Skip to content

Instantly share code, notes, and snippets.

@eriknelson
Created March 29, 2018 01:02
Show Gist options
  • Save eriknelson/9a613ec310051c955dc2b917ed61510b to your computer and use it in GitHub Desktop.
Save eriknelson/9a613ec310051c955dc2b917ed61510b to your computer and use it in GitHub Desktop.
Aliases:
map[string]string{}
Override:
map[string]interface {}{"v":"10"}
PFlags:
map[string]viper.FlagValue{"nfs-share":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a65a0)}, "nfs-shares-root":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6640)}, "bootstrapper":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e92c0)}, "container-runtime":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6c80)}, "docker-opt":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6780)}, "xhyve-disk-driver":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6500)}, "kubernetes-version":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6be0)}, "apiserver-name":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6820)}, "dns-domain":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6a00)}, "host-only-cidr":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6320)}, "iso-url":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6000)}, "mount-string":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9ea0)}, "registry-mirror":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6b40)}, "apiserver-ips":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6960)}, "apiserver-names":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a68c0)}, "extra-config":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6f00)}, "keep-context":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9d60)}, "profile":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9220)}, "disable-driver-mounts":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9f40)}, "cache-images":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6e60)}, "network-plugin":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6d20)}, "hyperv-virtual-switch":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a63c0)}, "mount":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9e00)}, "vm-driver":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a60a0)}, "cpus":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a61e0)}, "disk-size":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6280)}, "docker-env":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a66e0)}, "feature-gates":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6dc0)}, "insecure-registry":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6aa0)}, "kvm-network":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6460)}, "memory":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6140)}}
Env:
map[string]string{}
Key/Value Store:
map[string]interface {}{}
Config:
map[string]interface {}{}
Defaults:
map[string]interface {}{"log_dir":"", "wantupdatenotification":true, "reminderwaitperiodinhours":24, "wantreporterror":false, "showdriverdeprecationnotification":true, "v":"0", "wantreporterrorprompt":true, "wantkubectldownloadmsg":true, "wantnonedriverwarning":true, "alsologtostderr":"false"}
Starting local Kubernetes v1.9.4 cluster...
Starting VM...
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Launching plugin server for driver kvm2
Launching plugin server for driver kvm2
Plugin server listening at address 127.0.0.1:36127
Plugin server listening at address 127.0.0.1:36127
() Calling .GetVersion
() Calling .GetVersion
Using API Version 1
Using API Version 1
() Calling .SetConfigRaw
() Calling .SetConfigRaw
() Calling .GetMachineName
() Calling .GetMachineName
(minikube) Calling .GetState
(minikube) Calling .GetState
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Waiting for SSH to be available...
Getting to WaitForSSH function...
Getting to WaitForSSH function...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
exit 0
About to run SSH command:
exit 0
Detecting the provisioner...
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
cat /etc/os-release
About to run SSH command:
cat /etc/os-release
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
found compatible host: buildroot
found compatible host: buildroot
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
setting hostname "minikube"
setting hostname "minikube"
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
SSH cmd err, output: <nil>: minikube
SSH cmd err, output: <nil>: minikube
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
setting up certificates
setting up certificates
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
(minikube) Calling .GetIP
(minikube) Calling .GetIP
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Setting Docker configuration on the remote daemon...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart docker
About to run SSH command:
sudo systemctl -f restart docker
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
setting minikube options for container-runtime
setting minikube options for container-runtime
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
(minikube) Calling .GetSSHHostname
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart crio
About to run SSH command:
sudo systemctl -f restart crio
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
E0328 21:01:24.605022 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
E0328 21:01:24.605022 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Launching plugin server for driver kvm2
Launching plugin server for driver kvm2
Plugin server listening at address 127.0.0.1:34853
Plugin server listening at address 127.0.0.1:34853
() Calling .GetVersion
() Calling .GetVersion
Using API Version 1
Using API Version 1
() Calling .SetConfigRaw
() Calling .SetConfigRaw
() Calling .GetMachineName
() Calling .GetMachineName
(minikube) Calling .GetState
(minikube) Calling .GetState
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Waiting for SSH to be available...
Getting to WaitForSSH function...
Getting to WaitForSSH function...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
exit 0
About to run SSH command:
exit 0
Detecting the provisioner...
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
cat /etc/os-release
About to run SSH command:
cat /etc/os-release
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
found compatible host: buildroot
found compatible host: buildroot
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
setting hostname "minikube"
setting hostname "minikube"
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
SSH cmd err, output: <nil>: minikube
SSH cmd err, output: <nil>: minikube
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
setting up certificates
setting up certificates
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
(minikube) Calling .GetIP
(minikube) Calling .GetIP
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Setting Docker configuration on the remote daemon...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
(minikube) Calling .GetSSHHostname
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart docker
About to run SSH command:
sudo systemctl -f restart docker
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
setting minikube options for container-runtime
setting minikube options for container-runtime
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart crio
About to run SSH command:
sudo systemctl -f restart crio
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
E0328 21:01:30.250785 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
E0328 21:01:30.250785 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Launching plugin server for driver kvm2
Launching plugin server for driver kvm2
Plugin server listening at address 127.0.0.1:40955
Plugin server listening at address 127.0.0.1:40955
() Calling .GetVersion
() Calling .GetVersion
Using API Version 1
() Calling .SetConfigRaw
Using API Version 1
() Calling .SetConfigRaw
() Calling .GetMachineName
() Calling .GetMachineName
(minikube) Calling .GetState
(minikube) Calling .GetState
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Waiting for SSH to be available...
Getting to WaitForSSH function...
Getting to WaitForSSH function...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
exit 0
About to run SSH command:
exit 0
Detecting the provisioner...
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
cat /etc/os-release
About to run SSH command:
cat /etc/os-release
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
found compatible host: buildroot
found compatible host: buildroot
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
setting hostname "minikube"
setting hostname "minikube"
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
SSH cmd err, output: <nil>: minikube
SSH cmd err, output: <nil>: minikube
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
setting up certificates
(minikube) Calling .GetMachineName
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
setting up certificates
(minikube) Calling .GetMachineName
(minikube) Calling .GetIP
(minikube) Calling .GetIP
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Setting Docker configuration on the remote daemon...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart docker
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart docker
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
setting minikube options for container-runtime
setting minikube options for container-runtime
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart crio
About to run SSH command:
sudo systemctl -f restart crio
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
E0328 21:01:35.817734 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
E0328 21:01:35.817734 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Launching plugin server for driver kvm2
Launching plugin server for driver kvm2
Plugin server listening at address 127.0.0.1:42687
Plugin server listening at address 127.0.0.1:42687
() Calling .GetVersion
() Calling .GetVersion
Using API Version 1
Using API Version 1
() Calling .SetConfigRaw
() Calling .SetConfigRaw
() Calling .GetMachineName
() Calling .GetMachineName
(minikube) Calling .GetState
(minikube) Calling .GetState
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Waiting for SSH to be available...
Getting to WaitForSSH function...
Getting to WaitForSSH function...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
exit 0
About to run SSH command:
exit 0
Detecting the provisioner...
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
cat /etc/os-release
About to run SSH command:
cat /etc/os-release
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
found compatible host: buildroot
found compatible host: buildroot
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
setting hostname "minikube"
setting hostname "minikube"
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
SSH cmd err, output: <nil>: minikube
SSH cmd err, output: <nil>: minikube
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
setting up certificates
(minikube) Calling .GetMachineName
setting up certificates
(minikube) Calling .GetMachineName
(minikube) Calling .GetIP
(minikube) Calling .GetIP
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Setting Docker configuration on the remote daemon...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart docker
About to run SSH command:
sudo systemctl -f restart docker
SSH cmd err, output: <nil>:
setting minikube options for container-runtime
SSH cmd err, output: <nil>:
setting minikube options for container-runtime
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart crio
About to run SSH command:
sudo systemctl -f restart crio
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
E0328 21:01:41.372250 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
E0328 21:01:41.372250 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2
Launching plugin server for driver kvm2
Launching plugin server for driver kvm2
Plugin server listening at address 127.0.0.1:42369
Plugin server listening at address 127.0.0.1:42369
() Calling .GetVersion
() Calling .GetVersion
Using API Version 1
Using API Version 1
() Calling .SetConfigRaw
() Calling .SetConfigRaw
() Calling .GetMachineName
() Calling .GetMachineName
(minikube) Calling .GetState
(minikube) Calling .GetState
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Waiting for SSH to be available...
Getting to WaitForSSH function...
Getting to WaitForSSH function...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
exit 0
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
exit 0
Detecting the provisioner...
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
cat /etc/os-release
About to run SSH command:
cat /etc/os-release
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
SSH cmd err, output: <nil>: NAME=Buildroot
VERSION=2017.11
ID=buildroot
VERSION_ID=2017.11
PRETTY_NAME="Buildroot 2017.11"
found compatible host: buildroot
found compatible host: buildroot
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
setting hostname "minikube"
setting hostname "minikube"
(minikube) Calling .GetMachineName
(minikube) Calling .GetMachineName
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
About to run SSH command:
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname
SSH cmd err, output: <nil>: minikube
SSH cmd err, output: <nil>: minikube
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
About to run SSH command:
if ! grep -xq '.*\sminikube' /etc/hosts; then
if grep -xq '127.0.1.1\s.*' /etc/hosts; then
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts;
else
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts;
fi
fi
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
setting up certificates
(minikube) Calling .GetMachineName
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube}
setting up certificates
(minikube) Calling .GetMachineName
(minikube) Calling .GetIP
(minikube) Calling .GetIP
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost]
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
(minikube) Calling .DriverName
(minikube) Calling .DriverName
Setting Docker configuration on the remote daemon...
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
About to run SSH command:
sudo mkdir -p /lib/systemd/system && printf %s "[Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP $MAINPID
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
" | sudo tee /lib/systemd/system/docker.service
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
SSH cmd err, output: <nil>: [Unit]
Description=Docker Application Container Engine
Documentation=https://docs.docker.com
After=network.target docker.socket
Requires=docker.socket
[Service]
Type=notify
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead.
Environment=DOCKER_RAMDISK=yes
# This file is a systemd drop-in unit that inherits from the base dockerd configuration.
# The base configuration already specifies an 'ExecStart=...' command. The first directive
# here is to clear out that command inherited from the base configuration. Without this,
# the command from the base configuration and the command specified here are treated as
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd
# will catch this invalid input and refuse to start the service with an error like:
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.
ExecStart=
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12
ExecReload=/bin/kill -s HUP
# Having non-zero Limit*s causes performance problems due to accounting overhead
# in the kernel. We recommend using cgroups to do container-local accounting.
LimitNOFILE=infinity
LimitNPROC=infinity
LimitCORE=infinity
# Uncomment TasksMax if your systemd version supports it.
# Only systemd 226 and above support this version.
TasksMax=infinity
TimeoutStartSec=0
# set delegate yes so that systemd does not reset the cgroups of docker containers
Delegate=yes
# kill only the docker process, not all processes in the cgroup
KillMode=process
[Install]
WantedBy=multi-user.target
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart docker
About to run SSH command:
sudo systemctl -f restart docker
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
setting minikube options for container-runtime
setting minikube options for container-runtime
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo mkdir -p /etc/sysconfig && printf %s "
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
" | sudo tee /etc/sysconfig/crio.minikube
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
SSH cmd err, output: <nil>:
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 '
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl daemon-reload
About to run SSH command:
sudo systemctl daemon-reload
SSH cmd err, output: <nil>:
SSH cmd err, output: <nil>:
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHHostname
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHPort
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHKeyPath
(minikube) Calling .GetSSHUsername
(minikube) Calling .GetSSHUsername
Using SSH client type: native
Using SSH client type: native
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>}
About to run SSH command:
sudo systemctl -f restart crio
About to run SSH command:
sudo systemctl -f restart crio
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Error setting container-runtime options during provisioning ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
E0328 21:01:46.822568 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
E0328 21:01:46.822568 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
.
Retrying.
E0328 21:01:48.822780 23988 start.go:165] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
E0328 21:01:48.822780 23988 start.go:165] Error starting host: Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
Temporary Error: Error configuring auth on host: ssh command error:
command : sudo systemctl -f restart crio
err : Process exited with status 1
output : Job for crio.service failed because the control process exited with error code.
See "systemctl status crio.service" and "journalctl -xe" for details.
================================================================================
An error has occurred. Would you like to opt in to sending anonymized crash
information to minikube to help prevent future errors?
To opt out of these messages, run the command:
minikube config set WantReportErrorPrompt false
================================================================================
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment