Created
March 29, 2018 01:02
-
-
Save eriknelson/9a613ec310051c955dc2b917ed61510b to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Aliases: | |
map[string]string{} | |
Override: | |
map[string]interface {}{"v":"10"} | |
PFlags: | |
map[string]viper.FlagValue{"nfs-share":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a65a0)}, "nfs-shares-root":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6640)}, "bootstrapper":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e92c0)}, "container-runtime":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6c80)}, "docker-opt":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6780)}, "xhyve-disk-driver":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6500)}, "kubernetes-version":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6be0)}, "apiserver-name":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6820)}, "dns-domain":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6a00)}, "host-only-cidr":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6320)}, "iso-url":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6000)}, "mount-string":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9ea0)}, "registry-mirror":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6b40)}, "apiserver-ips":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6960)}, "apiserver-names":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a68c0)}, "extra-config":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6f00)}, "keep-context":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9d60)}, "profile":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9220)}, "disable-driver-mounts":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9f40)}, "cache-images":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6e60)}, "network-plugin":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6d20)}, "hyperv-virtual-switch":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a63c0)}, "mount":viper.pflagValue{flag:(*pflag.Flag)(0xc4202e9e00)}, "vm-driver":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a60a0)}, "cpus":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a61e0)}, "disk-size":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6280)}, "docker-env":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a66e0)}, "feature-gates":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6dc0)}, "insecure-registry":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6aa0)}, "kvm-network":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6460)}, "memory":viper.pflagValue{flag:(*pflag.Flag)(0xc4202a6140)}} | |
Env: | |
map[string]string{} | |
Key/Value Store: | |
map[string]interface {}{} | |
Config: | |
map[string]interface {}{} | |
Defaults: | |
map[string]interface {}{"log_dir":"", "wantupdatenotification":true, "reminderwaitperiodinhours":24, "wantreporterror":false, "showdriverdeprecationnotification":true, "v":"0", "wantreporterrorprompt":true, "wantkubectldownloadmsg":true, "wantnonedriverwarning":true, "alsologtostderr":"false"} | |
Starting local Kubernetes v1.9.4 cluster... | |
Starting VM... | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Launching plugin server for driver kvm2 | |
Launching plugin server for driver kvm2 | |
Plugin server listening at address 127.0.0.1:36127 | |
Plugin server listening at address 127.0.0.1:36127 | |
() Calling .GetVersion | |
() Calling .GetVersion | |
Using API Version 1 | |
Using API Version 1 | |
() Calling .SetConfigRaw | |
() Calling .SetConfigRaw | |
() Calling .GetMachineName | |
() Calling .GetMachineName | |
(minikube) Calling .GetState | |
(minikube) Calling .GetState | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Waiting for SSH to be available... | |
Getting to WaitForSSH function... | |
Getting to WaitForSSH function... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
exit 0 | |
About to run SSH command: | |
exit 0 | |
Detecting the provisioner... | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
cat /etc/os-release | |
About to run SSH command: | |
cat /etc/os-release | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
found compatible host: buildroot | |
found compatible host: buildroot | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
setting hostname "minikube" | |
setting hostname "minikube" | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
SSH cmd err, output: <nil>: minikube | |
SSH cmd err, output: <nil>: minikube | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
setting up certificates | |
setting up certificates | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetIP | |
(minikube) Calling .GetIP | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Setting Docker configuration on the remote daemon... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
setting minikube options for container-runtime | |
setting minikube options for container-runtime | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
(minikube) Calling .GetSSHHostname | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
E0328 21:01:24.605022 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
E0328 21:01:24.605022 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Launching plugin server for driver kvm2 | |
Launching plugin server for driver kvm2 | |
Plugin server listening at address 127.0.0.1:34853 | |
Plugin server listening at address 127.0.0.1:34853 | |
() Calling .GetVersion | |
() Calling .GetVersion | |
Using API Version 1 | |
Using API Version 1 | |
() Calling .SetConfigRaw | |
() Calling .SetConfigRaw | |
() Calling .GetMachineName | |
() Calling .GetMachineName | |
(minikube) Calling .GetState | |
(minikube) Calling .GetState | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Waiting for SSH to be available... | |
Getting to WaitForSSH function... | |
Getting to WaitForSSH function... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
exit 0 | |
About to run SSH command: | |
exit 0 | |
Detecting the provisioner... | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
cat /etc/os-release | |
About to run SSH command: | |
cat /etc/os-release | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
found compatible host: buildroot | |
found compatible host: buildroot | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
setting hostname "minikube" | |
setting hostname "minikube" | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
SSH cmd err, output: <nil>: minikube | |
