Last active
January 5, 2022 12:58
-
-
Save SamLR/a88149789fe46cc658fa8f27b0949f74 to your computer and use it in GitHub Desktop.
log from timing-out eksctl command
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ eksctl create cluster -f eksctl-test.yaml -v 4 | |
2022-01-05 11:50:27 [▶] role ARN for the current session is "arn:aws:sts::[REDACTED AWS-ACCOUNT ID]:assumed-role/[REDACTED SESSION-NAME] | |
2022-01-05 11:50:27 [ℹ] eksctl version 0.77.0 | |
2022-01-05 11:50:27 [ℹ] using region us-east-2 | |
2022-01-05 11:50:27 [▶] determining availability zones | |
2022-01-05 11:50:28 [ℹ] setting availability zones to [us-east-2c us-east-2b us-east-2a] | |
2022-01-05 11:50:28 [▶] VPC CIDR (192.168.0.0/16) was divided into 8 subnets [192.168.0.0/19 192.168.32.0/19 192.168.64.0/19 192.168.96.0/19 192.168.128.0/19 192.168.160.0/19 192.168.192.0/19 192.168.224.0/19] | |
2022-01-05 11:50:28 [ℹ] subnets for us-east-2c - public:192.168.0.0/19 private:192.168.96.0/19 | |
2022-01-05 11:50:28 [ℹ] subnets for us-east-2b - public:192.168.32.0/19 private:192.168.128.0/19 | |
2022-01-05 11:50:28 [ℹ] subnets for us-east-2a - public:192.168.64.0/19 private:192.168.160.0/19 | |
2022-01-05 11:50:28 [ℹ] nodegroup "ng-1" will use "" [AmazonLinux2/1.21] | |
2022-01-05 11:50:28 [ℹ] using Kubernetes version 1.21 | |
2022-01-05 11:50:28 [ℹ] creating EKS cluster "public-access-test" in "us-east-2" region with managed nodes | |
2022-01-05 11:50:28 [▶] cfg.json = \ | |
{ | |
"kind": "ClusterConfig", | |
"apiVersion": "eksctl.io/v1alpha5", | |
"metadata": { | |
"name": "public-access-test", | |
"region": "us-east-2", | |
"version": "1.21" | |
}, | |
"iam": { | |
"withOIDC": false, | |
"vpcResourceControllerPolicy": true | |
}, | |
"vpc": { | |
"cidr": "192.168.0.0/16", | |
"subnets": { | |
"private": { | |
"us-east-2a": { | |
"az": "us-east-2a", | |
"cidr": "192.168.160.0/19" | |
}, | |
"us-east-2b": { | |
"az": "us-east-2b", | |
"cidr": "192.168.128.0/19" | |
}, | |
"us-east-2c": { | |
"az": "us-east-2c", | |
"cidr": "192.168.96.0/19" | |
} | |
}, | |
"public": { | |
"us-east-2a": { | |
"az": "us-east-2a", | |
"cidr": "192.168.64.0/19" | |
}, | |
"us-east-2b": { | |
"az": "us-east-2b", | |
"cidr": "192.168.32.0/19" | |
}, | |
"us-east-2c": { | |
"az": "us-east-2c", | |
"cidr": "192.168.0.0/19" | |
} | |
} | |
}, | |
"manageSharedNodeSecurityGroupRules": true, | |
"nat": { | |
"gateway": "Single" | |
}, | |
"clusterEndpoints": { | |
"privateAccess": false, | |
"publicAccess": true | |
}, | |
"publicAccessCIDRs": [ | |
"[REDACTED MY-IP]/32" | |
] | |
}, | |
"privateCluster": { | |
"enabled": false, | |
"skipEndpointCreation": false | |
}, | |
"managedNodeGroups": [ | |
{ | |
"name": "ng-1", | |
"amiFamily": "AmazonLinux2", | |
"instanceType": "m5.xlarge", | |
"desiredCapacity": 2, | |
"minSize": 2, | |
"maxSize": 2, | |
"volumeSize": 80, | |
"ssh": { | |
"allow": false | |
}, | |
"labels": { | |
"alpha.eksctl.io/cluster-name": "public-access-test", | |
"alpha.eksctl.io/nodegroup-name": "ng-1" | |
}, | |
"privateNetworking": true, | |
"tags": { | |
"alpha.eksctl.io/nodegroup-name": "ng-1", | |
"alpha.eksctl.io/nodegroup-type": "managed" | |
}, | |
"iam": { | |
"withAddonPolicies": { | |
"imageBuilder": false, | |
"autoScaler": false, | |
"externalDNS": false, | |
"certManager": false, | |
"appMesh": null, | |
"appMeshPreview": null, | |
"ebs": false, | |
"fsx": false, | |
"efs": false, | |
"albIngress": false, | |
"xRay": false, | |
"cloudWatch": false | |
} | |
}, | |
"securityGroups": { | |
"withShared": null, | |
"withLocal": null | |
}, | |
"volumeType": "gp3", | |
"volumeIOPS": 3000, | |
"volumeThroughput": 125, | |
"disableIMDSv1": false, | |
"disablePodIMDS": false, | |
"instanceSelector": {}, | |
"releaseVersion": "" | |
} | |
], | |
"availabilityZones": [ | |
"us-east-2c", | |
"us-east-2b", | |
"us-east-2a" | |
] | |
} | |
2022-01-05 11:50:28 [ℹ] 1 nodegroup (ng-1) was included (based on the include/exclude rules) | |
2022-01-05 11:50:28 [ℹ] will create a CloudFormation stack for cluster itself and 0 nodegroup stack(s) | |
2022-01-05 11:50:28 [ℹ] will create a CloudFormation stack for cluster itself and 1 managed nodegroup stack(s) | |
2022-01-05 11:50:28 [ℹ] if you encounter any issues, check CloudFormation console or try 'eksctl utils describe-stacks --region=us-east-2 --cluster=public-access-test' | |
2022-01-05 11:50:28 [ℹ] CloudWatch logging will not be enabled for cluster "public-access-test" in "us-east-2" | |
2022-01-05 11:50:28 [ℹ] you can enable it with 'eksctl utils update-cluster-logging --enable-types={SPECIFY-YOUR-LOG-TYPES-HERE (e.g. all)} --region=us-east-2 --cluster=public-access-test' | |
2022-01-05 11:50:28 [ℹ] Kubernetes API endpoint access will use default of {publicAccess=true, privateAccess=false} for cluster "public-access-test" in "us-east-2" | |
2022-01-05 11:50:28 [ℹ] | |
2 sequential tasks: { create cluster control plane "public-access-test", | |
2 sequential sub-tasks: { | |
2 sequential sub-tasks: { | |
wait for control plane to become ready, | |
update public access CIDRs, | |
}, | |
create managed nodegroup "ng-1", | |
} | |
} | |
2022-01-05 11:50:28 [▶] started task: create cluster control plane "public-access-test" | |
2022-01-05 11:50:28 [ℹ] building cluster stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:50:28 [▶] CreateStackInput = { | |
Capabilities: ["CAPABILITY_IAM"], | |
DisableRollback: false, | |
StackName: "eksctl-public-access-test-cluster", | |
Tags: [{ | |
Key: "alpha.eksctl.io/cluster-name", | |
Value: "public-access-test" | |
},{ | |
Key: "eksctl.cluster.k8s.io/v1alpha1/cluster-name", | |
Value: "public-access-test" | |
},{ | |
Key: "alpha.eksctl.io/eksctl-version", | |
Value: "0.77.0" | |
}], | |
TemplateBody: "{\n \"AWSTemplateFormatVersion\": \"2010-09-09\",\n \"Description\": \"EKS cluster (dedicated VPC: true, dedicated IAM: true) [created and managed by eksctl]\",\n \"Mappings\": {\n \"ServicePrincipalPartitionMap\": {\n \"aws\": {\n \"EC2\": \"ec2.amazonaws.com\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n },\n \"aws-cn\": {\n \"EC2\": \"ec2.amazonaws.com.cn\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n },\n \"aws-us-gov\": {\n \"EC2\": \"ec2.amazonaws.com\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n }\n }\n },\n \"Resources\": {\n \"ClusterSharedNodeSecurityGroup\": {\n \"Type\": \"AWS::EC2::SecurityGroup\",\n \"Properties\": {\n \"GroupDescription\": \"Communication between all nodes in the cluster\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/ClusterSharedNodeSecurityGroup\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"ControlPlane\": {\n \"Type\": \"AWS::EKS::Cluster\",\n \"Properties\": {\n \"Name\": \"public-access-test\",\n \"ResourcesVpcConfig\": {\n \"SecurityGroupIds\": [\n {\n \"Ref\": \"ControlPlaneSecurityGroup\"\n }\n ],\n \"SubnetIds\": [\n {\n \"Ref\": \"SubnetPublicUSEAST2C\"\n },\n {\n \"Ref\": \"SubnetPublicUSEAST2B\"\n },\n {\n \"Ref\": \"SubnetPublicUSEAST2A\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2A\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2C\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2B\"\n }\n ]\n },\n \"RoleArn\": {\n \"Fn::GetAtt\": [\n \"ServiceRole\",\n \"Arn\"\n ]\n },\n \"Version\": \"1.21\"\n }\n },\n \"ControlPlaneSecurityGroup\": {\n \"Type\": \"AWS::EC2::SecurityGroup\",\n \"Properties\": {\n \"GroupDescription\": \"Communication between the control plane and worker nodegroups\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/ControlPlaneSecurityGroup\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"IngressDefaultClusterToNodeSG\": {\n \"Type\": \"AWS::EC2::SecurityGroupIngress\",\n \"Properties\": {\n \"Description\": \"Allow managed and unmanaged nodes to communicate with each other (all ports)\",\n \"FromPort\": 0,\n \"GroupId\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"IpProtocol\": \"-1\",\n \"SourceSecurityGroupId\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"ClusterSecurityGroupId\"\n ]\n },\n \"ToPort\": 65535\n }\n },\n \"IngressInterNodeGroupSG\": {\n \"Type\": \"AWS::EC2::SecurityGroupIngress\",\n \"Properties\": {\n \"Description\": \"Allow nodes to communicate with each other (all ports)\",\n \"FromPort\": 0,\n \"GroupId\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"IpProtocol\": \"-1\",\n \"SourceSecurityGroupId\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"ToPort\": 65535\n }\n },\n \"IngressNodeToDefaultClusterSG\": {\n \"Type\": \"AWS::EC2::SecurityGroupIngress\",\n \"Properties\": {\n \"Description\": \"Allow unmanaged nodes to communicate with control plane (all ports)\",\n \"FromPort\": 0,\n \"GroupId\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"ClusterSecurityGroupId\"\n ]\n },\n \"IpProtocol\": \"-1\",\n \"SourceSecurityGroupId\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"ToPort\": 65535\n }\n },\n \"InternetGateway\": {\n \"Type\": \"AWS::EC2::InternetGateway\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/InternetGateway\"\n }\n }\n ]\n }\n },\n \"NATGateway\": {\n \"Type\": \"AWS::EC2::NatGateway\",\n \"Properties\": {\n \"AllocationId\": {\n \"Fn::GetAtt\": [\n \"NATIP\",\n \"AllocationId\"\n ]\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPublicUSEAST2C\"\n },\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/NATGateway\"\n }\n }\n ]\n }\n },\n \"NATIP\": {\n \"Type\": \"AWS::EC2::EIP\",\n \"Properties\": {\n \"Domain\": \"vpc\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/NATIP\"\n }\n }\n ]\n }\n },\n \"NATPrivateSubnetRouteUSEAST2A\": {\n \"Type\": \"AWS::EC2::Route\",\n \"Properties\": {\n \"DestinationCidrBlock\": \"0.0.0.0/0\",\n \"NatGatewayId\": {\n \"Ref\": \"NATGateway\"\n },\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2A\"\n }\n }\n },\n \"NATPrivateSubnetRouteUSEAST2B\": {\n \"Type\": \"AWS::EC2::Route\",\n \"Properties\": {\n \"DestinationCidrBlock\": \"0.0.0.0/0\",\n \"NatGatewayId\": {\n \"Ref\": \"NATGateway\"\n },\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2B\"\n }\n }\n },\n \"NATPrivateSubnetRouteUSEAST2C\": {\n \"Type\": \"AWS::EC2::Route\",\n \"Properties\": {\n \"DestinationCidrBlock\": \"0.0.0.0/0\",\n \"NatGatewayId\": {\n \"Ref\": \"NATGateway\"\n },\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2C\"\n }\n }\n },\n \"PolicyCloudWatchMetrics\": {\n \"Type\": \"AWS::IAM::Policy\",\n \"Properties\": {\n \"PolicyDocument\": {\n \"Statement\": [\n {\n \"Action\": [\n \"cloudwatch:PutMetricData\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n },\n \"PolicyName\": {\n \"Fn::Sub\": \"${AWS::StackName}-PolicyCloudWatchMetrics\"\n },\n \"Roles\": [\n {\n \"Ref\": \"ServiceRole\"\n }\n ]\n }\n },\n \"PolicyELBPermissions\": {\n \"Type\": \"AWS::IAM::Policy\",\n \"Properties\": {\n \"PolicyDocument\": {\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAddresses\",\n \"ec2:DescribeInternetGateways\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n },\n \"PolicyName\": {\n \"Fn::Sub\": \"${AWS::StackName}-PolicyELBPermissions\"\n },\n \"Roles\": [\n {\n \"Ref\": \"ServiceRole\"\n }\n ]\n }\n },\n \"PrivateRouteTableUSEAST2A\": {\n \"Type\": \"AWS::EC2::RouteTable\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/PrivateRouteTableUSEAST2A\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"PrivateRouteTableUSEAST2B\": {\n \"Type\": \"AWS::EC2::RouteTable\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/PrivateRouteTableUSEAST2B\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"PrivateRouteTableUSEAST2C\": {\n \"Type\": \"AWS::EC2::RouteTable\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/PrivateRouteTableUSEAST2C\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"PublicRouteTable\": {\n \"Type\": \"AWS::EC2::RouteTable\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/PublicRouteTable\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"PublicSubnetRoute\": {\n \"Type\": \"AWS::EC2::Route\",\n \"Properties\": {\n \"DestinationCidrBlock\": \"0.0.0.0/0\",\n \"GatewayId\": {\n \"Ref\": \"InternetGateway\"\n },\n \"RouteTableId\": {\n \"Ref\": \"PublicRouteTable\"\n }\n },\n \"DependsOn\": [\n \"VPCGatewayAttachment\"\n ]\n },\n \"RouteTableAssociationPrivateUSEAST2A\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2A\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPrivateUSEAST2A\"\n }\n }\n },\n \"RouteTableAssociationPrivateUSEAST2B\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2B\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPrivateUSEAST2B\"\n }\n }\n },\n \"RouteTableAssociationPrivateUSEAST2C\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2C\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPrivateUSEAST2C\"\n }\n }\n },\n \"RouteTableAssociationPublicUSEAST2A\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PublicRouteTable\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPublicUSEAST2A\"\n }\n }\n },\n \"RouteTableAssociationPublicUSEAST2B\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PublicRouteTable\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPublicUSEAST2B\"\n }\n }\n },\n \"RouteTableAssociationPublicUSEAST2C\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PublicRouteTable\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPublicUSEAST2C\"\n }\n }\n },\n \"ServiceRole\": {\n \"Type\": \"AWS::IAM::Role\",\n \"Properties\": {\n \"AssumeRolePolicyDocument\": {\n \"Statement\": [\n {\n \"Action\": [\n \"sts:AssumeRole\"\n ],\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": [\n {\n \"Fn::FindInMap\": [\n \"ServicePrincipalPartitionMap\",\n {\n \"Ref\": \"AWS::Partition\"\n },\n \"EKS\"\n ]\n }\n ]\n }\n }\n ],\n \"Version\": \"2012-10-17\"\n },\n \"ManagedPolicyArns\": [\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEKSClusterPolicy\"\n },\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEKSVPCResourceController\"\n }\n ],\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/ServiceRole\"\n }\n }\n ]\n }\n },\n \"SubnetPrivateUSEAST2A\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2a\",\n \"CidrBlock\": \"192.168.160.0/19\",\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/internal-elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPrivateUSEAST2A\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPrivateUSEAST2B\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2b\",\n \"CidrBlock\": \"192.168.128.0/19\",\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/internal-elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPrivateUSEAST2B\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPrivateUSEAST2C\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2c\",\n \"CidrBlock\": \"192.168.96.0/19\",\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/internal-elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPrivateUSEAST2C\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPublicUSEAST2A\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2a\",\n \"CidrBlock\": \"192.168.64.0/19\",\n \"MapPublicIpOnLaunch\": true,\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPublicUSEAST2A\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPublicUSEAST2B\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2b\",\n \"CidrBlock\": \"192.168.32.0/19\",\n \"MapPublicIpOnLaunch\": true,\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPublicUSEAST2B\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPublicUSEAST2C\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2c\",\n \"CidrBlock\": \"192.168.0.0/19\",\n \"MapPublicIpOnLaunch\": true,\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPublicUSEAST2C\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"VPC\": {\n \"Type\": \"AWS::EC2::VPC\",\n \"Properties\": {\n \"CidrBlock\": \"192.168.0.0/16\",\n \"EnableDnsHostnames\": true,\n \"EnableDnsSupport\": true,\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/VPC\"\n }\n }\n ]\n }\n },\n \"VPCGatewayAttachment\": {\n \"Type\": \"AWS::EC2::VPCGatewayAttachment\",\n \"Properties\": {\n \"InternetGatewayId\": {\n \"Ref\": \"InternetGateway\"\n },\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n }\n },\n \"Outputs\": {\n \"ARN\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"Arn\"\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::ARN\"\n }\n }\n },\n \"CertificateAuthorityData\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"CertificateAuthorityData\"\n ]\n }\n },\n \"ClusterSecurityGroupId\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"ClusterSecurityGroupId\"\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::ClusterSecurityGroupId\"\n }\n }\n },\n \"ClusterStackName\": {\n \"Value\": {\n \"Ref\": \"AWS::StackName\"\n }\n },\n \"Endpoint\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"Endpoint\"\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::Endpoint\"\n }\n }\n },\n \"FeatureNATMode\": {\n \"Value\": \"Single\"\n },\n \"SecurityGroup\": {\n \"Value\": {\n \"Ref\": \"ControlPlaneSecurityGroup\"\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::SecurityGroup\"\n }\n }\n },\n \"ServiceRoleARN\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ServiceRole\",\n \"Arn\"\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::ServiceRoleARN\"\n }\n }\n },\n \"SharedNodeSecurityGroup\": {\n \"Value\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::SharedNodeSecurityGroup\"\n }\n }\n },\n \"SubnetsPrivate\": {\n \"Value\": {\n \"Fn::Join\": [\n \",\",\n [\n {\n \"Ref\": \"SubnetPrivateUSEAST2A\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2C\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2B\"\n }\n ]\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::SubnetsPrivate\"\n }\n }\n },\n \"SubnetsPublic\": {\n \"Value\": {\n \"Fn::Join\": [\n \",\",\n [\n {\n \"Ref\": \"SubnetPublicUSEAST2C\"\n },\n {\n \"Ref\": \"SubnetPublicUSEAST2B\"\n },\n {\n \"Ref\": \"SubnetPublicUSEAST2A\"\n }\n ]\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::SubnetsPublic\"\n }\n }\n },\n \"VPC\": {\n \"Value\": {\n \"Ref\": \"VPC\"\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::VPC\"\n }\n }\n }\n }\n}" | |
} | |
2022-01-05 11:50:29 [ℹ] deploying stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:50:59 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:51:29 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:52:30 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:53:30 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:54:31 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:55:31 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:56:32 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:57:32 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:58:33 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 11:59:33 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 12:00:33 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster" | |
2022-01-05 12:00:34 [▶] processing stack outputs | |
2022-01-05 12:00:35 [▶] completed task: create cluster control plane "public-access-test" | |
2022-01-05 12:00:35 [▶] started task: | |
2 sequential sub-tasks: { | |
2 sequential sub-tasks: { | |
wait for control plane to become ready, | |
update public access CIDRs, | |
}, | |
create managed nodegroup "ng-1", | |
} | |
2022-01-05 12:00:35 [▶] started task: | |
2 sequential sub-tasks: { | |
wait for control plane to become ready, | |
update public access CIDRs, | |
} | |
2022-01-05 12:00:35 [▶] started task: wait for control plane to become ready | |
2022-01-05 12:02:37 [▶] cluster = { | |
Arn: "arn:aws:eks:us-east-2:[REDACTED]:cluster/public-access-test", | |
CertificateAuthority: { | |
Data: "[REDACTED CERT-DATA]" | |
}, | |
CreatedAt: 2022-01-05 11:51:12.392 +0000 UTC, | |
Endpoint: "https://[REDACTED ENDPOINT].gr7.us-east-2.eks.amazonaws.com", | |
Identity: { | |
Oidc: { | |
Issuer: "https://oidc.eks.us-east-2.amazonaws.com/id/[REDACTED ENDPOINT]" | |
} | |
}, | |
KubernetesNetworkConfig: { | |
ServiceIpv4Cidr: "10.100.0.0/16" | |
}, | |
Logging: { | |
ClusterLogging: [{ | |
Enabled: false, | |
Types: [ | |
"api", | |
"audit", | |
"authenticator", | |
"controllerManager", | |
"scheduler" | |
] | |
}] | |
}, | |
Name: "public-access-test", | |
PlatformVersion: "eks.4", | |
ResourcesVpcConfig: { | |
ClusterSecurityGroupId: "sg-0c5637c01f3b983f3", | |
EndpointPrivateAccess: false, | |
EndpointPublicAccess: true, | |
PublicAccessCidrs: ["0.0.0.0/0"], | |
SecurityGroupIds: ["sg-fe0db7a43a87b161c"], | |
SubnetIds: [ | |
"subnet-0b198ff80551595ab", | |
"subnet-0f74f045ac0dee695", | |
"subnet-0eb618f595eeb776f", | |
"subnet-0f2a7904708607b44", | |
"subnet-0ac3b99e960b8a840", | |
"subnet-09eddd97299caa0b2" | |
], | |
VpcId: "vpc-0aee8fccd32e07050" | |
}, | |
RoleArn: "arn:aws:iam::[REDACTED]:role/eksctl-public-access-test-cluster-ServiceRole-1BG41SGI1SPTG", | |
Status: "ACTIVE", | |
Tags: { | |
aws:cloudformation:stack-id: "arn:aws:cloudformation:us-east-2:[REDACTED]:stack/eksctl-public-access-test-cluster/ad0ef7a0-6e1d-11ec-aa55-cf0ab9d6ae90", | |
alpha.eksctl.io/eksctl-version: "0.77.0", | |
eksctl.cluster.k8s.io/v1alpha1/cluster-name: "public-access-test", | |
aws:cloudformation:stack-name: "eksctl-public-access-test-cluster", | |
aws:cloudformation:logical-id: "ControlPlane", | |
alpha.eksctl.io/cluster-name: "public-access-test" | |
}, | |
Version: "1.21" | |
} | |
2022-01-05 12:02:37 [▶] completed task: wait for control plane to become ready | |
2022-01-05 12:02:37 [▶] started task: update public access CIDRs | |
2022-01-05 12:02:38 [▶] start waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:02:38 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:02:54 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:03:11 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:03:31 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:03:48 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:04:08 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:04:28 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:04:46 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:05:04 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:05:21 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:05:21 [▶] done after 2m43.656270872s of waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed | |
2022-01-05 12:05:21 [▶] completed task: update public access CIDRs | |
2022-01-05 12:05:21 [▶] completed task: | |
2 sequential sub-tasks: { | |
wait for control plane to become ready, | |
update public access CIDRs, | |
} | |
2022-01-05 12:05:21 [▶] started task: create managed nodegroup "ng-1" | |
2022-01-05 12:05:21 [▶] waiting for 1 parallel tasks to complete | |
2022-01-05 12:05:21 [▶] started task: create managed nodegroup "ng-1" | |
2022-01-05 12:05:21 [ℹ] building managed nodegroup stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:05:21 [▶] CreateStackInput = { | |
Capabilities: ["CAPABILITY_IAM"], | |
DisableRollback: false, | |
StackName: "eksctl-public-access-test-nodegroup-ng-1", | |
Tags: [ | |
{ | |
Key: "alpha.eksctl.io/cluster-name", | |
Value: "public-access-test" | |
}, | |
{ | |
Key: "eksctl.cluster.k8s.io/v1alpha1/cluster-name", | |
Value: "public-access-test" | |
}, | |
{ | |
Key: "alpha.eksctl.io/eksctl-version", | |
Value: "0.77.0" | |
}, | |
{ | |
Key: "alpha.eksctl.io/nodegroup-name", | |
Value: "ng-1" | |
}, | |
{ | |
Key: "alpha.eksctl.io/nodegroup-type", | |
Value: "managed" | |
} | |
], | |
TemplateBody: "{\n \"AWSTemplateFormatVersion\": \"2010-09-09\",\n \"Description\": \"EKS Managed Nodes (SSH access: false) [created by eksctl]\",\n \"Mappings\": {\n \"ServicePrincipalPartitionMap\": {\n \"aws\": {\n \"EC2\": \"ec2.amazonaws.com\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n },\n \"aws-cn\": {\n \"EC2\": \"ec2.amazonaws.com.cn\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n },\n \"aws-us-gov\": {\n \"EC2\": \"ec2.amazonaws.com\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n }\n }\n },\n \"Resources\": {\n \"LaunchTemplate\": {\n \"Type\": \"AWS::EC2::LaunchTemplate\",\n \"Properties\": {\n \"LaunchTemplateData\": {\n \"BlockDeviceMappings\": [\n {\n \"DeviceName\": \"/dev/xvda\",\n \"Ebs\": {\n \"Iops\": 3000,\n \"Throughput\": 125,\n \"VolumeSize\": 80,\n \"VolumeType\": \"gp3\"\n }\n }\n ],\n \"MetadataOptions\": {\n \"HttpPutResponseHopLimit\": 2,\n \"HttpTokens\": \"optional\"\n },\n \"SecurityGroupIds\": [\n {\n \"Fn::ImportValue\": \"eksctl-public-access-test-cluster::ClusterSecurityGroupId\"\n }\n ],\n \"TagSpecifications\": [\n {\n \"ResourceType\": \"instance\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": \"public-access-test-ng-1-Node\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-type\",\n \"Value\": \"managed\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-name\",\n \"Value\": \"ng-1\"\n }\n ]\n },\n {\n \"ResourceType\": \"volume\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": \"public-access-test-ng-1-Node\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-type\",\n \"Value\": \"managed\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-name\",\n \"Value\": \"ng-1\"\n }\n ]\n },\n {\n \"ResourceType\": \"network-interface\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": \"public-access-test-ng-1-Node\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-type\",\n \"Value\": \"managed\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-name\",\n \"Value\": \"ng-1\"\n }\n ]\n }\n ]\n },\n \"LaunchTemplateName\": {\n \"Fn::Sub\": \"${AWS::StackName}\"\n }\n }\n },\n \"ManagedNodeGroup\": {\n \"Type\": \"AWS::EKS::Nodegroup\",\n \"Properties\": {\n \"AmiType\": \"AL2_x86_64\",\n \"ClusterName\": \"public-access-test\",\n \"InstanceTypes\": [\n \"m5.xlarge\"\n ],\n \"Labels\": {\n \"alpha.eksctl.io/cluster-name\": \"public-access-test\",\n \"alpha.eksctl.io/nodegroup-name\": \"ng-1\"\n },\n \"LaunchTemplate\": {\n \"Id\": {\n \"Ref\": \"LaunchTemplate\"\n }\n },\n \"NodeRole\": {\n \"Fn::GetAtt\": [\n \"NodeInstanceRole\",\n \"Arn\"\n ]\n },\n \"NodegroupName\": \"ng-1\",\n \"ScalingConfig\": {\n \"DesiredSize\": 2,\n \"MaxSize\": 2,\n \"MinSize\": 2\n },\n \"Subnets\": {\n \"Fn::Split\": [\n \",\",\n {\n \"Fn::ImportValue\": \"eksctl-public-access-test-cluster::SubnetsPrivate\"\n }\n ]\n },\n \"Tags\": {\n \"alpha.eksctl.io/nodegroup-name\": \"ng-1\",\n \"alpha.eksctl.io/nodegroup-type\": \"managed\"\n }\n }\n },\n \"NodeInstanceRole\": {\n \"Type\": \"AWS::IAM::Role\",\n \"Properties\": {\n \"AssumeRolePolicyDocument\": {\n \"Statement\": [\n {\n \"Action\": [\n \"sts:AssumeRole\"\n ],\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": [\n {\n \"Fn::FindInMap\": [\n \"ServicePrincipalPartitionMap\",\n {\n \"Ref\": \"AWS::Partition\"\n },\n \"EC2\"\n ]\n }\n ]\n }\n }\n ],\n \"Version\": \"2012-10-17\"\n },\n \"ManagedPolicyArns\": [\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly\"\n },\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEKSWorkerNodePolicy\"\n },\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEKS_CNI_Policy\"\n },\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonSSMManagedInstanceCore\"\n }\n ],\n \"Path\": \"/\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/NodeInstanceRole\"\n }\n }\n ]\n }\n }\n }\n}" | |
} | |
2022-01-05 12:05:22 [ℹ] deploying stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:05:22 [▶] start waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:05:22 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:05:41 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:05:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:06:17 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:06:34 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:06:50 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:07:08 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:07:28 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:07:46 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:08:04 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:08:22 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:08:39 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:08:58 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:09:16 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:09:34 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:09:49 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:10:06 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:10:24 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:10:40 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:10:56 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:11:15 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:11:33 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:11:49 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:12:05 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:12:25 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:12:43 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:13:03 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:13:22 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:13:38 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:13:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:14:15 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:14:34 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:14:51 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:15:08 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:15:28 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:15:44 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:16:01 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:16:17 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:16:35 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:16:54 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:17:13 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:17:31 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:17:48 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:18:05 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:18:21 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:18:40 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:18:58 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:19:15 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:19:34 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:19:50 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:20:08 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:20:25 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:20:41 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:20:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:21:14 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:21:31 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:21:49 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:22:05 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:22:22 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:22:40 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:22:59 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:23:17 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:23:36 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:23:53 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:24:12 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:24:32 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:24:51 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:25:11 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:25:29 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:25:47 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:26:03 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:26:23 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:26:39 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:26:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:27:18 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:27:38 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:27:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:28:13 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:28:29 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:28:49 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:29:06 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:29:24 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:29:42 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:29:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:30:18 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:30:22 [✖] unexpected status "CREATE_IN_PROGRESS" while waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1" | |
2022-01-05 12:30:22 [ℹ] fetching stack events in attempt to troubleshoot the root cause of the failure | |
2022-01-05 12:30:23 [▶] AWS::EKS::Nodegroup/ManagedNodeGroup: CREATE_IN_PROGRESS – "Resource creation Initiated" | |
2022-01-05 12:30:23 [▶] AWS::EKS::Nodegroup/ManagedNodeGroup: CREATE_IN_PROGRESS | |
2022-01-05 12:30:23 [▶] AWS::IAM::Role/NodeInstanceRole: CREATE_COMPLETE | |
2022-01-05 12:30:23 [▶] AWS::EC2::LaunchTemplate/LaunchTemplate: CREATE_COMPLETE | |
2022-01-05 12:30:23 [▶] AWS::EC2::LaunchTemplate/LaunchTemplate: CREATE_IN_PROGRESS – "Resource creation Initiated" | |
2022-01-05 12:30:23 [▶] AWS::IAM::Role/NodeInstanceRole: CREATE_IN_PROGRESS – "Resource creation Initiated" | |
2022-01-05 12:30:23 [▶] AWS::EC2::LaunchTemplate/LaunchTemplate: CREATE_IN_PROGRESS | |
2022-01-05 12:30:23 [▶] AWS::IAM::Role/NodeInstanceRole: CREATE_IN_PROGRESS | |
2022-01-05 12:30:23 [▶] AWS::CloudFormation::Stack/eksctl-public-access-test-nodegroup-ng-1: CREATE_IN_PROGRESS – "User Initiated" | |
2022-01-05 12:30:23 [▶] failed task: create managed nodegroup "ng-1" (will continue until other parallel tasks are completed) | |
2022-01-05 12:30:23 [▶] failed task: create managed nodegroup "ng-1" (will not run other sequential tasks) | |
2022-01-05 12:30:23 [▶] failed task: | |
2 sequential sub-tasks: { | |
2 sequential sub-tasks: { | |
wait for control plane to become ready, | |
update public access CIDRs, | |
}, | |
create managed nodegroup "ng-1", | |
} | |
(will not run other sequential tasks) | |
2022-01-05 12:30:23 [!] 1 error(s) occurred and cluster hasn't been created properly, you may wish to check CloudFormation console | |
2022-01-05 12:30:23 [ℹ] to cleanup resources, run 'eksctl delete cluster --region=us-east-2 --name=public-access-test' | |
2022-01-05 12:30:23 [✖] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1": RequestCanceled: waiter context canceled | |
caused by: context deadline exceeded | |
Error: failed to create cluster "public-access-test" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment