145179 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.145598 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.145619 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.146859 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.146883 9887 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0217 08:35:55.146898 9887 instancegroups.go:509] Cluster did not validate within 0s E0217 08:35:55.146910 9887 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterFailsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneNode I0217 08:35:55.147052 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.147067 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.147077 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:55.147669 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.148114 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.148132 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.149231 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.149249 9887 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0217 08:35:55.149262 9887 instancegroups.go:509] Cluster did not validate within 0s E0217 08:35:55.149271 9887 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateFlappingValidation I0217 08:35:55.149451 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:55.149467 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.150564 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.150582 9887 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0217 08:35:55.151667 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.156818 9887 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0217 08:35:55.157903 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.163122 9887 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0217 08:35:55.164221 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.169422 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.169487 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.169505 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.169514 9887 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0217 08:35:55.170034 9887 instancegroups.go:431] Draining the node: "master-1a.local". I0217 08:35:55.170396 9887 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0217 08:35:55.170434 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:55.170447 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.171547 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.171572 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.176732 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.176775 9887 instancegroups.go:431] Draining the node: "master-1b.local". I0217 08:35:55.177360 9887 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0217 08:35:55.177410 9887 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0217 08:35:55.177430 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.178528 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.178566 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.183729 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.183750 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.183770 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.183780 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:55.184379 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.184828 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.184847 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.185979 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.186000 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.191174 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.191215 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.191807 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.191828 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.192932 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.192961 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.198143 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.198173 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:55.198537 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:55.198550 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.199646 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.199675 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.204884 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.204902 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.204913 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.204920 9887 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0217 08:35:55.205290 9887 instancegroups.go:431] Draining the node: "node-2a.local". I0217 08:35:55.205583 9887 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0217 08:35:55.205597 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.206688 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.206707 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.211892 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.211920 9887 instancegroups.go:431] Draining the node: "node-2b.local". I0217 08:35:55.212302 9887 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0217 08:35:55.212317 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.213409 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.213432 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.218618 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.218656 9887 instancegroups.go:431] Draining the node: "node-2c.local". I0217 08:35:55.219038 9887 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0217 08:35:55.219057 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.220154 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.220178 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.225360 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.225381 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateFlappingValidation (0.08s) === RUN TestRollingUpdateValidatesAfterBastion I0217 08:35:55.225557 9887 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0217 08:35:55.225574 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.226684 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.226705 9887 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0217 08:35:55.227807 9887 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0217 08:35:55.228895 9887 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0217 08:35:55.229974 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.235131 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.235182 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.235206 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.235215 9887 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0217 08:35:55.235701 9887 instancegroups.go:431] Draining the node: "master-1a.local". I0217 08:35:55.236078 9887 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0217 08:35:55.236128 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:55.236145 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.237241 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.237264 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.242447 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.242495 9887 instancegroups.go:431] Draining the node: "master-1b.local". I0217 08:35:55.243034 9887 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0217 08:35:55.243081 9887 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0217 08:35:55.243100 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.244213 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.244228 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.249405 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.249445 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.249467 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.249479 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:55.250156 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.250600 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.250635 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.251784 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.251819 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.257000 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.257052 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.257698 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.257724 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.258862 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.258878 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.264063 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.264106 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:55.264628 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:55.264646 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.265751 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.265764 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.270933 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.270954 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.270962 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.270968 9887 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0217 08:35:55.271369 9887 instancegroups.go:431] Draining the node: "node-2a.local". I0217 08:35:55.271650 9887 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0217 08:35:55.271666 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.272795 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.272807 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.278065 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.278093 9887 instancegroups.go:431] Draining the node: "node-2b.local". I0217 08:35:55.278440 9887 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0217 08:35:55.278454 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.279548 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.279565 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.284727 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.284767 9887 instancegroups.go:431] Draining the node: "node-2c.local". I0217 08:35:55.285344 9887 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0217 08:35:55.285367 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.286488 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.286507 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.291658 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.291677 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateValidatesAfterBastion (0.07s) === RUN TestAddAnnotatedNodesToNeedsUpdate --- PASS: TestAddAnnotatedNodesToNeedsUpdate (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateCloudonly --- PASS: TestAddAnnotatedNodesToNeedsUpdateCloudonly (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateNodesMissing --- PASS: TestAddAnnotatedNodesToNeedsUpdateNodesMissing (0.00s) === RUN TestRollingUpdateTaintAllButOneNeedUpdate I0217 08:35:55.292068 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.292081 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.292088 9887 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0217 08:35:55.292555 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.292984 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.293003 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.294116 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.294128 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.299294 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.299322 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.299701 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.299717 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.300838 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.300851 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.305998 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.306016 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateTaintAllButOneNeedUpdate (0.01s) === RUN TestRollingUpdateMaxSurgeIgnoredForMaster I0217 08:35:55.306156 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.306165 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.306170 9887 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0217 08:35:55.306471 9887 instancegroups.go:431] Draining the node: "master-1a.local". I0217 08:35:55.306719 9887 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0217 08:35:55.306751 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:55.306762 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.307857 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.307867 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.313075 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.313112 9887 instancegroups.go:431] Draining the node: "master-1b.local". I0217 08:35:55.313494 9887 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0217 08:35:55.313528 9887 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0217 08:35:55.313542 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.314673 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.314685 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.319872 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.319890 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeIgnoredForMaster (0.01s) === RUN TestRollingUpdateDisabled I0217 08:35:55.320067 9887 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled W0217 08:35:55.320085 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0217 08:35:55.320094 9887 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled W0217 08:35:55.320099 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0217 08:35:55.320105 9887 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled W0217 08:35:55.320109 9887 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0217 08:35:55.320113 9887 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0217 08:35:55.320118 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabled (0.00s) === RUN TestRollingUpdateDisabledSurge I0217 08:35:55.320203 9887 instancegroups.go:607] Detaching instance "bastion-1a", in group "bastion-1". I0217 08:35:55.320223 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:55.321353 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.321365 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.326551 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.326566 9887 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled I0217 08:35:55.326590 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.326597 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.326607 9887 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0217 08:35:55.326929 9887 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled I0217 08:35:55.326938 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.326944 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.326948 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:55.327232 9887 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0217 08:35:55.327255 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:55.328390 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.328401 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.333583 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.333598 9887 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled I0217 08:35:55.333605 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.333616 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.333622 9887 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0217 08:35:55.333992 9887 instancegroups.go:605] Detaching instance "node-2c", node "node-2c.local", in group "node-2". I0217 08:35:55.334016 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:55.335123 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.335134 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:55.340331 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.340353 9887 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0217 08:35:55.340364 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabledSurge (0.02s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdate I0217 08:35:55.340519 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.340532 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.340537 9887 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0217 08:35:55.341303 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.341566 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.341585 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.342694 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.342718 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.342740 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:55.342754 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.343068 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:55.343271 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.343287 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.344388 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.344416 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.444742 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.444804 9887 instancegroups.go:431] Draining the node: "node-1e.local". I0217 08:35:55.444839 9887 instancegroups.go:431] Draining the node: "node-1d.local". I0217 08:35:55.445274 9887 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0217 08:35:55.445483 9887 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0217 08:35:55.445500 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.446604 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.446631 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.446658 9887 instancegroups.go:431] Draining the node: "node-1f.local". I0217 08:35:55.447128 9887 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0217 08:35:55.447153 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.448285 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.448310 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.548664 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.548716 9887 instancegroups.go:431] Draining the node: "node-1g.local". I0217 08:35:55.549323 9887 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0217 08:35:55.549357 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.550473 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.550492 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.550501 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllButOneNeedUpdate I0217 08:35:55.550635 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.550648 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.550652 9887 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0217 08:35:55.551223 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.551256 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.551496 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.551707 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.551722 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.552833 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.552855 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.653200 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.653241 9887 instancegroups.go:431] Draining the node: "node-1d.local". I0217 08:35:55.653282 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:55.653634 9887 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0217 08:35:55.653845 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:55.653862 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.654991 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.655010 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.655024 9887 instancegroups.go:431] Draining the node: "node-1e.local". I0217 08:35:55.655303 9887 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0217 08:35:55.655319 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.656448 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.656476 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.756870 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.756923 9887 instancegroups.go:431] Draining the node: "node-1f.local". I0217 08:35:55.757726 9887 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0217 08:35:55.757764 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.758922 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.758941 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.758950 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdateMaster I0217 08:35:55.759061 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.759072 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.759077 9887 instancegroups.go:342] Tainting 7 nodes in "master-1" instancegroup. I0217 08:35:55.759749 9887 instancegroups.go:431] Draining the node: "master-1a.local". I0217 08:35:55.759962 9887 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0217 08:35:55.759985 9887 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0217 08:35:55.759998 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.761163 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.761191 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.761220 9887 instancegroups.go:431] Draining the node: "master-1c.local". I0217 08:35:55.761228 9887 instancegroups.go:431] Draining the node: "master-1b.local". I0217 08:35:55.761929 9887 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0217 08:35:55.762093 9887 instancegroups.go:691] skipping deregistration of instance "master-1c", as part of instancegroup with role "ControlPlane" I0217 08:35:55.762137 9887 instancegroups.go:628] Stopping instance "master-1c", node "master-1c.local", in group "master-1" (this may take a while). I0217 08:35:55.762171 9887 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0217 08:35:55.762192 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.763331 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.763366 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.863760 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.863815 9887 instancegroups.go:431] Draining the node: "master-1e.local". I0217 08:35:55.863823 9887 instancegroups.go:431] Draining the node: "master-1d.local". I0217 08:35:55.864560 9887 instancegroups.go:691] skipping deregistration of instance "master-1e", as part of instancegroup with role "ControlPlane" I0217 08:35:55.864595 9887 instancegroups.go:628] Stopping instance "master-1e", node "master-1e.local", in group "master-1" (this may take a while). I0217 08:35:55.864674 9887 instancegroups.go:691] skipping deregistration of instance "master-1d", as part of instancegroup with role "ControlPlane" I0217 08:35:55.864690 9887 instancegroups.go:628] Stopping instance "master-1d", node "master-1d.local", in group "master-1" (this may take a while). I0217 08:35:55.864704 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.865858 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.865886 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.865910 9887 instancegroups.go:431] Draining the node: "master-1f.local". I0217 08:35:55.866442 9887 instancegroups.go:691] skipping deregistration of instance "master-1f", as part of instancegroup with role "ControlPlane" I0217 08:35:55.866480 9887 instancegroups.go:628] Stopping instance "master-1f", node "master-1f.local", in group "master-1" (this may take a while). I0217 08:35:55.866504 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.867621 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.867646 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.968015 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.968074 9887 instancegroups.go:431] Draining the node: "master-1g.local". I0217 08:35:55.968672 9887 instancegroups.go:691] skipping deregistration of instance "master-1g", as part of instancegroup with role "ControlPlane" I0217 08:35:55.968721 9887 instancegroups.go:628] Stopping instance "master-1g", node "master-1g.local", in group "master-1" (this may take a while). I0217 08:35:55.968747 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.969862 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.969899 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.969913 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdateMaster (0.21s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdate I0217 08:35:55.970160 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.970181 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.970190 9887 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0217 08:35:55.971284 9887 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0217 08:35:55.971322 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:55.972416 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.972437 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.972443 9887 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0217 08:35:55.972472 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:55.973559 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.973577 9887 instancegroups.go:540] Cluster validated. I0217 08:35:55.973601 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:55.973622 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:55.974255 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:55.974409 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:55.974430 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:55.975521 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:55.975564 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.075899 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.075956 9887 instancegroups.go:431] Draining the node: "node-1d.local". I0217 08:35:56.075991 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:56.076404 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:56.077041 9887 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0217 08:35:56.077066 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.078160 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.078182 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.078199 9887 instancegroups.go:431] Draining the node: "node-1e.local". I0217 08:35:56.078492 9887 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0217 08:35:56.078513 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.079629 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.079660 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.179832 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.179877 9887 instancegroups.go:431] Draining the node: "node-1f.local". I0217 08:35:56.180300 9887 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0217 08:35:56.180329 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.181483 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.181512 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.181523 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeAllButOneNeedUpdate I0217 08:35:56.181676 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.181690 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.181696 9887 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0217 08:35:56.182368 9887 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0217 08:35:56.182389 9887 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0217 08:35:56.182407 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:56.183551 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.183569 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.183585 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:56.183628 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:56.183891 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:56.184120 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:56.184137 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.185248 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.185284 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.285693 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.285739 9887 instancegroups.go:431] Draining the node: "node-1d.local". I0217 08:35:56.285810 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:56.286216 9887 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0217 08:35:56.286444 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:56.286463 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.287563 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.287587 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.287606 9887 instancegroups.go:431] Draining the node: "node-1e.local". I0217 08:35:56.288046 9887 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0217 08:35:56.288075 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.289225 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.289252 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.389664 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.389706 9887 instancegroups.go:431] Draining the node: "node-1f.local". I0217 08:35:56.390113 9887 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0217 08:35:56.390141 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.391279 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.391297 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.391306 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeGreaterThanNeedUpdate I0217 08:35:56.391421 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.391429 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.391434 9887 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0217 08:35:56.391684 9887 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0217 08:35:56.391696 9887 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". I0217 08:35:56.391709 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:56.392840 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.392850 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:56.398042 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.398062 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:56.398070 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:56.398373 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:56.398386 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.398582 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:56.398593 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.399532 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.399554 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:56.404843 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.404857 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeGreaterThanNeedUpdate (0.01s) === RUN TestRollingUpdateDetachFails I0217 08:35:56.404984 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.404993 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.404997 9887 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0217 08:35:56.405236 9887 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". E0217 08:35:56.405258 9887 instancegroups.go:191] Failed to detach instance "node-1b": error detaching instance "node-1b", node "node-1b.local": error detaching instance "node-1b": testing error I0217 08:35:56.405263 9887 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". E0217 08:35:56.405273 9887 instancegroups.go:191] Failed to detach instance "node-1a": error detaching instance "node-1a", node "node-1a.local": error detaching instance "node-1a": testing error I0217 08:35:56.405283 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:56.406417 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.406433 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:56.411537 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.411557 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:56.411589 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:56.412007 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:56.412024 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.412158 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:56.412175 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.413140 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.413151 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:56.418409 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.418421 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDetachFails (0.01s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached I0217 08:35:56.418536 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.418547 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.418552 9887 instancegroups.go:342] Tainting 4 nodes in "node-1" instancegroup. I0217 08:35:56.418982 9887 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0217 08:35:56.419006 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:56.420151 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.420183 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.420191 9887 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0217 08:35:56.420220 9887 instancegroups.go:203] waiting for 1ms after detaching instance I0217 08:35:56.421343 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.421358 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.421370 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:56.421394 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:56.421413 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:56.421883 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:56.421902 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.422107 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:56.422122 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.422196 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:56.422209 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.423046 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.523696 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.523750 9887 instancegroups.go:431] Draining the node: "node-1d.local". I0217 08:35:56.524159 9887 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0217 08:35:56.524183 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.525291 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.525325 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.525336 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached (0.11s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached I0217 08:35:56.525487 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.525504 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.525512 9887 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0217 08:35:56.526566 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:56.526967 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:56.526988 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.528105 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.528120 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.528134 9887 instancegroups.go:431] Draining the node: "node-1e.local". I0217 08:35:56.528164 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:56.528473 9887 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0217 08:35:56.528686 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:56.528701 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.529799 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.529834 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.630431 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.630488 9887 instancegroups.go:431] Draining the node: "node-1g.local". I0217 08:35:56.630518 9887 instancegroups.go:431] Draining the node: "node-1f.local". I0217 08:35:56.630914 9887 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0217 08:35:56.631125 9887 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0217 08:35:56.631142 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.632292 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.632322 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.632336 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:56.632636 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:56.632663 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.633793 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.633830 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.734546 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.734589 9887 instancegroups.go:431] Draining the node: "node-1d.local". I0217 08:35:56.735013 9887 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0217 08:35:56.735037 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.736194 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.736233 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.736244 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached (0.21s) === RUN TestRollingUpdateOnlyWarmPoolNodes I0217 08:35:56.736381 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.736390 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.736396 9887 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0217 08:35:56.736404 9887 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0217 08:35:56.736408 9887 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0217 08:35:56.736416 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateOnlyWarmPoolNodes (0.00s) === RUN TestRollingWarmPoolBeforeJoinedNodes I0217 08:35:56.736478 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.736486 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.736491 9887 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0217 08:35:56.736893 9887 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0217 08:35:56.736903 9887 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0217 08:35:56.736907 9887 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0217 08:35:56.736925 9887 instancegroups.go:431] Draining the node: "node-1a.local". I0217 08:35:56.737184 9887 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0217 08:35:56.737196 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.738337 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.738350 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:56.743540 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.743570 9887 instancegroups.go:431] Draining the node: "node-1b.local". I0217 08:35:56.743875 9887 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0217 08:35:56.743889 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.745027 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.745040 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:56.750232 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.750260 9887 instancegroups.go:431] Draining the node: "node-1c.local". I0217 08:35:56.750599 9887 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0217 08:35:56.750645 9887 instancegroups.go:469] waiting for 1ms after terminating instance I0217 08:35:56.751762 9887 instancegroups.go:504] Validating the cluster. I0217 08:35:56.751785 9887 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0217 08:35:56.756976 9887 instancegroups.go:540] Cluster validated. I0217 08:35:56.756991 9887 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingWarmPoolBeforeJoinedNodes (0.02s) === RUN TestSettings === RUN TestSettings/DrainAndTerminate === RUN TestSettings/MaxUnavailable === RUN TestSettings/MaxSurge --- PASS: TestSettings (0.00s) --- PASS: TestSettings/DrainAndTerminate (0.00s) --- PASS: TestSettings/MaxUnavailable (0.00s) --- PASS: TestSettings/MaxSurge (0.00s) === RUN TestMaxUnavailable === RUN TestMaxUnavailable/0_1 === RUN TestMaxUnavailable/0%_1 === RUN TestMaxUnavailable/39%_10 === RUN TestMaxUnavailable/100%_10 --- PASS: TestMaxUnavailable (0.00s) --- PASS: TestMaxUnavailable/0_1 (0.00s) --- PASS: TestMaxUnavailable/0%_1 (0.00s) --- PASS: TestMaxUnavailable/39%_10 (0.00s) --- PASS: TestMaxUnavailable/100%_10 (0.00s) === RUN TestMaxSurge === RUN TestMaxSurge/0_1 === RUN TestMaxSurge/0%_1 === RUN TestMaxSurge/31%_10 === RUN TestMaxSurge/100%_10 --- PASS: TestMaxSurge (0.00s) --- PASS: TestMaxSurge/0_1 (0.00s) --- PASS: TestMaxSurge/0%_1 (0.00s) --- PASS: TestMaxSurge/31%_10 (0.00s) --- PASS: TestMaxSurge/100%_10 (0.00s) === RUN TestAWSDefault --- PASS: TestAWSDefault (0.00s) PASS ok k8s.io/kops/pkg/instancegroups 1.913s === RUN TestWriteToken === RUN TestWriteToken/WriteJson === RUN TestWriteToken/WriteJsonWithIndent --- PASS: TestWriteToken (0.00s) --- PASS: TestWriteToken/WriteJson (0.00s) --- PASS: TestWriteToken/WriteJsonWithIndent (0.00s) PASS ok k8s.io/kops/pkg/jsonutils 0.005s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.00s) PASS ok k8s.io/kops/pkg/k8scodecs 0.011s === RUN TestParse E0217 08:35:54.857866 9890 versions.go:96] unable to parse Kubernetes version "" E0217 08:35:54.857925 9890 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: TestParse (0.00s) === RUN TestIsGTE === RUN TestIsGTE/KV_greater_than_Version === RUN TestIsGTE/KV_greater_than_Version#01 === RUN TestIsGTE/KV_equal_Version === RUN TestIsGTE/KV_equal_Version#01 === RUN TestIsGTE/Version_greater_than_KV === RUN TestIsGTE/Version_greater_than_KV#01 --- PASS: TestIsGTE (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version#01 (0.00s) --- PASS: TestIsGTE/KV_equal_Version (0.00s) --- PASS: TestIsGTE/KV_equal_Version#01 (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV#01 (0.00s) PASS ok k8s.io/kops/pkg/k8sversion 0.008s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.00s) === RUN TestToVersionedJSON --- PASS: TestToVersionedJSON (0.00s) === RUN TestRewriteAPIGroup --- PASS: TestRewriteAPIGroup (0.00s) PASS ok k8s.io/kops/pkg/kopscodecs 0.032s === RUN TestBuildKubecfg === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster === RUN TestBuildKubecfg/Public_DNS_with_kops_auth_plugin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option --- PASS: TestBuildKubecfg (0.09s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster (0.00s) --- PASS: TestBuildKubecfg/Public_DNS_with_kops_auth_plugin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option (0.00s) PASS ok k8s.io/kops/pkg/kubeconfig 0.142s === RUN Test_ProxyFunc --- PASS: Test_ProxyFunc (0.00s) === RUN TestBootstrapUserData --- PASS: TestBootstrapUserData (0.01s) === RUN TestValidateAWSVolumeAllow50ratio --- PASS: TestValidateAWSVolumeAllow50ratio (0.00s) PASS ok k8s.io/kops/pkg/model 0.075s === RUN TestRootVolumeOptimizationFlag --- PASS: TestRootVolumeOptimizationFlag (0.00s) === RUN TestAPIServerAdditionalSecurityGroupsWithNLB === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Node --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Node (0.00s) === RUN TestJoinSuffixes --- PASS: TestJoinSuffixes (0.00s) === RUN TestIAMServiceEC2 --- PASS: TestIAMServiceEC2 (0.00s) === RUN Test_formatAWSIAMStatement === RUN Test_formatAWSIAMStatement/namespace_and_name_without_wildcard === RUN Test_formatAWSIAMStatement/name_contains_wildcard === RUN Test_formatAWSIAMStatement/namespace_contains_wildcard --- PASS: Test_formatAWSIAMStatement (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_and_name_without_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/name_contains_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_contains_wildcard (0.00s) PASS ok k8s.io/kops/pkg/model/awsmodel 0.071s === RUN TestAPILoadBalancerModelBuilder_Build --- PASS: TestAPILoadBalancerModelBuilder_Build (0.00s) === RUN TestSubnetForLoadbalancer --- PASS: TestSubnetForLoadbalancer (0.00s) === RUN TestCloudTagsForInstanceGroup --- PASS: TestCloudTagsForInstanceGroup (0.00s) === RUN TestNetworkModelBuilder_Build --- PASS: TestNetworkModelBuilder_Build (0.00s) === RUN TestResourceGroupModelBuilder_Build --- PASS: TestResourceGroupModelBuilder_Build (0.00s) === RUN TestVMScaleSetModelBuilder_Build --- PASS: TestVMScaleSetModelBuilder_Build (0.00s) === RUN TestGetCapacity === RUN TestGetCapacity/test_case_0 === RUN TestGetCapacity/test_case_1 === RUN TestGetCapacity/test_case_2 === RUN TestGetCapacity/test_case_3 --- PASS: TestGetCapacity (0.00s) --- PASS: TestGetCapacity/test_case_0 (0.00s) --- PASS: TestGetCapacity/test_case_1 (0.00s) --- PASS: TestGetCapacity/test_case_2 (0.00s) --- PASS: TestGetCapacity/test_case_3 (0.00s) === RUN TestGetStorageProfile === RUN TestGetStorageProfile/test_case_0 === RUN TestGetStorageProfile/test_case_1 --- PASS: TestGetStorageProfile (0.00s) --- PASS: TestGetStorageProfile/test_case_0 (0.00s) --- PASS: TestGetStorageProfile/test_case_1 (0.00s) === RUN TestParseImage === RUN TestParseImage/test_case_0 === RUN TestParseImage/test_case_1 === RUN TestParseImage/test_case_2 === RUN TestParseImage/test_case_3 --- PASS: TestParseImage (0.00s) --- PASS: TestParseImage/test_case_0 (0.00s) --- PASS: TestParseImage/test_case_1 (0.00s) --- PASS: TestParseImage/test_case_2 (0.00s) --- PASS: TestParseImage/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/model/azuremodel 0.063s === RUN TestCloudConfigurationOptionsBuilder === RUN TestCloudConfigurationOptionsBuilder/neither === RUN TestCloudConfigurationOptionsBuilder/all_false === RUN TestCloudConfigurationOptionsBuilder/all_true === RUN TestCloudConfigurationOptionsBuilder/os_false === RUN TestCloudConfigurationOptionsBuilder/os_true === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_true === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_true --- PASS: TestCloudConfigurationOptionsBuilder (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/neither (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_true (0.00s) === RUN Test_Build_Containerd_Supported_Version --- PASS: Test_Build_Containerd_Supported_Version (0.00s) === RUN Test_Build_Containerd_Unneeded_Runtime --- PASS: Test_Build_Containerd_Unneeded_Runtime (0.00s) === RUN Test_Build_Containerd_Needed_Runtime --- PASS: Test_Build_Containerd_Needed_Runtime (0.00s) === RUN TestImage I0217 08:35:54.908272 9896 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestImage (0.00s) === RUN Test_Build_KCM_Builder --- PASS: Test_Build_KCM_Builder (0.00s) === RUN Test_Build_KCM_Builder_Change_Duration --- PASS: Test_Build_KCM_Builder_Change_Duration (0.00s) === RUN Test_Build_KCM_Builder_CIDR_Mask_Size === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: (0.00s) === RUN TestFeatureGatesKubernetesVersion --- PASS: TestFeatureGatesKubernetesVersion (0.00s) === RUN TestFeatureGatesOverride --- PASS: TestFeatureGatesOverride (0.00s) === RUN Test_Build_Scheduler_Without_PolicyConfigMap --- PASS: Test_Build_Scheduler_Without_PolicyConfigMap (0.00s) === RUN Test_Build_Scheduler_PolicyConfigMap_Supported_Version --- PASS: Test_Build_Scheduler_PolicyConfigMap_Supported_Version (0.00s) PASS ok k8s.io/kops/pkg/model/components 0.062s === RUN Test_RunEtcdManagerBuilder I0217 08:35:54.916230 9898 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunEtcdManagerBuilder/basedir=tests/minimal === RUN Test_RunEtcdManagerBuilder/basedir=tests/interval === RUN Test_RunEtcdManagerBuilder/basedir=tests/proxy === RUN Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings W0217 08:35:54.943588 9898 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 W0217 08:35:54.944634 9898 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 --- PASS: Test_RunEtcdManagerBuilder (0.03s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/minimal (0.02s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/interval (0.00s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/proxy (0.00s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings (0.00s) PASS ok k8s.io/kops/pkg/model/components/etcdmanager 0.099s === RUN Test_RunKubeApiserverBuilder I0217 08:35:54.910990 9899 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunKubeApiserverBuilder/basedir=tests/minimal --- PASS: Test_RunKubeApiserverBuilder (0.01s) --- PASS: Test_RunKubeApiserverBuilder/basedir=tests/minimal (0.01s) PASS ok k8s.io/kops/pkg/model/components/kubeapiserver 0.075s === RUN Test_RunKubeSchedulerBuilder === RUN Test_RunKubeSchedulerBuilder/basedir=tests/minimal === RUN Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig === RUN Test_RunKubeSchedulerBuilder/basedir=tests/mixing --- PASS: Test_RunKubeSchedulerBuilder (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/minimal (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig (0.00s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/mixing (0.00s) PASS ok k8s.io/kops/pkg/model/components/kubescheduler 0.075s === RUN TestDefaultInstanceGroupVolumeSize --- PASS: TestDefaultInstanceGroupVolumeSize (0.00s) PASS ok k8s.io/kops/pkg/model/defaults 0.023s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) === RUN TestPolicyGeneration --- PASS: TestPolicyGeneration (0.00s) === RUN TestEmptyPolicy --- PASS: TestEmptyPolicy (0.00s) PASS ok k8s.io/kops/pkg/model/iam 0.064s === RUN TestServerGroupBuilder I0217 08:35:54.917065 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:54.926671 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:54.938845 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:54.951300 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:54.959405 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:54.973616 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.127397 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.138748 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.147344 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.157028 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.161306 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.168633 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.173507 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.177168 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.180836 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.461339 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.465147 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:55.468873 9905 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestServerGroupBuilder (0.56s) PASS ok k8s.io/kops/pkg/model/openstackmodel 0.626s === RUN Test_NodeUpTabs --- PASS: Test_NodeUpTabs (0.00s) PASS ok k8s.io/kops/pkg/model/resources 0.028s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetVMSSNameFromProviderID === RUN TestGetVMSSNameFromProviderID/test_case_0 === RUN TestGetVMSSNameFromProviderID/test_case_1 === RUN TestGetVMSSNameFromProviderID/test_case_2 --- PASS: TestGetVMSSNameFromProviderID (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_0 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_1 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_2 (0.00s) === RUN TestIdentifyNode === RUN TestIdentifyNode/test_case_0 === RUN TestIdentifyNode/test_case_1 --- PASS: TestIdentifyNode (0.00s) --- PASS: TestIdentifyNode/test_case_0 (0.00s) --- PASS: TestIdentifyNode/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/nodeidentity/azure 0.027s === RUN TestBuildNodeLabels === RUN TestBuildNodeLabels/RoleControlPlane === RUN TestBuildNodeLabels/RoleNode --- PASS: TestBuildNodeLabels (0.00s) --- PASS: TestBuildNodeLabels/RoleControlPlane (0.00s) --- PASS: TestBuildNodeLabels/RoleNode (0.00s) PASS ok k8s.io/kops/pkg/nodelabels 0.027s === RUN TestGenerateCertificate === RUN TestGenerateCertificate/selfsigned === RUN TestGenerateCertificate/client === RUN TestGenerateCertificate/server --- PASS: TestGenerateCertificate (0.00s) --- PASS: TestGenerateCertificate/selfsigned (0.00s) --- PASS: TestGenerateCertificate/client (0.00s) --- PASS: TestGenerateCertificate/server (0.00s) === RUN TestCertificateRoundTrip --- PASS: TestCertificateRoundTrip (0.00s) === RUN TestIssueCert === RUN TestIssueCert/ca === RUN TestIssueCert/client === RUN TestIssueCert/clientOneYear === RUN TestIssueCert/#00 === RUN TestIssueCert/server --- PASS: TestIssueCert (0.88s) --- PASS: TestIssueCert/ca (0.25s) --- PASS: TestIssueCert/client (0.22s) --- PASS: TestIssueCert/clientOneYear (0.41s) --- PASS: TestIssueCert/#00 (0.00s) --- PASS: TestIssueCert/server (0.00s) === RUN TestPrivateKeyRoundTripRSA === RUN TestPrivateKeyRoundTripRSA/rsa === RUN TestPrivateKeyRoundTripRSA/ecdsa --- PASS: TestPrivateKeyRoundTripRSA (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/rsa (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/ecdsa (0.00s) === RUN Test_AWSFingerprint_RsaKey1 --- PASS: Test_AWSFingerprint_RsaKey1 (0.00s) === RUN Test_AWSFingerprint_RsaKeyEncrypted --- PASS: Test_AWSFingerprint_RsaKeyEncrypted (0.00s) === RUN Test_AWSFingerprint_Ed25519Key --- PASS: Test_AWSFingerprint_Ed25519Key (0.00s) === RUN Test_AWSFingerprint_TrickyWhitespace --- PASS: Test_AWSFingerprint_TrickyWhitespace (0.00s) === RUN Test_AWSFingerprint_DsaKey --- PASS: Test_AWSFingerprint_DsaKey (0.00s) === RUN Test_OpenSSHFingerprint_RsaKey1 --- PASS: Test_OpenSSHFingerprint_RsaKey1 (0.00s) PASS ok k8s.io/kops/pkg/pki 0.890s === RUN TestLongDesc --- PASS: TestLongDesc (0.00s) PASS ok k8s.io/kops/pkg/pretty 0.003s === RUN TestAddUntaggedRouteTables I0217 08:35:59.670487 11589 routetable.go:53] DescribeRouteTables: { } W0217 08:35:59.670590 11589 tags.go:67] cluster tag not found on route-table:rtb-1234 I0217 08:35:59.670600 11589 aws.go:230] Skipping route table in VPC, but with wrong cluster tag ("other.example.com") --- PASS: TestAddUntaggedRouteTables (0.00s) === RUN TestListIAMInstanceProfiles I0217 08:35:59.670723 11589 iaminstanceprofile.go:193] ListInstanceProfiles: { } W0217 08:35:59.670792 11589 aws.go:2076] could not find instance profile "__no_entity__.me.example.com". Resource may already have been deleted: NoSuchEntity: No such entity --- PASS: TestListIAMInstanceProfiles (0.00s) === RUN TestListIAMRoles I0217 08:35:59.670859 11589 iamrole.go:89] ListRoles: { } --- PASS: TestListIAMRoles (0.00s) === RUN TestListRouteTables I0217 08:35:59.670936 11589 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["me.example.com"] }] } I0217 08:35:59.670997 11589 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/me.example.com"] }] } --- PASS: TestListRouteTables (0.00s) === RUN TestSharedVolume I0217 08:35:59.671070 11589 volumes.go:33] CreateVolume: { TagSpecifications: [{ ResourceType: "volume", Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "shared" }] }] } I0217 08:35:59.671156 11589 volumes.go:33] CreateVolume: { TagSpecifications: [{ Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "owned" }] }] } I0217 08:35:59.671184 11589 volumes.go:128] DescribeVolumes: { } W0217 08:35:59.671204 11589 aws.go:2229] (new) cluster tag not found on volume:vol-2 aws_test.go:334: 2 --- PASS: TestSharedVolume (0.00s) === RUN TestMatchesElbTags --- PASS: TestMatchesElbTags (0.00s) === RUN TestListVPCs I0217 08:35:59.671341 11589 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:35:59.671502 11589 internetgateways.go:66] CreateInternetGateway: { } I0217 08:35:59.671532 11589 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:35:59.671588 11589 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:35:59.671619 11589 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:35:59.671680 11589 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:35:59.671717 11589 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:35:59.671733 11589 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:35:59.671766 11589 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:35:59.671796 11589 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:35:59.671816 11589 tags.go:42] CreateTags { Resources: ["vpc-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "legacy.example.com" }] } I0217 08:35:59.671846 11589 tags.go:42] CreateTags { Resources: ["vpc-shared"], Tags: [{ Key: "kubernetes.io/cluster/shared.example.com", Value: "shared" }] } I0217 08:35:59.671867 11589 tags.go:42] CreateTags { Resources: ["vpc-shared-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "shared-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/shared-with-legacy.example.com", Value: "shared" }] } I0217 08:35:59.671898 11589 tags.go:42] CreateTags { Resources: ["vpc-owned"], Tags: [{ Key: "kubernetes.io/cluster/owned.example.com", Value: "owned" }] } I0217 08:35:59.671920 11589 tags.go:42] CreateTags { Resources: ["vpc-owned-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "owned-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/owned-with-legacy.example.com", Value: "owned" }] } I0217 08:35:59.671952 11589 tags.go:42] CreateTags { Resources: ["vpc-other"], Tags: [{ Key: "KubernetesCluster", Value: "other.example.com" },{ Key: "kubernetes.io/cluster/other.example.com", Value: "shared" }] } I0217 08:35:59.671988 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["mismatch.example.com"] }] } I0217 08:35:59.672040 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/mismatch.example.com"] }] } I0217 08:35:59.672068 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["legacy.example.com"] }] } I0217 08:35:59.672092 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/legacy.example.com"] }] } I0217 08:35:59.672116 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared-with-legacy.example.com"] }] } I0217 08:35:59.672139 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared-with-legacy.example.com"] }] } I0217 08:35:59.672164 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared.example.com"] }] } I0217 08:35:59.672184 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared.example.com"] }] } I0217 08:35:59.672208 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned-with-legacy.example.com"] }] } I0217 08:35:59.672229 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned-with-legacy.example.com"] }] } I0217 08:35:59.672253 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned.example.com"] }] } I0217 08:35:59.672272 11589 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned.example.com"] }] } --- PASS: TestListVPCs (0.00s) PASS ok k8s.io/kops/pkg/resources/aws 0.070s === RUN TestListResourcesAzure --- PASS: TestListResourcesAzure (0.00s) === RUN TestIsOwnedByCluster === RUN TestIsOwnedByCluster/test_case_0 === RUN TestIsOwnedByCluster/test_case_1 === RUN TestIsOwnedByCluster/test_case_2 === RUN TestIsOwnedByCluster/test_case_3 --- PASS: TestIsOwnedByCluster (0.00s) --- PASS: TestIsOwnedByCluster/test_case_0 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_1 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_2 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/resources/azure 0.028s === RUN TestNameMatch --- PASS: TestNameMatch (0.00s) === RUN TestMatchesClusterNameWithUUID --- PASS: TestMatchesClusterNameWithUUID (0.00s) PASS ok k8s.io/kops/pkg/resources/gce 0.068s === RUN TestEscapeCommand --- PASS: TestEscapeCommand (0.00s) === RUN TestRawManifest --- PASS: TestRawManifest (0.00s) === RUN TestRawMixedManifest --- PASS: TestRawMixedManifest (0.00s) === RUN TestKeyPairOnlyManifest --- PASS: TestKeyPairOnlyManifest (0.00s) === RUN TestUnitFileExtensionValid === RUN TestUnitFileExtensionValid/valid_extension:_.automount === RUN TestUnitFileExtensionValid/valid_extension:_.device === RUN TestUnitFileExtensionValid/valid_extension:_.mount === RUN TestUnitFileExtensionValid/valid_extension:_.path === RUN TestUnitFileExtensionValid/valid_extension:_.scope === RUN TestUnitFileExtensionValid/valid_extension:_.service === RUN TestUnitFileExtensionValid/valid_extension:_.slice === RUN TestUnitFileExtensionValid/valid_extension:_.socket === RUN TestUnitFileExtensionValid/valid_extension:_.swap === RUN TestUnitFileExtensionValid/valid_extension:_.target === RUN TestUnitFileExtensionValid/valid_extension:_.timer === RUN TestUnitFileExtensionValid/invalid_extension:_(no_extension) === RUN TestUnitFileExtensionValid/invalid_extension:_.not-valid --- PASS: TestUnitFileExtensionValid (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.automount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.device (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.mount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.path (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.scope (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.service (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.slice (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.socket (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.swap (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.target (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.timer (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_(no_extension) (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_.not-valid (0.00s) PASS ok k8s.io/kops/pkg/systemd 0.004s === RUN TestTruncateString === RUN TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false --- PASS: TestTruncateString (0.00s) --- PASS: TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false (0.00s) PASS ok k8s.io/kops/pkg/truncate 0.004s === RUN TestJoin --- PASS: TestJoin (0.00s) PASS ok k8s.io/kops/pkg/urls 0.005s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) PASS ok k8s.io/kops/pkg/util/stringorslice 0.005s === RUN Test_Overlap --- PASS: Test_Overlap (0.00s) === RUN Test_BelongsTo --- PASS: Test_BelongsTo (0.00s) === RUN Test_SplitInto8 --- PASS: Test_SplitInto8 (0.00s) PASS ok k8s.io/kops/pkg/util/subnet 0.005s === RUN TestRenderGeneralOK --- PASS: TestRenderGeneralOK (0.01s) === RUN TestRenderMissingValue --- PASS: TestRenderMissingValue (0.00s) === RUN TestRenderIndent --- PASS: TestRenderIndent (0.00s) === RUN TestRenderChannelFunctions --- PASS: TestRenderChannelFunctions (0.00s) === RUN TestRenderSnippet --- PASS: TestRenderSnippet (0.00s) === RUN TestRenderContext --- PASS: TestRenderContext (0.00s) === RUN TestAllowForMissingVars --- PASS: TestAllowForMissingVars (0.00s) === RUN TestRenderIntegration --- PASS: TestRenderIntegration (0.00s) PASS ok k8s.io/kops/pkg/util/templater 0.046s === RUN Test_ValidateCloudGroupMissing --- PASS: Test_ValidateCloudGroupMissing (0.00s) === RUN Test_ValidateNodesNotEnough --- PASS: Test_ValidateNodesNotEnough (0.00s) === RUN Test_ValidateDetachedNodesDontCount --- PASS: Test_ValidateDetachedNodesDontCount (0.00s) === RUN Test_ValidateNodeNotReady --- PASS: Test_ValidateNodeNotReady (0.00s) === RUN Test_ValidateMastersNotEnough --- PASS: Test_ValidateMastersNotEnough (0.00s) === RUN Test_ValidateMasterNotReady --- PASS: Test_ValidateMasterNotReady (0.00s) === RUN Test_ValidateMasterStaticPods --- PASS: Test_ValidateMasterStaticPods (0.00s) === RUN Test_ValidateNoPodFailures --- PASS: Test_ValidateNoPodFailures (0.00s) === RUN Test_ValidatePodFailure === RUN Test_ValidatePodFailure/pending-node-kube-system === RUN Test_ValidatePodFailure/pending-node-kube-system#01 === RUN Test_ValidatePodFailure/pending-node-kube-system#02 === RUN Test_ValidatePodFailure/pending-node-otherNamespace === RUN Test_ValidatePodFailure/pending-node-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-node-otherNamespace#02 === RUN Test_ValidatePodFailure/pending-cluster-kube-system === RUN Test_ValidatePodFailure/pending-cluster-kube-system#01 === RUN Test_ValidatePodFailure/pending-cluster-kube-system#02 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-node-kube-system === RUN Test_ValidatePodFailure/notready-node-kube-system#01 === RUN Test_ValidatePodFailure/notready-node-kube-system#02 === RUN Test_ValidatePodFailure/notready-node-otherNamespace === RUN Test_ValidatePodFailure/notready-node-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-node-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-cluster-kube-system === RUN Test_ValidatePodFailure/notready-cluster-kube-system#01 === RUN Test_ValidatePodFailure/notready-cluster-kube-system#02 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-node-kube-system === RUN Test_ValidatePodFailure/unknown-node-kube-system#01 === RUN Test_ValidatePodFailure/unknown-node-kube-system#02 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#01 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#02 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 --- PASS: Test_ValidatePodFailure (0.01s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 (0.00s) === RUN Test_ValidateBastionNodes === RUN Test_ValidateBastionNodes/instancegroup's_nodes_not_ready === RUN Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready --- PASS: Test_ValidateBastionNodes (0.00s) --- PASS: Test_ValidateBastionNodes/instancegroup's_nodes_not_ready (0.00s) --- PASS: Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready (0.00s) === RUN Test_ValidateDetachedNodesNotValidated --- PASS: Test_ValidateDetachedNodesNotValidated (0.00s) PASS ok k8s.io/kops/pkg/validation 0.083s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetInternalIP --- PASS: TestGetInternalIP (0.00s) === RUN TestGetSeeds --- PASS: TestGetSeeds (0.00s) PASS ok k8s.io/kops/protokube/pkg/gossip/azure 0.005s === RUN TestRemovesDuplicateGuardedBlocks W0217 08:35:59.624555 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.624629 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.624637 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.624644 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.624649 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.624654 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.624660 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.624665 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.624671 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.624676 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.624682 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.624687 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.624693 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.624698 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.624703 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.624709 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.642309 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.642344 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.642419 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.642431 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.642493 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.642505 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.642567 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.642577 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.642635 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.642646 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.642717 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.642732 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.642797 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.642807 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.642883 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.642892 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.642951 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.642966 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643024 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643034 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643091 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643101 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643172 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643183 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643258 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643269 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643326 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643336 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643393 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643403 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643461 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643475 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643532 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643549 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643610 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643619 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643694 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643704 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643804 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643810 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643845 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643850 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643909 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643918 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.643987 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.643995 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644048 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644056 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644108 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644116 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644169 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644193 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644255 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644266 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644320 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644331 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644388 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644399 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644451 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644460 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644515 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644523 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644572 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644579 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644616 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644622 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644656 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644663 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644700 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644711 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644763 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644772 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644832 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644842 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644901 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644909 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.644953 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.644965 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645002 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645007 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645066 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645073 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645126 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645132 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645181 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645191 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645244 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645255 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645308 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645318 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645383 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645393 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645447 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645456 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645509 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645518 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645572 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.645581 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.645630 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646281 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646353 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646371 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646427 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646436 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646487 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646496 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646549 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646558 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646609 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646623 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646687 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646697 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646748 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646756 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646806 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646815 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646869 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646879 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646929 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646938 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.646989 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.646997 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647048 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647058 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647126 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647135 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647187 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647195 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647243 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647252 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647313 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647323 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647377 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647385 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647433 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647441 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647496 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647505 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647554 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647562 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647608 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647616 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647665 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647687 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647749 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647757 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647807 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647815 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647866 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647875 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647934 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.647941 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.647996 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648004 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648056 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648064 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648113 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648121 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648174 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648182 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648230 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648238 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648286 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648295 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648343 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648353 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648426 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648436 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648500 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648510 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648563 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648573 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648624 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648632 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648682 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648690 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648739 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648748 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648798 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648807 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648863 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648874 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648939 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.648949 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.648999 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.649008 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.649058 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.649067 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.649118 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.649128 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.649193 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.649201 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.649252 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.649260 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.649314 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.649323 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.649375 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.649383 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRemovesDuplicateGuardedBlocks (0.03s) === RUN TestRecoversFromBadNesting W0217 08:35:59.649979 11715 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0217 08:35:59.649990 11715 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0217 08:35:59.649996 11715 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0217 08:35:59.650001 11715 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0217 08:35:59.650007 11715 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0217 08:35:59.650012 11715 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0217 08:35:59.650016 11715 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0217 08:35:59.650037 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650049 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650055 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.650061 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650067 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.650072 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650078 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.650083 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650089 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.650094 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650099 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650105 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650110 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650115 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.650120 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.650126 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.664586 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.664615 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.664685 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.664696 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.664748 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.664757 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.664812 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.664824 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.664914 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.664925 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.664981 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.664991 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665049 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665060 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665117 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665128 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665184 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665197 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665256 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665266 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665321 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665334 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665394 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665404 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665473 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665484 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665539 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665549 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665603 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665612 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665666 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665676 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665740 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665750 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665807 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665816 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665869 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665878 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.665936 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.665946 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666001 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666013 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666069 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666079 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666140 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666150 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666192 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666198 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666257 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666264 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666302 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666307 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666349 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666358 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666400 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666406 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666451 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666457 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666490 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666495 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666527 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666532 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666563 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666568 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666600 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666605 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666636 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666642 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666673 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666680 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666712 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666717 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666749 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666754 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666787 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666793 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666828 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666834 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666875 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666882 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666919 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666923 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.666968 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.666973 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667013 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667018 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667052 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667056 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667097 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667105 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667144 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667148 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667180 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667184 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667216 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667221 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667253 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667258 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667302 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667307 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667340 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667345 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667381 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667390 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667442 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667451 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667516 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667529 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667587 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667594 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667629 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667635 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667677 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667685 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667720 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667726 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667757 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667763 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667795 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667800 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667832 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667837 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667868 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667873 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667904 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667909 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667943 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667948 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.667989 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.667995 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668026 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668032 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668062 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668067 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668100 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668105 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668140 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668148 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668184 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668189 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668221 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668226 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668260 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668267 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668313 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668319 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668352 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668358 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668396 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668404 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668458 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668466 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668516 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668526 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668586 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668594 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668643 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668652 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668702 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668710 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668760 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668768 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668819 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668827 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668874 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668883 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668935 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.668943 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.668992 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669000 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669049 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669057 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669110 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669120 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669174 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669183 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669239 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669245 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669287 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669293 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669341 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669350 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669412 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669422 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669477 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669486 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669543 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669552 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669636 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669653 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669715 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669722 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669763 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669769 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669807 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669822 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0217 08:35:59.669873 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0217 08:35:59.669881 11715 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRecoversFromBadNesting (0.02s) PASS ok k8s.io/kops/protokube/pkg/gossip/dns/hosts 0.050s === RUN TestSerializeEmptyCluster --- PASS: TestSerializeEmptyCluster (0.01s) PASS ok k8s.io/kops/tests/codecs 0.028s === RUN TestKopsUpgrades --- PASS: TestKopsUpgrades (0.01s) === RUN TestKubernetesUpgrades --- PASS: TestKubernetesUpgrades (0.00s) === RUN TestFindImage --- PASS: TestFindImage (0.00s) === RUN TestRecommendedKubernetesVersion --- PASS: TestRecommendedKubernetesVersion (0.00s) === RUN TestOrdering --- PASS: TestOrdering (0.00s) === RUN TestChannelsSelfConsistent --- PASS: TestChannelsSelfConsistent (0.01s) === RUN TestChannelImages === RUN TestChannelImages/stable-channel === RUN TestChannelImages/alpha-channel --- PASS: TestChannelImages (0.00s) --- PASS: TestChannelImages/stable-channel (0.00s) --- PASS: TestChannelImages/alpha-channel (0.00s) PASS ok k8s.io/kops/tests/integration/channel 0.049s === RUN TestConversionMinimal === RUN TestConversionMinimal/legacy-v1alpha2-v1alpha2 --- PASS: TestConversionMinimal (0.01s) --- PASS: TestConversionMinimal/legacy-v1alpha2-v1alpha2 (0.01s) PASS ok k8s.io/kops/tests/integration/conversion 0.028s === RUN Test_tryResourceAsString --- PASS: Test_tryResourceAsString (0.00s) === RUN Test_DryrunTarget_PrintReport --- PASS: Test_DryrunTarget_PrintReport (0.00s) === RUN TestWriteFile I0217 08:36:02.067675 13825 files.go:57] Writing file "/tmp/TestWriteFile3787962288/001/SubDir/test1.tmp" I0217 08:36:02.067779 13825 files.go:113] Changing file mode for "/tmp/TestWriteFile3787962288/001/SubDir/test1.tmp" to -rw-r--r-- --- PASS: TestWriteFile (0.00s) === RUN TestBigInt_Format --- PASS: TestBigInt_Format (0.00s) === RUN TestVFSCAStoreRoundTrip --- PASS: TestVFSCAStoreRoundTrip (0.00s) === RUN TestAddItem === RUN TestAddItem/first_primary === RUN TestAddItem/first_secondary === RUN TestAddItem/firstBigSerial_primary === RUN TestAddItem/firstBigSerial_secondary === RUN TestAddItem/after_primary === RUN TestAddItem/after_secondary === RUN TestAddItem/bigSerialAfter_primary === RUN TestAddItem/bigSerialAfter_secondary === RUN TestAddItem/before_primary === RUN TestAddItem/before_secondary === RUN TestAddItem/first_certonly_primary === RUN TestAddItem/first_certonly_secondary === RUN TestAddItem/after_certonly_primary === RUN TestAddItem/after_certonly_secondary === RUN TestAddItem/before_certonly_primary === RUN TestAddItem/before_certonly_secondary --- PASS: TestAddItem (0.00s) --- PASS: TestAddItem/first_primary (0.00s) --- PASS: TestAddItem/first_secondary (0.00s) --- PASS: TestAddItem/firstBigSerial_primary (0.00s) --- PASS: TestAddItem/firstBigSerial_secondary (0.00s) --- PASS: TestAddItem/after_primary (0.00s) --- PASS: TestAddItem/after_secondary (0.00s) --- PASS: TestAddItem/bigSerialAfter_primary (0.00s) --- PASS: TestAddItem/bigSerialAfter_secondary (0.00s) --- PASS: TestAddItem/before_primary (0.00s) --- PASS: TestAddItem/before_secondary (0.00s) --- PASS: TestAddItem/first_certonly_primary (0.00s) --- PASS: TestAddItem/first_certonly_secondary (0.00s) --- PASS: TestAddItem/after_certonly_primary (0.00s) --- PASS: TestAddItem/after_certonly_secondary (0.00s) --- PASS: TestAddItem/before_certonly_primary (0.00s) --- PASS: TestAddItem/before_certonly_secondary (0.00s) PASS ok k8s.io/kops/upup/pkg/fi 0.024s === RUN TestBootstrapChannelBuilder_BuildTasks I0217 08:36:06.303274 14205 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:06.303458 14205 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:06.303493 14205 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:06.303519 14205 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:06.303539 14205 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:06.303579 14205 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:06.303608 14205 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:06.303618 14205 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:06.303648 14205 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:06.303670 14205 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:06.309944 14205 zones.go:93] ListHostedZonesPages { } I0217 08:36:06.368117 14205 zones.go:93] ListHostedZonesPages { } I0217 08:36:06.437611 14205 zones.go:93] ListHostedZonesPages { } I0217 08:36:06.497027 14205 zones.go:93] ListHostedZonesPages { } I0217 08:36:06.560219 14205 zones.go:93] ListHostedZonesPages { } I0217 08:36:06.621162 14205 zones.go:93] ListHostedZonesPages { } I0217 08:36:06.697801 14205 zones.go:93] ListHostedZonesPages { } I0217 08:36:06.788260 14205 zones.go:93] ListHostedZonesPages { } I0217 08:36:07.079800 14205 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_BuildTasks (0.89s) === RUN TestBootstrapChannelBuilder_ServiceAccountIAM I0217 08:36:07.197232 14205 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:07.197429 14205 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:07.197479 14205 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:07.197516 14205 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:07.197541 14205 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:07.197586 14205 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:07.197619 14205 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:07.197637 14205 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:07.197662 14205 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:07.197680 14205 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:07.197699 14205 featureflag.go:167] Unknown FeatureFlag "+UseServiceAccountExternalPermissions" I0217 08:36:07.198848 14205 zones.go:93] ListHostedZonesPages { } I0217 08:36:07.366697 14205 featureflag.go:167] Unknown FeatureFlag "-UseServiceAccountExternalPermissions" --- PASS: TestBootstrapChannelBuilder_ServiceAccountIAM (0.17s) === RUN TestBootstrapChannelBuilder_AWSCloudController I0217 08:36:07.366931 14205 featureflag.go:164] FeatureFlag "ImageDigest"=false I0217 08:36:07.367124 14205 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:07.367184 14205 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0217 08:36:07.367226 14205 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0217 08:36:07.367256 14205 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0217 08:36:07.367319 14205 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0217 08:36:07.367354 14205 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0217 08:36:07.367376 14205 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0217 08:36:07.367408 14205 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0217 08:36:07.367431 14205 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0217 08:36:07.368906 14205 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_AWSCloudController (0.13s) === RUN TestContainerdVersionUrl === RUN TestContainerdVersionUrl/1.4.1- === RUN TestContainerdVersionUrl/1.4.1-arm === RUN TestContainerdVersionUrl/-amd64 === RUN TestContainerdVersionUrl/-arm64 === RUN TestContainerdVersionUrl/1.1.1-amd64 === RUN TestContainerdVersionUrl/1.1.1-arm64 === RUN TestContainerdVersionUrl/1.6.5-amd64 === RUN TestContainerdVersionUrl/1.5.5-arm64 --- PASS: TestContainerdVersionUrl (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1- (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-arm (0.00s) --- PASS: TestContainerdVersionUrl/-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.6.5-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.5.5-arm64 (0.00s) === RUN TestDeepValidate_OK --- PASS: TestDeepValidate_OK (0.00s) === RUN TestDeepValidate_NoNodeZones --- PASS: TestDeepValidate_NoNodeZones (0.00s) === RUN TestDeepValidate_NoMasterZones --- PASS: TestDeepValidate_NoMasterZones (0.00s) === RUN TestDeepValidate_BadZone deepvalidate_test.go:58: Zone validation not checked by DeepValidate --- SKIP: TestDeepValidate_BadZone (0.00s) === RUN TestDeepValidate_MixedRegion deepvalidate_test.go:70: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_MixedRegion (0.00s) === RUN TestDeepValidate_RegionAsZone deepvalidate_test.go:84: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_RegionAsZone (0.00s) === RUN TestDeepValidate_NotIncludedZone --- PASS: TestDeepValidate_NotIncludedZone (0.00s) === RUN TestDeepValidate_DuplicateZones --- PASS: TestDeepValidate_DuplicateZones (0.00s) === RUN TestDeepValidate_ExtraMasterZone --- PASS: TestDeepValidate_ExtraMasterZone (0.00s) === RUN TestDeepValidate_EvenEtcdClusterSize --- PASS: TestDeepValidate_EvenEtcdClusterSize (0.00s) === RUN TestDeepValidate_MissingEtcdMember --- PASS: TestDeepValidate_MissingEtcdMember (0.00s) === RUN TestPopulateClusterSpec_Proxy --- PASS: TestPopulateClusterSpec_Proxy (0.00s) === RUN TestPrecreateDNSNames --- PASS: TestPrecreateDNSNames (0.00s) === RUN TestDockerVersionUrlHash === RUN TestDockerVersionUrlHash/19.03.13-amd64 === RUN TestDockerVersionUrlHash/19.03.13-arm64 === RUN TestDockerVersionUrlHash/18.06.3-amd64 === RUN TestDockerVersionUrlHash/18.06.3-arm64 === RUN TestDockerVersionUrlHash/17.03.1-amd64 === RUN TestDockerVersionUrlHash/17.03.1-arm64 --- PASS: TestDockerVersionUrlHash (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-arm64 (0.00s) === RUN TestDockerVersionUrl === RUN TestDockerVersionUrl/19.03.13- === RUN TestDockerVersionUrl/19.03.13-arm === RUN TestDockerVersionUrl/-amd64 === RUN TestDockerVersionUrl/-arm64 === RUN TestDockerVersionUrl/18.06.3-amd64 === RUN TestDockerVersionUrl/18.06.3-arm64 === RUN TestDockerVersionUrl/19.03.13-amd64 === RUN TestDockerVersionUrl/19.03.13-arm64 --- PASS: TestDockerVersionUrl (0.00s) --- PASS: TestDockerVersionUrl/19.03.13- (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm (0.00s) --- PASS: TestDockerVersionUrl/-amd64 (0.00s) --- PASS: TestDockerVersionUrl/-arm64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm64 (0.00s) === RUN TestDockerVersionHash === RUN TestDockerVersionHash/19.03.13- === RUN TestDockerVersionHash/19.03.13-arm === RUN TestDockerVersionHash/-amd64 === RUN TestDockerVersionHash/-arm64 === RUN TestDockerVersionHash/1.1.1-amd64 === RUN TestDockerVersionHash/1.1.1-arm64 === RUN TestDockerVersionHash/19.03.13-amd64 === RUN TestDockerVersionHash/19.03.13-arm64 --- PASS: TestDockerVersionHash (0.00s) --- PASS: TestDockerVersionHash/19.03.13- (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm (0.00s) --- PASS: TestDockerVersionHash/-amd64 (0.00s) --- PASS: TestDockerVersionHash/-arm64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-amd64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-arm64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm64 (0.00s) === RUN TestDockerVersionsHashesAmd64 docker_test.go:245: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesAmd64 (0.00s) === RUN TestDockerVersionsHashesArm64 docker_test.go:260: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesArm64 (0.00s) === RUN Test_FindCNIAssetFromEnvironmentVariable --- PASS: Test_FindCNIAssetFromEnvironmentVariable (0.00s) === RUN Test_FindCNIAssetFromDefaults122 --- PASS: Test_FindCNIAssetFromDefaults122 (0.22s) === RUN TestRemoveSharedPrefix --- PASS: TestRemoveSharedPrefix (0.00s) === RUN TestCreateEtcdCluster --- PASS: TestCreateEtcdCluster (0.00s) === RUN TestSetupNetworking W0217 08:36:07.740739 14205 new_cluster.go:1152] flannel UDP mode is not recommended; consider flannel-vxlan instead --- PASS: TestSetupNetworking (0.00s) === RUN TestDefaultImage --- PASS: TestDefaultImage (0.00s) === RUN TestPopulateCluster_Default_NoError --- PASS: TestPopulateCluster_Default_NoError (0.00s) === RUN TestPopulateCluster_Subnets === RUN TestPopulateCluster_Subnets/100.64.0.0/10 === RUN TestPopulateCluster_Subnets/10.0.0.0/9 === RUN TestPopulateCluster_Subnets/10.0.0.0/8 === RUN TestPopulateCluster_Subnets/::/0 --- PASS: TestPopulateCluster_Subnets (0.01s) --- PASS: TestPopulateCluster_Subnets/100.64.0.0/10 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/9 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/8 (0.00s) --- PASS: TestPopulateCluster_Subnets/::/0 (0.00s) === RUN TestPopulateCluster_Docker_Spec --- PASS: TestPopulateCluster_Docker_Spec (0.00s) === RUN TestPopulateCluster_StorageDefault --- PASS: TestPopulateCluster_StorageDefault (0.00s) === RUN TestPopulateCluster_EvictionHard --- PASS: TestPopulateCluster_EvictionHard (0.00s) === RUN TestPopulateCluster_Custom_CIDR --- PASS: TestPopulateCluster_Custom_CIDR (0.00s) === RUN TestPopulateCluster_IsolateMasters --- PASS: TestPopulateCluster_IsolateMasters (0.00s) === RUN TestPopulateCluster_IsolateMastersFalse --- PASS: TestPopulateCluster_IsolateMastersFalse (0.00s) === RUN TestPopulateCluster_Name_Required --- PASS: TestPopulateCluster_Name_Required (0.00s) === RUN TestPopulateCluster_Zone_Required --- PASS: TestPopulateCluster_Zone_Required (0.00s) === RUN TestPopulateCluster_NetworkCIDR_Required --- PASS: TestPopulateCluster_NetworkCIDR_Required (0.00s) === RUN TestPopulateCluster_NonMasqueradeCIDR_Required --- PASS: TestPopulateCluster_NonMasqueradeCIDR_Required (0.00s) === RUN TestPopulateCluster_CloudProvider_Required --- PASS: TestPopulateCluster_CloudProvider_Required (0.00s) === RUN TestPopulateCluster_APIServerCount --- PASS: TestPopulateCluster_APIServerCount (0.00s) === RUN TestPopulateCluster_AnonymousAuth --- PASS: TestPopulateCluster_AnonymousAuth (0.00s) === RUN TestPopulateCluster_DockerVersion --- PASS: TestPopulateCluster_DockerVersion (0.00s) === RUN TestPopulateCluster_KubeController_High_Enough_Version --- PASS: TestPopulateCluster_KubeController_High_Enough_Version (0.00s) === RUN TestPopulateInstanceGroup_Name_Required --- PASS: TestPopulateInstanceGroup_Name_Required (0.00s) === RUN TestPopulateInstanceGroup_Role_Required --- PASS: TestPopulateInstanceGroup_Role_Required (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision --- PASS: TestPopulateInstanceGroup_AddTaintsCollision (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision3 --- PASS: TestPopulateInstanceGroup_AddTaintsCollision3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard --- PASS: TestPopulateInstanceGroup_EvictionHard (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard3 --- PASS: TestPopulateInstanceGroup_EvictionHard3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard4 --- PASS: TestPopulateInstanceGroup_EvictionHard4 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard2 --- PASS: TestPopulateInstanceGroup_EvictionHard2 (0.00s) === RUN TestPopulateInstanceGroup_AddTaints --- PASS: TestPopulateInstanceGroup_AddTaints (0.00s) === RUN TestMachineArchitecture === RUN TestMachineArchitecture/t2.micro-amd64 === RUN TestMachineArchitecture/t3.micro-amd64 === RUN TestMachineArchitecture/a1.large-arm64 --- PASS: TestMachineArchitecture (0.00s) --- PASS: TestMachineArchitecture/t2.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/t3.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/a1.large-arm64 (0.00s) === RUN TestRuncVersionUrlHash === RUN TestRuncVersionUrlHash/1.100.0-amd64 === RUN TestRuncVersionUrlHash/1.100.0-arm64 === RUN TestRuncVersionUrlHash/1.1.0-amd64 === RUN TestRuncVersionUrlHash/1.1.0-arm64 --- PASS: TestRuncVersionUrlHash (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionUrl === RUN TestRuncVersionUrl/1.1.0- === RUN TestRuncVersionUrl/1.1.0-arm === RUN TestRuncVersionUrl/-amd64 === RUN TestRuncVersionUrl/-arm64 === RUN TestRuncVersionUrl/1.0.0-amd64 === RUN TestRuncVersionUrl/1.0.0-arm64 === RUN TestRuncVersionUrl/1.1.0-amd64 === RUN TestRuncVersionUrl/1.1.0-arm64 --- PASS: TestRuncVersionUrl (0.00s) --- PASS: TestRuncVersionUrl/1.1.0- (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm (0.00s) --- PASS: TestRuncVersionUrl/-amd64 (0.00s) --- PASS: TestRuncVersionUrl/-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm64 (0.00s) === RUN TestRuncVersionHash === RUN TestRuncVersionHash/1.1.0- === RUN TestRuncVersionHash/1.1.0-arm === RUN TestRuncVersionHash/-amd64 === RUN TestRuncVersionHash/-arm64 === RUN TestRuncVersionHash/1.0.0-amd64 === RUN TestRuncVersionHash/1.0.0-arm64 === RUN TestRuncVersionHash/1.100.0-amd64 === RUN TestRuncVersionHash/1.100.0-arm64 === RUN TestRuncVersionHash/1.1.0-amd64 === RUN TestRuncVersionHash/1.1.0-arm64 --- PASS: TestRuncVersionHash (0.00s) --- PASS: TestRuncVersionHash/1.1.0- (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm (0.00s) --- PASS: TestRuncVersionHash/-amd64 (0.00s) --- PASS: TestRuncVersionHash/-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionsHashesAmd64 runc_test.go:240: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesAmd64 (0.00s) === RUN TestRuncVersionsHashesArm64 runc_test.go:255: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesArm64 (0.00s) === RUN Test_AssignSubnets === RUN Test_AssignSubnets/test-1 === RUN Test_AssignSubnets/test-2 I0217 08:36:07.789467 14205 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-3 I0217 08:36:07.789551 14205 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet a I0217 08:36:07.789568 14205 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-4 I0217 08:36:07.789639 14205 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet b I0217 08:36:07.789656 14205 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-5 I0217 08:36:07.789731 14205 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-6 I0217 08:36:07.789803 14205 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-7 I0217 08:36:07.789878 14205 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0217 08:36:07.789898 14205 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-8 I0217 08:36:07.789968 14205 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0217 08:36:07.789988 14205 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-9 === RUN Test_AssignSubnets/test-10 I0217 08:36:07.790103 14205 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-11 === RUN Test_AssignSubnets/test-12 I0217 08:36:07.790221 14205 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-13 I0217 08:36:07.790298 14205 subnets.go:205] Assigned CIDR 10.0.0.0/14 to subnet a I0217 08:36:07.790312 14205 subnets.go:205] Assigned CIDR 10.4.0.0/14 to subnet b I0217 08:36:07.790326 14205 subnets.go:205] Assigned CIDR 10.8.0.0/14 to subnet c I0217 08:36:07.790346 14205 subnets.go:224] Assigned CIDR 10.32.0.0/11 to subnet a I0217 08:36:07.790358 14205 subnets.go:224] Assigned CIDR 10.64.0.0/11 to subnet b I0217 08:36:07.790373 14205 subnets.go:224] Assigned CIDR 10.96.0.0/11 to subnet b I0217 08:36:07.790384 14205 subnets.go:224] Assigned CIDR 10.128.0.0/11 to subnet c I0217 08:36:07.790397 14205 subnets.go:224] Assigned CIDR 10.160.0.0/11 to subnet c --- PASS: Test_AssignSubnets (0.00s) --- PASS: Test_AssignSubnets/test-1 (0.00s) --- PASS: Test_AssignSubnets/test-2 (0.00s) --- PASS: Test_AssignSubnets/test-3 (0.00s) --- PASS: Test_AssignSubnets/test-4 (0.00s) --- PASS: Test_AssignSubnets/test-5 (0.00s) --- PASS: Test_AssignSubnets/test-6 (0.00s) --- PASS: Test_AssignSubnets/test-7 (0.00s) --- PASS: Test_AssignSubnets/test-8 (0.00s) --- PASS: Test_AssignSubnets/test-9 (0.00s) --- PASS: Test_AssignSubnets/test-10 (0.00s) --- PASS: Test_AssignSubnets/test-11 (0.00s) --- PASS: Test_AssignSubnets/test-12 (0.00s) --- PASS: Test_AssignSubnets/test-13 (0.00s) === RUN Test_TemplateFunctions_CloudControllerConfigArgv === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller (0.00s) === RUN Test_KarpenterInstanceTypes I0217 08:36:07.791886 14205 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: Test_KarpenterInstanceTypes (0.00s) === RUN TestKopsFeatureEnabled === RUN TestKopsFeatureEnabled/Missing_feature === RUN TestKopsFeatureEnabled/Existing_feature I0217 08:36:07.792140 14205 featureflag.go:164] FeatureFlag "Scaleway"=true --- PASS: TestKopsFeatureEnabled (0.00s) --- PASS: TestKopsFeatureEnabled/Missing_feature (0.00s) --- PASS: TestKopsFeatureEnabled/Existing_feature (0.00s) === RUN Test_BuildMirroredAsset === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup --- PASS: Test_BuildMirroredAsset (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup (0.00s) === RUN TestValidateFull_Default_Validates --- PASS: TestValidateFull_Default_Validates (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_NoDot --- PASS: TestValidateFull_ClusterName_InvalidDNS_NoDot (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_Invalid --- PASS: TestValidateFull_ClusterName_InvalidDNS_Invalid (0.00s) === RUN TestValidateFull_ClusterName_Required --- PASS: TestValidateFull_ClusterName_Required (0.00s) === RUN TestValidateFull_UpdatePolicy_Valid === RUN TestValidateFull_UpdatePolicy_Valid/missing === RUN TestValidateFull_UpdatePolicy_Valid/automatic === RUN TestValidateFull_UpdatePolicy_Valid/external --- PASS: TestValidateFull_UpdatePolicy_Valid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/missing (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/automatic (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/external (0.00s) === RUN TestValidateFull_UpdatePolicy_Invalid === RUN TestValidateFull_UpdatePolicy_Invalid/empty === RUN TestValidateFull_UpdatePolicy_Invalid/populated --- PASS: TestValidateFull_UpdatePolicy_Invalid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/empty (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/populated (0.00s) === RUN Test_Validate_Kubenet_With_14 --- PASS: Test_Validate_Kubenet_With_14 (0.00s) === RUN TestValidate_ClusterName_Import --- PASS: TestValidate_ClusterName_Import (0.00s) === RUN TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity --- PASS: TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup 1.579s === RUN TestGetASGTagsToDelete --- PASS: TestGetASGTagsToDelete (0.00s) === RUN TestProcessCompare --- PASS: TestProcessCompare (0.00s) === RUN TestAutoscalingGroupTerraformRender I0217 08:36:06.297209 14206 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender3352577662/001 I0217 08:36:06.297586 14206 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender3352577662/001 I0217 08:36:06.297802 14206 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender3352577662/001 --- PASS: TestAutoscalingGroupTerraformRender (0.00s) === RUN TestTGsARNsChunks --- PASS: TestTGsARNsChunks (0.00s) === RUN TestGetEBSVolumeTagsToDelete --- PASS: TestGetEBSVolumeTagsToDelete (0.00s) === RUN TestSharedEgressOnlyInternetGatewayDoesNotRename I0217 08:36:06.300436 14206 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0217 08:36:06.300541 14206 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0217 08:36:06.300579 14206 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] }], VpcId: "vpc-1" } I0217 08:36:06.300692 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.300777 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.300823 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.300833 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.300979 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:36:06.301008 14206 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0217 08:36:06.301027 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.301070 14206 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0217 08:36:06.301127 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0217 08:36:06.301161 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.301183 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.301207 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.301214 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.301231 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.301258 14206 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0217 08:36:06.301286 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedEgressOnlyInternetGatewayDoesNotRename (0.00s) === RUN TestElasticIPCreate I0217 08:36:06.301367 14206 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0217 08:36:06.301398 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.301452 14206 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0217 08:36:06.301472 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:36:06.301490 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.301504 14206 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0217 08:36:06.301544 14206 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0217 08:36:06.301638 14206 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0217 08:36:06.301669 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:36:06.301683 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.301706 14206 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0217 08:36:06.301744 14206 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:36:06.301821 14206 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "eip1" }] }] } I0217 08:36:06.301854 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:36:06.301867 14206 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedElasticIp", Value: "192.0.2.1" },{ Key: "AssociatedElasticIpAllocationId", Value: "eipalloc-1" }] } I0217 08:36:06.301887 14206 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0217 08:36:06.301923 14206 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0217 08:36:06.301956 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.301994 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.302005 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.302029 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.302046 14206 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0217 08:36:06.302076 14206 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0217 08:36:06.302117 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.302132 14206 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0217 08:36:06.302153 14206 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:36:06.302179 14206 address.go:120] DescribeAddresses: { Filters: [{ Name: "public-ip", Values: ["192.0.2.1"] }] } I0217 08:36:06.302193 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0217 08:36:06.302212 14206 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestElasticIPCreate (0.00s) === RUN TestSharedInternetGatewayDoesNotRename I0217 08:36:06.302245 14206 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0217 08:36:06.302262 14206 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0217 08:36:06.302275 14206 internetgateways.go:66] CreateInternetGateway: { } I0217 08:36:06.302284 14206 tags.go:42] CreateTags { Resources: ["igw-1"], Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] } I0217 08:36:06.302313 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.302334 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.302364 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.302373 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.302417 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:36:06.302431 14206 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0217 08:36:06.302447 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.302482 14206 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0217 08:36:06.302524 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0217 08:36:06.302554 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.302574 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.302596 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.302604 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.302621 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.302640 14206 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0217 08:36:06.302668 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedInternetGatewayDoesNotRename (0.00s) === RUN TestLaunchTemplateTerraformRender I0217 08:36:06.303002 14206 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender2047652854/001 I0217 08:36:06.303204 14206 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender2047652854/001 --- PASS: TestLaunchTemplateTerraformRender (0.00s) === RUN TestParseRemovalRule --- PASS: TestParseRemovalRule (0.00s) === RUN TestPortRemovalRule --- PASS: TestPortRemovalRule (0.00s) === RUN TestPortRemovalRule_Zero --- PASS: TestPortRemovalRule_Zero (0.00s) === RUN TestSecurityGroupCreate I0217 08:36:06.303482 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.303509 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.303570 14206 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0217 08:36:06.303593 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:36:06.303604 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.303619 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.303661 14206 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0217 08:36:06.303776 14206 securitygroups.go:40] CreateSecurityGroup: { Description: "Description", GroupName: "sg1", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "sg1" }] }], VpcId: "vpc-1" } I0217 08:36:06.303800 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0217 08:36:06.303817 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0217 08:36:06.303855 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.303886 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.303911 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.303920 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.303934 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.303965 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.303989 14206 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0217 08:36:06.304028 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSecurityGroupCreate (0.00s) === RUN Test_Subnet_ValidateRequired --- PASS: Test_Subnet_ValidateRequired (0.00s) === RUN Test_Subnet_CannotChangeSubnet --- PASS: Test_Subnet_CannotChangeSubnet (0.00s) === RUN TestSubnetCreate I0217 08:36:06.304146 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.304168 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.304214 14206 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0217 08:36:06.304247 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:36:06.304259 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.304271 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.304293 14206 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0217 08:36:06.304342 14206 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0217 08:36:06.304364 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:36:06.304376 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.304389 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0217 08:36:06.304436 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.304458 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.304481 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.304489 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.304502 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.304514 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.304533 14206 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0217 08:36:06.304562 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.304574 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSubnetCreate (0.00s) === RUN TestSubnetCreateIPv6 I0217 08:36:06.304648 14206 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0217 08:36:06.304670 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.304723 14206 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0217 08:36:06.304744 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:36:06.304755 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.304768 14206 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0217 08:36:06.304792 14206 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0217 08:36:06.304842 14206 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0217 08:36:06.304848 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.304970 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:36:06.304987 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.305010 14206 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0217 08:36:06.305037 14206 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0217 08:36:06.305081 14206 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0217 08:36:06.305105 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.305130 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.305148 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.305162 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.305175 14206 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0217 08:36:06.305196 14206 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0217 08:36:06.305238 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.305249 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.305271 14206 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6 (0.00s) === RUN TestSubnetCreateIPv6NetNum I0217 08:36:06.305335 14206 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0217 08:36:06.305356 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.305399 14206 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0217 08:36:06.305418 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:36:06.305429 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.305441 14206 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0217 08:36:06.305463 14206 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0217 08:36:06.305560 14206 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0217 08:36:06.305559 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.305639 14206 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0217 08:36:06.305676 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:36:06.305703 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.305718 14206 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0217 08:36:06.305767 14206 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0217 08:36:06.306090 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.306117 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.306126 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.306140 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.306154 14206 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0217 08:36:06.306187 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.306218 14206 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0217 08:36:06.306268 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.306283 14206 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6NetNum (0.00s) === RUN TestSharedSubnetCreateDoesNotCreateNew I0217 08:36:06.306327 14206 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "ExistingVPC" }] }] } I0217 08:36:06.306359 14206 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "ExistingSubnet" }] }], VpcId: "vpc-1" } I0217 08:36:06.306414 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.306437 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.306476 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.306484 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.306518 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:36:06.306531 14206 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0217 08:36:06.306547 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.306567 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.306630 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0217 08:36:06.306645 14206 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0217 08:36:06.306661 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0217 08:36:06.306707 14206 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0217 08:36:06.306729 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.306749 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.306756 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.306772 14206 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0217 08:36:06.306790 14206 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0217 08:36:06.306818 14206 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedSubnetCreateDoesNotCreateNew (0.00s) === RUN TestVPCCreate I0217 08:36:06.306872 14206 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.306892 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.306943 14206 vpcs.go:89] CreateVpc: { CidrBlock: "172.21.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0217 08:36:06.306970 14206 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0217 08:36:06.306981 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.306997 14206 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0217 08:36:06.307018 14206 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.307039 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0217 08:36:06.307073 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.307080 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.307094 14206 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0217 08:36:06.307115 14206 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestVPCCreate (0.00s) === RUN Test4758 --- PASS: Test4758 (0.00s) === RUN TestSharedVPCAdditionalCIDR I0217 08:36:06.307194 14206 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "172.22.0.0/16", VpcId: "vpc-1" } I0217 08:36:06.307254 14206 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.307297 14206 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc-1"] }] } I0217 08:36:06.307333 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0217 08:36:06.307345 14206 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0217 08:36:06.307370 14206 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestSharedVPCAdditionalCIDR (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awstasks 0.066s === RUN TestValidateRegion --- PASS: TestValidateRegion (0.00s) === RUN TestFindRegion --- PASS: TestFindRegion (0.00s) === RUN TestEC2TagSpecification === RUN TestEC2TagSpecification/No_tags === RUN TestEC2TagSpecification/simple_tag --- PASS: TestEC2TagSpecification (0.00s) --- PASS: TestEC2TagSpecification/No_tags (0.00s) --- PASS: TestEC2TagSpecification/simple_tag (0.00s) === RUN Test_GetResourceName32 --- PASS: Test_GetResourceName32 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awsup 0.047s === RUN TestZoneToLocation === RUN TestZoneToLocation/test_case_0 === RUN TestZoneToLocation/test_case_1 === RUN TestZoneToLocation/test_case_2 --- PASS: TestZoneToLocation (0.00s) --- PASS: TestZoneToLocation/test_case_0 (0.00s) --- PASS: TestZoneToLocation/test_case_1 (0.00s) --- PASS: TestZoneToLocation/test_case_2 (0.00s) === RUN TestZoneToAvailabilityZoneNumber === RUN TestZoneToAvailabilityZoneNumber/test_case_0 === RUN TestZoneToAvailabilityZoneNumber/test_case_1 === RUN TestZoneToAvailabilityZoneNumber/test_case_2 --- PASS: TestZoneToAvailabilityZoneNumber (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_0 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_1 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_2 (0.00s) === RUN TestFindEtcdStatus --- PASS: TestFindEtcdStatus (0.00s) === RUN TestGetCloudGroups --- PASS: TestGetCloudGroups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azure 0.029s === RUN TestDiskRenderAzure I0217 08:36:06.271679 14209 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRenderAzure (0.00s) === RUN TestDiskFind --- PASS: TestDiskFind (0.00s) === RUN TestDiskRun I0217 08:36:06.272043 14209 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRun (0.00s) === RUN TestDiskCheckChanges === RUN TestDiskCheckChanges/test_case_0 === RUN TestDiskCheckChanges/test_case_1 === RUN TestDiskCheckChanges/test_case_2 === RUN TestDiskCheckChanges/test_case_3 --- PASS: TestDiskCheckChanges (0.00s) --- PASS: TestDiskCheckChanges/test_case_0 (0.00s) --- PASS: TestDiskCheckChanges/test_case_1 (0.00s) --- PASS: TestDiskCheckChanges/test_case_2 (0.00s) --- PASS: TestDiskCheckChanges/test_case_3 (0.00s) === RUN TestLoadBalancerRenderAzure I0217 08:36:06.272280 14209 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRenderAzure (0.00s) === RUN TestLoadBalancerFind loadbalancer_test.go:124: *azuretasks.LoadBalancer {"Name":"loadbalancer","Lifecycle":"","ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Subnet":{"Name":"subnet","Lifecycle":"","ID":null,"ResourceGroup":null,"VirtualNetwork":null,"NatGateway":null,"NetworkSecurityGroup":null,"CIDR":null,"Shared":null},"External":true,"Tags":null,"ForAPIServer":false} --- PASS: TestLoadBalancerFind (0.00s) === RUN TestLoadBalancerRun I0217 08:36:06.272909 14209 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRun (0.00s) === RUN TestLoadBalancerCheckChanges === RUN TestLoadBalancerCheckChanges/test_case_0 === RUN TestLoadBalancerCheckChanges/test_case_1 === RUN TestLoadBalancerCheckChanges/test_case_2 === RUN TestLoadBalancerCheckChanges/test_case_3 --- PASS: TestLoadBalancerCheckChanges (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_0 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_1 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_2 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_3 (0.00s) === RUN TestPublicIPAddressRenderAzure I0217 08:36:06.273153 14209 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRenderAzure (0.00s) === RUN TestPublicIPAddressFind publicipaddress_test.go:102: *azuretasks.PublicIPAddress {"Name":"publicIPAddress","Lifecycle":"","ID":null,"ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Tags":null} --- PASS: TestPublicIPAddressFind (0.00s) === RUN TestPublicIPAddressRun I0217 08:36:06.273429 14209 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRun (0.00s) === RUN TestPublicIPAddressCheckChanges === RUN TestPublicIPAddressCheckChanges/test_case_0 === RUN TestPublicIPAddressCheckChanges/test_case_1 === RUN TestPublicIPAddressCheckChanges/test_case_2 === RUN TestPublicIPAddressCheckChanges/test_case_3 --- PASS: TestPublicIPAddressCheckChanges (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_0 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_1 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_2 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_3 (0.00s) === RUN TestResourceGroupRenderAzure I0217 08:36:06.273657 14209 resourcegroup.go:108] Creating a new Resource Group with name: rg I0217 08:36:06.273671 14209 resourcegroup.go:110] Updating a Resource Group with name: rg --- PASS: TestResourceGroupRenderAzure (0.00s) === RUN TestResourceGroupFind --- PASS: TestResourceGroupFind (0.00s) === RUN TestResourceGroupRun I0217 08:36:06.273889 14209 resourcegroup.go:108] Creating a new Resource Group with name: rg --- PASS: TestResourceGroupRun (0.00s) === RUN TestResourceGroupCheckChanges === RUN TestResourceGroupCheckChanges/test_case_0 === RUN TestResourceGroupCheckChanges/test_case_1 === RUN TestResourceGroupCheckChanges/test_case_2 === RUN TestResourceGroupCheckChanges/test_case_3 --- PASS: TestResourceGroupCheckChanges (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_0 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_1 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_2 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_3 (0.00s) === RUN TestRoleAssignmentRenderAzure --- PASS: TestRoleAssignmentRenderAzure (0.00s) === RUN TestRoleAssignmentFind --- PASS: TestRoleAssignmentFind (0.00s) === RUN TestRoleAssignmentFind_NoPrincipalID --- PASS: TestRoleAssignmentFind_NoPrincipalID (0.00s) === RUN TestRoleAssignmentCheckChanges === RUN TestRoleAssignmentCheckChanges/test_case_0 === RUN TestRoleAssignmentCheckChanges/test_case_1 === RUN TestRoleAssignmentCheckChanges/test_case_2 === RUN TestRoleAssignmentCheckChanges/test_case_3 --- PASS: TestRoleAssignmentCheckChanges (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_0 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_1 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_2 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_3 (0.00s) === RUN TestSubnetRenderAzure I0217 08:36:06.274254 14209 subnet.go:126] Creating a new Subnet with name: vnet --- PASS: TestSubnetRenderAzure (0.00s) === RUN TestSubnetFind --- PASS: TestSubnetFind (0.00s) === RUN TestSubnetCheckChanges === RUN TestSubnetCheckChanges/test_case_0 === RUN TestSubnetCheckChanges/test_case_1 === RUN TestSubnetCheckChanges/test_case_2 === RUN TestSubnetCheckChanges/test_case_3 --- PASS: TestSubnetCheckChanges (0.00s) --- PASS: TestSubnetCheckChanges/test_case_0 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_1 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_2 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_3 (0.00s) === RUN TestVirtualNetworkRenderAzure I0217 08:36:06.274402 14209 virtualnetwork.go:122] Creating a new Virtual Network with name: vnet --- PASS: TestVirtualNetworkRenderAzure (0.00s) === RUN TestVirtualNetworkFind --- PASS: TestVirtualNetworkFind (0.00s) === RUN TestVirtualNetworkRun I0217 08:36:06.274559 14209 virtualnetwork.go:122] Creating a new Virtual Network with name: rg --- PASS: TestVirtualNetworkRun (0.00s) === RUN TestVirtualNetworkCheckChanges === RUN TestVirtualNetworkCheckChanges/test_case_0 === RUN TestVirtualNetworkCheckChanges/test_case_1 === RUN TestVirtualNetworkCheckChanges/test_case_2 === RUN TestVirtualNetworkCheckChanges/test_case_3 --- PASS: TestVirtualNetworkCheckChanges (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_0 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_1 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_2 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_3 (0.00s) === RUN TestSubnetIDParse --- PASS: TestSubnetIDParse (0.00s) === RUN TestLoadBalancerIDParse --- PASS: TestLoadBalancerIDParse (0.00s) === RUN TestVMScaleSetRenderAzure I0217 08:36:06.274748 14209 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRenderAzure (0.00s) === RUN TestVMScaleSetFind --- PASS: TestVMScaleSetFind (0.00s) === RUN TestVMScaleSetRun I0217 08:36:06.274928 14209 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRun (0.00s) === RUN TestVMScaleSetCheckChanges === RUN TestVMScaleSetCheckChanges/test_case_0 === RUN TestVMScaleSetCheckChanges/test_case_1 === RUN TestVMScaleSetCheckChanges/test_case_2 === RUN TestVMScaleSetCheckChanges/test_case_3 --- PASS: TestVMScaleSetCheckChanges (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_0 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_1 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_2 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_3 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azuretasks 0.030s === RUN Test_Find === RUN Test_Find/successfully_found_volume === RUN Test_Find/no_volume_found === RUN Test_Find/error_from_server --- PASS: Test_Find (0.00s) --- PASS: Test_Find/successfully_found_volume (0.00s) --- PASS: Test_Find/no_volume_found (0.00s) --- PASS: Test_Find/error_from_server (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/dotasks 0.032s === RUN TestProjectIAMBinding I0217 08:36:06.299294 14211 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.299917 14211 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0217 08:36:06.299939 14211 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.300391 14211 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0217 08:36:06.300416 14211 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.300543 14211 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestProjectIAMBinding (0.00s) === RUN TestServiceAccount I0217 08:36:06.300666 14211 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.300759 14211 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0217 08:36:06.300779 14211 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.300912 14211 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0217 08:36:06.300933 14211 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.300977 14211 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestServiceAccount (0.00s) === RUN TestStorageBucketIAM I0217 08:36:06.301083 14211 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.301327 14211 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0217 08:36:06.301347 14211 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.301634 14211 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0217 08:36:06.301679 14211 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0217 08:36:06.301784 14211 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestStorageBucketIAM (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/gcetasks 0.059s === RUN Test_OpenstackCloud_MakeCloud === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value --- PASS: Test_OpenstackCloud_MakeCloud (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value (0.00s) === RUN Test_OpenstackCloud_GetApiIngressStatus === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled --- PASS: Test_OpenstackCloud_GetApiIngressStatus (0.01s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set (0.01s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled (0.00s) === RUN Test_BuildClients === RUN Test_BuildClients/Empty_openstack_spec_means_no_load_balancer === RUN Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned === RUN Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned === RUN Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned === RUN Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled --- PASS: Test_BuildClients (0.00s) --- PASS: Test_BuildClients/Empty_openstack_spec_means_no_load_balancer (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled (0.00s) === RUN Test_WaitForStatusActiveIsSuccessful --- PASS: Test_WaitForStatusActiveIsSuccessful (1.00s) === RUN Test_WaitForStatusActiveResultsInInstanceNotFound --- PASS: Test_WaitForStatusActiveResultsInInstanceNotFound (1.00s) === RUN Test_WaitForStatusActiveResultsInUnableToCreateServer --- PASS: Test_WaitForStatusActiveResultsInUnableToCreateServer (1.00s) === RUN Test_WaitForStatusActiveResultsInTimeout --- PASS: Test_WaitForStatusActiveResultsInTimeout (1.00s) === RUN TestGetMetadataFromMetadataServiceReturnsNotFoundError --- PASS: TestGetMetadataFromMetadataServiceReturnsNotFoundError (0.00s) === RUN TestGetMetadataFromMetadataService --- PASS: TestGetMetadataFromMetadataService (0.00s) === RUN TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound --- PASS: TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound (0.00s) === RUN TestGetMetadataFromConfigDrive --- PASS: TestGetMetadataFromConfigDrive (0.00s) === RUN TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound --- PASS: TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound (0.00s) === RUN TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenConfigDriveFails --- PASS: TestGetMetadataFromServiceEndpointWhenConfigDriveFails (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromConfigDriveWhenServiceEndpointFails --- PASS: TestGetMetadataFromConfigDriveWhenServiceEndpointFails (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstack 4.056s === RUN TestFilterPortsReturnsAllPorts --- PASS: TestFilterPortsReturnsAllPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPort --- PASS: TestFilterPortsReturnsOnlyTaggedPort (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPorts --- PASS: TestFilterPortsReturnsOnlyTaggedPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername --- PASS: TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil (0.00s) === RUN Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges --- PASS: Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges (0.00s) === RUN Test_Port_GetDependencies --- PASS: Test_Port_GetDependencies (0.00s) === RUN Test_NewPortTaskFromCloud === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs --- PASS: Test_NewPortTaskFromCloud (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs (0.00s) === RUN Test_Port_Find === RUN Test_Port_Find/nothing_found === RUN Test_Port_Find/port_found_no_tags === RUN Test_Port_Find/port_found_with_tags === RUN Test_Port_Find/multiple_ports_found === RUN Test_Port_Find/error_listing_ports === RUN Test_Port_Find/port_found_with_allowed_address_pairs --- PASS: Test_Port_Find (0.00s) --- PASS: Test_Port_Find/nothing_found (0.00s) --- PASS: Test_Port_Find/port_found_no_tags (0.00s) --- PASS: Test_Port_Find/port_found_with_tags (0.00s) --- PASS: Test_Port_Find/multiple_ports_found (0.00s) --- PASS: Test_Port_Find/error_listing_ports (0.00s) --- PASS: Test_Port_Find/port_found_with_allowed_address_pairs (0.00s) === RUN Test_Port_CheckChanges === RUN Test_Port_CheckChanges/actual_nil_all_required_fields_set === RUN Test_Port_CheckChanges/actual_nil_required_field_Name_nil === RUN Test_Port_CheckChanges/actual_nil_required_field_Network_nil === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set --- PASS: Test_Port_CheckChanges (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_all_required_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Name_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Network_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set (0.00s) === RUN Test_Port_RenderOpenstack === RUN Test_Port_RenderOpenstack/actual_not_nil === RUN Test_Port_RenderOpenstack/actual_nil_success === RUN Test_Port_RenderOpenstack/actual_nil_cloud_error === RUN Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success --- PASS: Test_Port_RenderOpenstack (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_not_nil (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_success (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_cloud_error (0.00s) --- PASS: Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success (0.00s) === RUN Test_Port_createOptsFromPortTask === RUN Test_Port_createOptsFromPortTask/all_fields_set === RUN Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups --- PASS: Test_Port_createOptsFromPortTask (0.00s) --- PASS: Test_Port_createOptsFromPortTask/all_fields_set (0.00s) --- PASS: Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstacktasks 0.040s === RUN TestCreateValidScalewayProfile === RUN TestCreateValidScalewayProfile/Only_environment_set === RUN TestCreateValidScalewayProfile/Only_profile_set === RUN TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID === RUN TestCreateValidScalewayProfile/Environment_should_override_whole_profile === RUN TestCreateValidScalewayProfile/Empty_profile_for_integration_tests --- PASS: TestCreateValidScalewayProfile (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_environment_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_profile_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_whole_profile (0.00s) --- PASS: TestCreateValidScalewayProfile/Empty_profile_for_integration_tests (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/scaleway 0.029s === RUN TestWriteLocalsOutputs === RUN TestWriteLocalsOutputs/empty_map === RUN TestWriteLocalsOutputs/single_output === RUN TestWriteLocalsOutputs/list_output --- PASS: TestWriteLocalsOutputs (0.00s) --- PASS: TestWriteLocalsOutputs/empty_map (0.00s) --- PASS: TestWriteLocalsOutputs/single_output (0.00s) --- PASS: TestWriteLocalsOutputs/list_output (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraform 0.030s === RUN TestGetOutputs === RUN TestGetOutputs/empty_map === RUN TestGetOutputs/single_output === RUN TestGetOutputs/list_output === RUN TestGetOutputs/duplicate_names === RUN TestGetOutputs/duplicate_values --- PASS: TestGetOutputs (0.00s) --- PASS: TestGetOutputs/empty_map (0.00s) --- PASS: TestGetOutputs/single_output (0.00s) --- PASS: TestGetOutputs/list_output (0.00s) --- PASS: TestGetOutputs/duplicate_names (0.00s) --- PASS: TestGetOutputs/duplicate_values (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter 0.005s === RUN TestKeypairDeps --- PASS: TestKeypairDeps (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/fitasks 0.030s === RUN TestArchiveDependencies --- PASS: TestArchiveDependencies (0.00s) === RUN TestBindMountCommands I0217 08:36:06.299863 14218 bindmount.go:223] running mount command [mount --bind /containerized_mounter /containerized_mounter] I0217 08:36:06.299905 14218 bindmount.go:232] running mount command [mount -o remount,exec /containerized_mounter] I0217 08:36:06.299912 14218 bindmount.go:223] running mount command [mount --rbind /var/lib/kubelet/ /containerized_mounter/rootfs/var/lib/kubelet] I0217 08:36:06.299920 14218 bindmount.go:243] running mount command [mount --make-rshared /containerized_mounter/rootfs/var/lib/kubelet] I0217 08:36:06.299926 14218 bindmount.go:223] running mount command [mount --bind -o ro /proc /containerized_mounter/rootfs/proc] I0217 08:36:06.299932 14218 bindmount.go:223] running mount command [mount --bind -o ro /dev /containerized_mounter/rootfs/dev] I0217 08:36:06.299938 14218 bindmount.go:223] running mount command [mount --bind -o ro /etc/resolv.conf /containerized_mounter/rootfs/etc/resolv.conf] --- PASS: TestBindMountCommands (0.00s) === RUN TestBindMountDependencies --- PASS: TestBindMountDependencies (0.00s) === RUN TestFileDependencies === RUN TestFileDependencies/user === RUN TestFileDependencies/parentDir === RUN TestFileDependencies/afterFiles --- PASS: TestFileDependencies (0.00s) --- PASS: TestFileDependencies/user (0.00s) --- PASS: TestFileDependencies/parentDir (0.00s) --- PASS: TestFileDependencies/afterFiles (0.00s) === RUN TestIssueCertFileDependencies --- PASS: TestIssueCertFileDependencies (0.00s) === RUN TestLoadImageTask_Deps --- PASS: TestLoadImageTask_Deps (0.00s) === RUN TestServiceTask_Deps --- PASS: TestServiceTask_Deps (0.00s) === RUN TestServiceTask_UnknownTypes W0217 08:36:06.300231 14218 service.go:110] Unhandled type *nodetasks.FakeTask in Service::GetDependencies: &{} --- PASS: TestServiceTask_UnknownTypes (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/nodeup/nodetasks 0.057s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) === RUN TestStringSlicesEqualIgnoreOrder --- PASS: TestStringSlicesEqualIgnoreOrder (0.00s) === RUN TestHashString --- PASS: TestHashString (0.00s) === RUN TestSanitizeString --- PASS: TestSanitizeString (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/utils 0.005s === RUN TestFindDistribution --- PASS: TestFindDistribution (0.00s) PASS ok k8s.io/kops/util/pkg/distributions 0.006s === RUN TestWithTee --- PASS: TestWithTee (0.00s) PASS ok k8s.io/kops/util/pkg/exec 0.005s === RUN TestNewHasher === RUN TestNewHasher/sha256 === RUN TestNewHasher/sha1 === RUN TestNewHasher/md5 --- PASS: TestNewHasher (0.00s) --- PASS: TestNewHasher/sha256 (0.00s) --- PASS: TestNewHasher/sha1 (0.00s) --- PASS: TestNewHasher/md5 (0.00s) === RUN TestMemberFromString === RUN TestMemberFromString/sha256_1 === RUN TestMemberFromString/sha256_2 === RUN TestMemberFromString/sha256_3 === RUN TestMemberFromString/sha1_1 === RUN TestMemberFromString/sha1_2 === RUN TestMemberFromString/sha1_3 === RUN TestMemberFromString/md5_1 === RUN TestMemberFromString/md5_2 === RUN TestMemberFromString/md5_3 --- PASS: TestMemberFromString (0.00s) --- PASS: TestMemberFromString/sha256_1 (0.00s) --- PASS: TestMemberFromString/sha256_2 (0.00s) --- PASS: TestMemberFromString/sha256_3 (0.00s) --- PASS: TestMemberFromString/sha1_1 (0.00s) --- PASS: TestMemberFromString/sha1_2 (0.00s) --- PASS: TestMemberFromString/sha1_3 (0.00s) --- PASS: TestMemberFromString/md5_1 (0.00s) --- PASS: TestMemberFromString/md5_2 (0.00s) --- PASS: TestMemberFromString/md5_3 (0.00s) === RUN TestFromString === RUN TestFromString/sha256 === RUN TestFromString/sha1 === RUN TestFromString/md5 === RUN TestFromString/unknown --- PASS: TestFromString (0.00s) --- PASS: TestFromString/sha256 (0.00s) --- PASS: TestFromString/sha1 (0.00s) --- PASS: TestFromString/md5 (0.00s) --- PASS: TestFromString/unknown (0.00s) PASS ok k8s.io/kops/util/pkg/hashing 0.004s === RUN TestKeys --- PASS: TestKeys (0.00s) === RUN TestSortedKeys --- PASS: TestSortedKeys (0.00s) PASS ok k8s.io/kops/util/pkg/maps 0.005s === RUN TestGetProxyEnvVars W0217 08:36:06.270798 14225 proxy.go:34] EgressProxy set but no proxy host provided --- PASS: TestGetProxyEnvVars (0.00s) PASS ok k8s.io/kops/util/pkg/proxy 0.025s === RUN TestSet === RUN TestSet/simple_setting === RUN TestSet/setting_with_wildcard === RUN TestSet/creating_missing_objects === RUN TestSet/set_int === RUN TestSet/set_int32 === RUN TestSet/set_int64 === RUN TestSet/set_int_pointer === RUN TestSet/set_int32_pointer === RUN TestSet/set_int64_pointer === RUN TestSet/set_enum === RUN TestSet/set_enum_slice === RUN TestSet/append_enum_slice === RUN TestSet/set_env_var === RUN TestSet/set_env_var_with_val === RUN TestSet/set_duration --- PASS: TestSet (0.00s) --- PASS: TestSet/simple_setting (0.00s) --- PASS: TestSet/setting_with_wildcard (0.00s) --- PASS: TestSet/creating_missing_objects (0.00s) --- PASS: TestSet/set_int (0.00s) --- PASS: TestSet/set_int32 (0.00s) --- PASS: TestSet/set_int64 (0.00s) --- PASS: TestSet/set_int_pointer (0.00s) --- PASS: TestSet/set_int32_pointer (0.00s) --- PASS: TestSet/set_int64_pointer (0.00s) --- PASS: TestSet/set_enum (0.00s) --- PASS: TestSet/set_enum_slice (0.00s) --- PASS: TestSet/append_enum_slice (0.00s) --- PASS: TestSet/set_env_var (0.00s) --- PASS: TestSet/set_env_var_with_val (0.00s) --- PASS: TestSet/set_duration (0.00s) === RUN TestSetInvalidPath === RUN TestSetInvalidPath/setting_with_wildcard === RUN TestSetInvalidPath/creating_missing_objects === RUN TestSetInvalidPath/set_int === RUN TestSetInvalidPath/set_int32 === RUN TestSetInvalidPath/set_int64 --- PASS: TestSetInvalidPath (0.00s) --- PASS: TestSetInvalidPath/setting_with_wildcard (0.00s) --- PASS: TestSetInvalidPath/creating_missing_objects (0.00s) --- PASS: TestSetInvalidPath/set_int (0.00s) --- PASS: TestSetInvalidPath/set_int32 (0.00s) --- PASS: TestSetInvalidPath/set_int64 (0.00s) === RUN TestUnset === RUN TestUnset/simple_unsetting === RUN TestUnset/unsetting_with_wildcard === RUN TestUnset/uset_int === RUN TestUnset/unset_int32 === RUN TestUnset/unset_int64 === RUN TestUnset/unset_int_pointer === RUN TestUnset/unset_int32_pointer === RUN TestUnset/unset_int64_pointer === RUN TestUnset/unset_enum === RUN TestUnset/unset_enum_slice --- PASS: TestUnset (0.00s) --- PASS: TestUnset/simple_unsetting (0.00s) --- PASS: TestUnset/unsetting_with_wildcard (0.00s) --- PASS: TestUnset/uset_int (0.00s) --- PASS: TestUnset/unset_int32 (0.00s) --- PASS: TestUnset/unset_int64 (0.00s) --- PASS: TestUnset/unset_int_pointer (0.00s) --- PASS: TestUnset/unset_int32_pointer (0.00s) --- PASS: TestUnset/unset_int64_pointer (0.00s) --- PASS: TestUnset/unset_enum (0.00s) --- PASS: TestUnset/unset_enum_slice (0.00s) === RUN TestUnsetInvalidPath === RUN TestUnsetInvalidPath/usetting_with_wildcard === RUN TestUnsetInvalidPath/missing_objects --- PASS: TestUnsetInvalidPath (0.00s) --- PASS: TestUnsetInvalidPath/usetting_with_wildcard (0.00s) --- PASS: TestUnsetInvalidPath/missing_objects (0.00s) === RUN TestParseFieldPath === RUN TestParseFieldPath/test_Spec.Containers.Image === RUN TestParseFieldPath/test_Spec.Containers[0].Image === RUN TestParseFieldPath/test_Spec.Containers[*].Image --- PASS: TestParseFieldPath (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers.Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[0].Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[*].Image (0.00s) === RUN Test_Merge --- PASS: Test_Merge (0.00s) PASS ok k8s.io/kops/util/pkg/reflectutils 0.025s === RUN TestGetUniqueStrings --- PASS: TestGetUniqueStrings (0.00s) === RUN TestContains --- PASS: TestContains (0.00s) PASS ok k8s.io/kops/util/pkg/slice 0.005s === RUN TestSplitToSections --- PASS: TestSplitToSections (0.00s) PASS ok k8s.io/kops/util/pkg/text 0.003s === RUN TestAzureBlobPathBase === RUN TestAzureBlobPathBase/Test_case_0 === RUN TestAzureBlobPathBase/Test_case_1 === RUN TestAzureBlobPathBase/Test_case_2 --- PASS: TestAzureBlobPathBase (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_2 (0.00s) === RUN TestAzureBlobPathPath === RUN TestAzureBlobPathPath/Test_case_0 === RUN TestAzureBlobPathPath/Test_case_1 === RUN TestAzureBlobPathPath/Test_case_2 --- PASS: TestAzureBlobPathPath (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_2 (0.00s) === RUN TestAzureBlobPathJoin --- PASS: TestAzureBlobPathJoin (0.00s) === RUN TestCreateFile --- PASS: TestCreateFile (0.00s) === RUN TestWriteTo --- PASS: TestWriteTo (0.00s) === RUN TestMemFsCreateFile --- PASS: TestMemFsCreateFile (0.00s) === RUN TestMemFsReadDir --- PASS: TestMemFsReadDir (0.00s) === RUN TestMemFsReadTree --- PASS: TestMemFsReadTree (0.00s) === RUN Test_VFSPath --- PASS: Test_VFSPath (0.00s) === RUN Test_S3Path_Parse --- PASS: Test_S3Path_Parse (0.00s) PASS ok k8s.io/kops/util/pkg/vfs 0.027s === RUN TestGSRenderTerraform === RUN TestGSRenderTerraform/gs://foo/bar --- PASS: TestGSRenderTerraform (0.00s) --- PASS: TestGSRenderTerraform/gs://foo/bar (0.00s) === RUN TestS3RenderTerraform === RUN TestS3RenderTerraform/s3://foo/bar W0217 08:36:10.113169 14697 s3context.go:235] Unable to read bucket encryption policy for "foo" in region "us-east-1": will encrypt using AES256 --- PASS: TestS3RenderTerraform (0.00s) --- PASS: TestS3RenderTerraform/s3://foo/bar (0.00s) PASS ok k8s.io/kops/util/pkg/vfs/tests 0.047s >>> kops: Entering fakeroot... >>> kops*: Running postcheck for kops >>> kops*: Preparing package kops... >>> kops*: Stripping binaries >>> kops*: Scanning shared objects >>> kops*: Tracing dependencies... kubernetes >>> kops*: Package size: 145.5 MB >>> kops*: Compressing data... >>> kops*: Create checksum... >>> kops*: Create kops-1.28.4-r7.apk >>> kops: Build complete at Mon, 17 Feb 2025 08:38:56 +0000 elapsed time 0h 4m 48s >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Uninstalling dependencies... (1/4) Purging .makedepends-kops (20250217.083409) (2/4) Purging kubernetes (1.32.2-r0) (3/4) Purging go (1.23.6-r0) (4/4) Purging bash (5.2.37-r0) Executing bash-5.2.37-r0.pre-deinstall Executing busybox-1.37.0-r14.trigger OK: 399 MiB in 106 packages >>> kops: Updating the testing/x86_64 repository index... >>> kops: Signing the index...