SSH cmd err, output: <nil>: minikube | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
setting up certificates | |
setting up certificates | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetIP | |
(minikube) Calling .GetIP | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Setting Docker configuration on the remote daemon... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
(minikube) Calling .GetSSHHostname | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
setting minikube options for container-runtime | |
setting minikube options for container-runtime | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
E0328 21:01:30.250785 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
E0328 21:01:30.250785 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Launching plugin server for driver kvm2 | |
Launching plugin server for driver kvm2 | |
Plugin server listening at address 127.0.0.1:40955 | |
Plugin server listening at address 127.0.0.1:40955 | |
() Calling .GetVersion | |
() Calling .GetVersion | |
Using API Version 1 | |
() Calling .SetConfigRaw | |
Using API Version 1 | |
() Calling .SetConfigRaw | |
() Calling .GetMachineName | |
() Calling .GetMachineName | |
(minikube) Calling .GetState | |
(minikube) Calling .GetState | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Waiting for SSH to be available... | |
Getting to WaitForSSH function... | |
Getting to WaitForSSH function... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
exit 0 | |
About to run SSH command: | |
exit 0 | |
Detecting the provisioner... | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
cat /etc/os-release | |
About to run SSH command: | |
cat /etc/os-release | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
found compatible host: buildroot | |
found compatible host: buildroot | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
setting hostname "minikube" | |
setting hostname "minikube" | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
SSH cmd err, output: <nil>: minikube | |
SSH cmd err, output: <nil>: minikube | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
setting up certificates | |
(minikube) Calling .GetMachineName | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
setting up certificates | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetIP | |
(minikube) Calling .GetIP | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Setting Docker configuration on the remote daemon... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
setting minikube options for container-runtime | |
setting minikube options for container-runtime | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
E0328 21:01:35.817734 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
E0328 21:01:35.817734 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Launching plugin server for driver kvm2 | |
Launching plugin server for driver kvm2 | |
Plugin server listening at address 127.0.0.1:42687 | |
Plugin server listening at address 127.0.0.1:42687 | |
() Calling .GetVersion | |
() Calling .GetVersion | |
Using API Version 1 | |
Using API Version 1 | |
() Calling .SetConfigRaw | |
() Calling .SetConfigRaw | |
() Calling .GetMachineName | |
() Calling .GetMachineName | |
(minikube) Calling .GetState | |
(minikube) Calling .GetState | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Waiting for SSH to be available... | |
Getting to WaitForSSH function... | |
Getting to WaitForSSH function... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
exit 0 | |
About to run SSH command: | |
exit 0 | |
Detecting the provisioner... | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
cat /etc/os-release | |
About to run SSH command: | |
cat /etc/os-release | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
found compatible host: buildroot | |
found compatible host: buildroot | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
setting hostname "minikube" | |
setting hostname "minikube" | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
SSH cmd err, output: <nil>: minikube | |
SSH cmd err, output: <nil>: minikube | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
setting up certificates | |
(minikube) Calling .GetMachineName | |
setting up certificates | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetIP | |
(minikube) Calling .GetIP | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Setting Docker configuration on the remote daemon... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
SSH cmd err, output: <nil>: | |
setting minikube options for container-runtime | |
SSH cmd err, output: <nil>: | |
setting minikube options for container-runtime | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
E0328 21:01:41.372250 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
E0328 21:01:41.372250 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Found binary path at /home/ernelson/.bin-override/docker-machine-driver-kvm2 | |
Launching plugin server for driver kvm2 | |
Launching plugin server for driver kvm2 | |
Plugin server listening at address 127.0.0.1:42369 | |
Plugin server listening at address 127.0.0.1:42369 | |
() Calling .GetVersion | |
() Calling .GetVersion | |
Using API Version 1 | |
Using API Version 1 | |
() Calling .SetConfigRaw | |
() Calling .SetConfigRaw | |
() Calling .GetMachineName | |
() Calling .GetMachineName | |
(minikube) Calling .GetState | |
(minikube) Calling .GetState | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Waiting for SSH to be available... | |
Getting to WaitForSSH function... | |
Getting to WaitForSSH function... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
exit 0 | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
exit 0 | |
Detecting the provisioner... | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
cat /etc/os-release | |
About to run SSH command: | |
cat /etc/os-release | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
SSH cmd err, output: <nil>: NAME=Buildroot | |
VERSION=2017.11 | |
ID=buildroot | |
VERSION_ID=2017.11 | |
PRETTY_NAME="Buildroot 2017.11" | |
found compatible host: buildroot | |
found compatible host: buildroot | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
setting hostname "minikube" | |
setting hostname "minikube" | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
About to run SSH command: | |
sudo hostname minikube && echo "minikube" | sudo tee /etc/hostname | |
SSH cmd err, output: <nil>: minikube | |
SSH cmd err, output: <nil>: minikube | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
About to run SSH command: | |
if ! grep -xq '.*\sminikube' /etc/hosts; then | |
if grep -xq '127.0.1.1\s.*' /etc/hosts; then | |
sudo sed -i 's/^127.0.1.1\s.*/127.0.1.1 minikube/g' /etc/hosts; | |
else | |
echo '127.0.1.1 minikube' | sudo tee -a /etc/hosts; | |
fi | |
fi | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
setting up certificates | |
(minikube) Calling .GetMachineName | |
set auth options {CertDir:/home/ernelson/.minikube CaCertPath:/home/ernelson/.minikube/certs/ca.pem CaPrivateKeyPath:/home/ernelson/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/ernelson/.minikube/machines/server.pem ServerKeyPath:/home/ernelson/.minikube/machines/server-key.pem ClientKeyPath:/home/ernelson/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/ernelson/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/ernelson/.minikube} | |
setting up certificates | |
(minikube) Calling .GetMachineName | |
(minikube) Calling .GetIP | |
(minikube) Calling .GetIP | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
generating server cert: /home/ernelson/.minikube/machines/server.pem ca-key=/home/ernelson/.minikube/certs/ca.pem private-key=/home/ernelson/.minikube/certs/ca-key.pem org=ernelson.minikube san=[192.168.39.151 localhost] | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .DriverName | |
(minikube) Calling .DriverName | |
Setting Docker configuration on the remote daemon... | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
About to run SSH command: | |
sudo mkdir -p /lib/systemd/system && printf %s "[Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP $MAINPID | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
" | sudo tee /lib/systemd/system/docker.service | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
SSH cmd err, output: <nil>: [Unit] | |
Description=Docker Application Container Engine | |
Documentation=https://docs.docker.com | |
After=network.target docker.socket | |
Requires=docker.socket | |
[Service] | |
Type=notify | |
# DOCKER_RAMDISK disables pivot_root in Docker, using MS_MOVE instead. | |
Environment=DOCKER_RAMDISK=yes | |
# This file is a systemd drop-in unit that inherits from the base dockerd configuration. | |
# The base configuration already specifies an 'ExecStart=...' command. The first directive | |
# here is to clear out that command inherited from the base configuration. Without this, | |
# the command from the base configuration and the command specified here are treated as | |
# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd | |
# will catch this invalid input and refuse to start the service with an error like: | |
# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services. | |
ExecStart= | |
ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=kvm2 --insecure-registry 10.96.0.0/12 | |
ExecReload=/bin/kill -s HUP | |
# Having non-zero Limit*s causes performance problems due to accounting overhead | |
# in the kernel. We recommend using cgroups to do container-local accounting. | |
LimitNOFILE=infinity | |
LimitNPROC=infinity | |
LimitCORE=infinity | |
# Uncomment TasksMax if your systemd version supports it. | |
# Only systemd 226 and above support this version. | |
TasksMax=infinity | |
TimeoutStartSec=0 | |
# set delegate yes so that systemd does not reset the cgroups of docker containers | |
Delegate=yes | |
# kill only the docker process, not all processes in the cgroup | |
KillMode=process | |
[Install] | |
WantedBy=multi-user.target | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
About to run SSH command: | |
sudo systemctl -f restart docker | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
setting minikube options for container-runtime | |
setting minikube options for container-runtime | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo mkdir -p /etc/sysconfig && printf %s " | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
" | sudo tee /etc/sysconfig/crio.minikube | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
SSH cmd err, output: <nil>: | |
CRIO_MINIKUBE_OPTIONS='--insecure-registry 10.96.0.0/12 ' | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
About to run SSH command: | |
sudo systemctl daemon-reload | |
SSH cmd err, output: <nil>: | |
SSH cmd err, output: <nil>: | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHHostname | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHPort | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHKeyPath | |
(minikube) Calling .GetSSHUsername | |
(minikube) Calling .GetSSHUsername | |
Using SSH client type: native | |
Using SSH client type: native | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
&{{{<nil> 0 [] [] []} docker [0x835db0] 0x835d60 [] 0s} 192.168.39.151 22 <nil> <nil>} | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
About to run SSH command: | |
sudo systemctl -f restart crio | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
SSH cmd err, output: Process exited with status 1: Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Error setting container-runtime options during provisioning ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
E0328 21:01:46.822568 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
E0328 21:01:46.822568 23988 start.go:159] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
. | |
Retrying. | |
E0328 21:01:48.822780 23988 start.go:165] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
E0328 21:01:48.822780 23988 start.go:165] Error starting host: Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
Temporary Error: Error configuring auth on host: ssh command error: | |
command : sudo systemctl -f restart crio | |
err : Process exited with status 1 | |
output : Job for crio.service failed because the control process exited with error code. | |
See "systemctl status crio.service" and "journalctl -xe" for details. | |
================================================================================ | |
An error has occurred. Would you like to opt in to sending anonymized crash | |
information to minikube to help prevent future errors? | |
To opt out of these messages, run the command: | |
minikube config set WantReportErrorPrompt false | |
================================================================================ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment