Created
November 1, 2021 22:34
-
-
Save exocode/0112ff9eb8e164454844ff82482e9a70 to your computer and use it in GitHub Desktop.
Kubedb logs
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
❯ k logs -n kubedb kubedb-kubedb-community-6d65bcb74d-dzcnw | |
I1101 22:29:29.460044 1 log.go:184] FLAG: --add-dir-header=“false” | |
I1101 22:29:29.460092 1 log.go:184] FLAG: --alsologtostderr=“false” | |
I1101 22:29:29.460097 1 log.go:184] FLAG: --bypass-validating-webhook-xray=“false” | |
I1101 22:29:29.460100 1 log.go:184] FLAG: --enable-analytics=“true” | |
I1101 22:29:29.460103 1 log.go:184] FLAG: --log-backtrace-at=“:0” | |
I1101 22:29:29.460105 1 log.go:184] FLAG: --log-dir=“” | |
I1101 22:29:29.460108 1 log.go:184] FLAG: --log-file=“” | |
I1101 22:29:29.460111 1 log.go:184] FLAG: --log-file-max-size=“1800" | |
I1101 22:29:29.460114 1 log.go:184] FLAG: --log-flush-frequency=“5s” | |
I1101 22:29:29.460117 1 log.go:184] FLAG: --logtostderr=“true” | |
I1101 22:29:29.460119 1 log.go:184] FLAG: --one-output=“false” | |
I1101 22:29:29.460124 1 log.go:184] FLAG: --skip-headers=“false” | |
I1101 22:29:29.460127 1 log.go:184] FLAG: --skip-log-headers=“false” | |
I1101 22:29:29.460130 1 log.go:184] FLAG: --stderrthreshold=“2" | |
I1101 22:29:29.460136 1 log.go:184] FLAG: --use-kubeapiserver-fqdn-for-aks=“true” | |
I1101 22:29:29.460139 1 log.go:184] FLAG: --v=“3" | |
I1101 22:29:29.460142 1 log.go:184] FLAG: --vmodule=“” | |
I1101 22:29:32.029292 1 run.go:41] Starting kubedb-server... | |
I1101 22:29:32.029911 1 dynamic_serving_content.go:111] Loaded a new cert/key pair for “serving-cert::/var/serving-cert/tls.crt::/var/serving-cert/tls.key” | |
I1101 22:29:32.563930 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController | |
I1101 22:29:32.565091 1 audit.go:301] No audit policy file provided, no events will be recorded for log backend | |
Error: license status expired | |
Usage: | |
kubedb-operator run [flags] | |
Flags: | |
--audit-log-batch-buffer-size int The size of the buffer to store events before batching and writing. Only used in batch mode. (default 10000) | |
--audit-log-batch-max-size int The maximum size of a batch. Only used in batch mode. (default 1) | |
--audit-log-batch-max-wait duration The amount of time to wait before force writing the batch that hadn’t reached the max size. Only used in batch mode. | |
--audit-log-batch-throttle-burst int Maximum number of requests sent at the same moment if ThrottleQPS was not utilized before. Only used in batch mode. | |
--audit-log-batch-throttle-enable Whether batching throttling is enabled. Only used in batch mode. | |
--audit-log-batch-throttle-qps float32 Maximum average number of batches per second. Only used in batch mode. | |
--audit-log-compress If set, the rotated log files will be compressed using gzip. | |
--audit-log-format string Format of saved audits. “legacy” indicates 1-line text format for each event. “json” indicates structured json format. Known formats are legacy,json. (default “json”) | |
--audit-log-maxage int The maximum number of days to retain old audit log files based on the timestamp encoded in their filename. | |
--audit-log-maxbackup int The maximum number of old audit log files to retain. | |
--audit-log-maxsize int The maximum size in megabytes of the audit log file before it gets rotated. | |
--audit-log-mode string Strategy for sending audit events. Blocking indicates sending events should block server responses. Batch causes the backend to buffer and write events asynchronously. Known modes are batch,blocking,blocking-strict. (default “blocking”) | |
--audit-log-path string If set, all requests coming to the apiserver will be logged to this file. ‘-’ means standard out. | |
--audit-log-truncate-enabled Whether event and batch truncating is enabled. | |
--audit-log-truncate-max-batch-size int Maximum size of the batch sent to the underlying backend. Actual serialized size can be several hundreds of bytes greater. If a batch exceeds this limit, it is split into several batches of smaller size. (default 10485760) | |
--audit-log-truncate-max-event-size int Maximum size of the audit event sent to the underlying backend. If the size of an event is greater than this number, first request and response are removed, and if this doesn’t reduce the size enough, event is discarded. (default 102400) | |
--audit-log-version string API group and version used for serializing audit events written to log. (default “audit.k8s.io/v1”) | |
--audit-policy-file string Path to the file that defines the audit policy configuration. | |
--audit-webhook-batch-buffer-size int The size of the buffer to store events before batching and writing. Only used in batch mode. (default 10000) | |
--audit-webhook-batch-max-size int The maximum size of a batch. Only used in batch mode. (default 400) | |
--audit-webhook-batch-max-wait duration The amount of time to wait before force writing the batch that hadn’t reached the max size. Only used in batch mode. (default 30s) | |
--audit-webhook-batch-throttle-burst int Maximum number of requests sent at the same moment if ThrottleQPS was not utilized before. Only used in batch mode. (default 15) | |
--audit-webhook-batch-throttle-enable Whether batching throttling is enabled. Only used in batch mode. (default true) | |
--audit-webhook-batch-throttle-qps float32 Maximum average number of batches per second. Only used in batch mode. (default 10) | |
--audit-webhook-config-file string Path to a kubeconfig formatted file that defines the audit webhook configuration. | |
--audit-webhook-initial-backoff duration The amount of time to wait before retrying the first failed request. (default 10s) | |
--audit-webhook-mode string Strategy for sending audit events. Blocking indicates sending events should block server responses. Batch causes the backend to buffer and write events asynchronously. Known modes are batch,blocking,blocking-strict. (default “batch”) | |
--audit-webhook-truncate-enabled Whether event and batch truncating is enabled. | |
--audit-webhook-truncate-max-batch-size int Maximum size of the batch sent to the underlying backend. Actual serialized size can be several hundreds of bytes greater. If a batch exceeds this limit, it is split into several batches of smaller size. (default 10485760) | |
--audit-webhook-truncate-max-event-size int Maximum size of the audit event sent to the underlying backend. If the size of an event is greater than this number, first request and response are removed, and if this doesn’t reduce the size enough, event is discarded. (default 102400) | |
--audit-webhook-version string API group and version used for serializing audit events written to webhook. (default “audit.k8s.io/v1”) | |
--authentication-kubeconfig string kubeconfig file pointing at the ‘core’ kubernetes server with enough rights to create tokenreviews.authentication.k8s.io. | |
--authentication-skip-lookup If false, the authentication-kubeconfig will be used to lookup missing authentication configuration from the cluster. | |
--authentication-token-webhook-cache-ttl duration The duration to cache responses from the webhook token authenticator. (default 10s) | |
--authentication-tolerate-lookup-failure If true, failures to look up missing authentication configuration from the cluster are not considered fatal. Note that this can result in authentication that treats all requests as anonymous. | |
--authorization-always-allow-paths strings A list of HTTP paths to skip during authorization, i.e. these are authorized without contacting the ‘core’ kubernetes server. (default [/healthz,/readyz,/livez]) | |
--authorization-kubeconfig string kubeconfig file pointing at the ‘core’ kubernetes server with enough rights to create subjectaccessreviews.authorization.k8s.io. | |
--authorization-webhook-cache-authorized-ttl duration The duration to cache ‘authorized’ responses from the webhook authorizer. (default 10s) | |
--authorization-webhook-cache-unauthorized-ttl duration The duration to cache ‘unauthorized’ responses from the webhook authorizer. (default 10s) | |
--bind-address ip The IP address on which to listen for the --secure-port port. The associated interface(s) must be reachable by the rest of the cluster, and by CLI/web clients. If blank or an unspecified address (0.0.0.0 or ::), all interfaces will be used. (default 0.0.0.0) | |
--burst int The maximum burst for throttle (default 1000000) | |
--cert-dir string The directory where the TLS certs are located. If --tls-cert-file and --tls-private-key-file are provided, this flag will be ignored. (default “apiserver.local.config/certificates”) | |
--client-ca-file string If set, any request presenting a client certificate signed by one of the authorities in the client-ca-file is authenticated with an identity corresponding to the CommonName of the client certificate. | |
--contention-profiling Enable lock contention profiling, if profiling is enabled | |
--egress-selector-config-file string File with apiserver egress selector configuration. | |
--enable-mutating-webhook If true, enables mutating webhooks for KubeDB CRDs. (default false) | |
--enable-validating-webhook If true, enables validating webhooks for KubeDB CRDs. (default false) | |
-h, --help help for run | |
--http2-max-streams-per-connection int The limit that the server gives to clients for the maximum number of streams in an HTTP/2 connection. Zero means to use golang’s default. (default 1000) | |
--kubeconfig string kubeconfig file pointing at the ‘core’ kubernetes server. | |
--label-key-blacklist strings list of keys that are not propagated from a CRD object to its offshoots (default [app.kubernetes.io/name,app.kubernetes.io/version,app.kubernetes.io/instance,app.kubernetes.io/managed-by]) | |
--license-file string Path to license file (default “”) | |
--permit-address-sharing If true, SO_REUSEADDR will be used when binding the port. This allows binding to wildcard IPs like 0.0.0.0 and specific IPs in parallel, and it avoids waiting for the kernel to release sockets in TIME_WAIT state. [default=false] | |
--permit-port-sharing If true, SO_REUSEPORT will be used when binding the port, which allows more than one instance to bind on the same address and port. [default=false] | |
--profiling Enable profiling via web interface host:port/debug/pprof/ (default true) | |
--qps float The maximum QPS to the master from this client (default 1e+06) | |
--readiness-probe-interval duration The time between two consecutive health checks that the operator performs to the database. (default 10s) | |
--requestheader-allowed-names strings List of client certificate common names to allow to provide usernames in headers specified by --requestheader-username-headers. If empty, any client certificate validated by the authorities in --requestheader-client-ca-file is allowed. | |
--requestheader-client-ca-file string Root certificate bundle to use to verify client certificates on incoming requests before trusting usernames in headers specified by --requestheader-username-headers. WARNING: generally do not depend on authorization being already done for incoming requests. | |
--requestheader-extra-headers-prefix strings List of request header prefixes to inspect. X-Remote-Extra- is suggested. (default [x-remote-extra-]) | |
--requestheader-group-headers strings List of request headers to inspect for groups. X-Remote-Group is suggested. (default [x-remote-group]) | |
--requestheader-username-headers strings List of request headers to inspect for usernames. X-Remote-User is common. (default [x-remote-user]) | |
--resync-period duration If non-zero, will re-list this often. Otherwise, re-list will be delayed aslong as possible (until the upstream source closes the watch or times out. (default 10m0s) | |
--secure-port int The port on which to serve HTTPS with authentication and authorization. If 0, don’t serve HTTPS at all. (default 443) | |
--tls-cert-file string File containing the default x509 Certificate for HTTPS. (CA cert, if any, concatenated after server cert). If HTTPS serving is enabled, and --tls-cert-file and --tls-private-key-file are not provided, a self-signed certificate and key are generated for the public address and saved to the directory specified by --cert-dir. | |
--tls-cipher-suites strings Comma-separated list of cipher suites for the server. If omitted, the default Go cipher suites will be used. | |
Preferred values: TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384. | |
Insecure values: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_RC4_128_SHA. | |
--tls-min-version string Minimum TLS version supported. Possible values: VersionTLS10, VersionTLS11, VersionTLS12, VersionTLS13 | |
--tls-private-key-file string File containing the default x509 private key matching --tls-cert-file. | |
--tls-sni-cert-key namedCertKey A pair of x509 certificate and private key file paths, optionally suffixed with a list of domain patterns which are fully qualified domain names, possibly with prefixed wildcard segments. The domain patterns also allow IP addresses, but IPs should only be used if the apiserver has visibility to the IP address requested by a client. If no domain patterns are provided, the names of the certificate are extracted. Non-wildcard matches trump over wildcard matches, explicit domain patterns trump over extracted names. For multiple key/certificate pairs, use the --tls-sni-cert-key multiple times. Examples: “example.crt,example.key” or “foo.crt,foo.key:*.foo.com,foo.com”. (default []) | |
Global Flags: | |
--add-dir-header If true, adds the file directory to the header of the log messages | |
--alsologtostderr log to standard error as well as files | |
--bypass-validating-webhook-xray if true, bypasses validating webhook xray checks | |
--enable-analytics Send analytical events to Google Analytics (default true) | |
--log-backtrace-at traceLocation when logging hits line file:N, emit a stack trace (default :0) | |
--log-dir string If non-empty, write log files in this directory | |
--log-file string If non-empty, use this log file | |
--log-file-max-size uint Defines the maximum size a log file can grow to. Unit is megabytes. If the value is 0, the maximum file size is unlimited. (default 1800) | |
--log-flush-frequency duration Maximum number of seconds between log flushes (default 5s) | |
--logtostderr log to standard error instead of files (default true) | |
--one-output If true, only write logs to their native severity level (vs also writing to each lower severity level) | |
--skip-headers If true, avoid header prefixes in the log messages | |
--skip-log-headers If true, avoid headers when opening log files | |
--stderrthreshold severity logs at or above this threshold go to stderr (default 2) | |
--use-kubeapiserver-fqdn-for-aks if true, uses kube-apiserver FQDN for AKS cluster to workaround https://github.com/Azure/AKS/issues/522 (default true) | |
-v, --v Level number for the log level verbosity (default 0) | |
--vmodule moduleSpec comma-separated list of pattern=N settings for file-filtered logging | |
F1101 22:29:32.585350 1 main.go:35] license status expired | |
goroutine 1 [running]: | |
k8s.io/klog/v2.stacks(0x1) | |
/src/vendor/k8s.io/klog/v2/klog.go:1021 +0x8a | |
k8s.io/klog/v2.(*loggingT).output(0x6f5fa80, 0x3, {0x0, 0x0}, 0xc0030d3f80, {0x59f2388, 0xc000071c00}, 0xc00237c710, 0x0) | |
/src/vendor/k8s.io/klog/v2/klog.go:970 +0x569 | |
k8s.io/klog/v2.(*loggingT).printDepth(0x6f60c20, 0x9a000, {0x0, 0x0}, {0x0, 0x0}, 0x60, {0xc00237c710, 0x1, 0x1}) | |
/src/vendor/k8s.io/klog/v2/klog.go:733 +0x191 | |
k8s.io/klog/v2.(*loggingT).print(...) | |
/src/vendor/k8s.io/klog/v2/klog.go:715 | |
k8s.io/klog/v2.Fatal(...) | |
/src/vendor/k8s.io/klog/v2/klog.go:1489 | |
main.main() | |
/src/cmd/operator/main.go:35 +0xfe | |
goroutine 6 [chan receive]: | |
k8s.io/klog/v2.(*loggingT).flushDaemon(0x0) | |
/src/vendor/k8s.io/klog/v2/klog.go:1164 +0x6a | |
created by k8s.io/klog/v2.init.0 | |
/src/vendor/k8s.io/klog/v2/klog.go:418 +0xfb | |
goroutine 21 [IO wait]: | |
internal/poll.runtime_pollWait(0x7f76dce54b70, 0x72) | |
/usr/local/go/src/runtime/netpoll.go:229 +0x89 | |
internal/poll.(*pollDesc).wait(0xc000355a00, 0xc00451a000, 0x0) | |
/usr/local/go/src/internal/poll/fd_poll_runtime.go:84 +0x32 | |
internal/poll.(*pollDesc).waitRead(...) | |
/usr/local/go/src/internal/poll/fd_poll_runtime.go:89 | |
internal/poll.(*FD).Read(0xc000355a00, {0xc00451a000, 0x1811, 0x1811}) | |
/usr/local/go/src/internal/poll/fd_unix.go:167 +0x25a | |
net.(*netFD).Read(0xc000355a00, {0xc00451a000, 0xc00451a047, 0x229}) | |
/usr/local/go/src/net/fd_posix.go:56 +0x29 | |
net.(*conn).Read(0xc00054e198, {0xc00451a000, 0x4f77fe, 0xc0006d37f0}) | |
/usr/local/go/src/net/net.go:183 +0x45 | |
crypto/tls.(*atLeastReader).Read(0xc002cca540, {0xc00451a000, 0x0, 0x409bcd}) | |
/usr/local/go/src/crypto/tls/conn.go:777 +0x3d | |
bytes.(*Buffer).ReadFrom(0xc0000a9078, {0x4e62220, 0xc002cca540}) | |
/usr/local/go/src/bytes/buffer.go:204 +0x98 | |
crypto/tls.(*Conn).readFromUntil(0xc0000a8e00, {0x4e660a0, 0xc00054e198}, 0x17cf) | |
/usr/local/go/src/crypto/tls/conn.go:799 +0xe5 | |
crypto/tls.(*Conn).readRecordOrCCS(0xc0000a8e00, 0x0) | |
/usr/local/go/src/crypto/tls/conn.go:606 +0x112 | |
crypto/tls.(*Conn).readRecord(...) | |
/usr/local/go/src/crypto/tls/conn.go:574 | |
crypto/tls.(*Conn).Read(0xc0000a8e00, {0xc00013b000, 0x1000, 0xc0046646c0}) | |
/usr/local/go/src/crypto/tls/conn.go:1277 +0x16f | |
bufio.(*Reader).Read(0xc000352480, {0xc00004a1f8, 0x9, 0xc00466a8c0}) | |
/usr/local/go/src/bufio/bufio.go:227 +0x1b4 | |
io.ReadAtLeast({0x4e62020, 0xc000352480}, {0xc00004a1f8, 0x9, 0x9}, 0x9) | |
/usr/local/go/src/io/io.go:328 +0x9a | |
io.ReadFull(...) | |
/usr/local/go/src/io/io.go:347 | |
golang.org/x/net/http2.readFrameHeader({0xc00004a1f8, 0x9, 0xc000071c00}, {0x4e62020, 0xc000352480}) | |
/src/vendor/golang.org/x/net/http2/frame.go:237 +0x6e | |
golang.org/x/net/http2.(*Framer).ReadFrame(0xc00004a1c0) | |
/src/vendor/golang.org/x/net/http2/frame.go:492 +0x95 | |
golang.org/x/net/http2.(*clientConnReadLoop).run(0xc0006d3fa0) | |
/src/vendor/golang.org/x/net/http2/transport.go:1819 +0x165 | |
golang.org/x/net/http2.(*ClientConn).readLoop(0xc0003b2180) | |
/src/vendor/golang.org/x/net/http2/transport.go:1741 +0x79 | |
created by golang.org/x/net/http2.(*Transport).newClientConn | |
/src/vendor/golang.org/x/net/http2/transport.go:705 +0xb45 | |
goroutine 92 [chan receive]: | |
k8s.io/apiserver/pkg/server.SetupSignalContext.func1() | |
/src/vendor/k8s.io/apiserver/pkg/server/signal.go:48 +0x2b | |
created by k8s.io/apiserver/pkg/server.SetupSignalContext | |
/src/vendor/k8s.io/apiserver/pkg/server/signal.go:47 +0xe7 | |
goroutine 89 [select]: | |
go.opencensus.io/stats/view.(*worker).start(0xc000098410) | |
/src/vendor/go.opencensus.io/stats/view/worker.go:154 +0xb9 | |
created by go.opencensus.io/stats/view.init.0 | |
/src/vendor/go.opencensus.io/stats/view/worker.go:32 +0x87 | |
goroutine 71 [sleep]: | |
time.Sleep(0x6fc23ac00) | |
/usr/local/go/src/runtime/time.go:193 +0x12e | |
sigs.k8s.io/controller-runtime/pkg/log.init.0.func1() | |
/src/vendor/sigs.k8s.io/controller-runtime/pkg/log/log.go:63 +0x38 | |
created by sigs.k8s.io/controller-runtime/pkg/log.init.0 | |
/src/vendor/sigs.k8s.io/controller-runtime/pkg/log/log.go:62 +0x25 | |
goroutine 80 [syscall]: | |
os/signal.signal_recv() | |
/usr/local/go/src/runtime/sigqueue.go:169 +0x98 | |
os/signal.loop() | |
/usr/local/go/src/os/signal/signal_unix.go:24 +0x19 | |
created by os/signal.Notify.func1.1 | |
/usr/local/go/src/os/signal/signal.go:151 +0x2c | |
goroutine 93 [select]: | |
gomodules.xyz/wait.BackoffUntil(0x0, {0x4e64200, 0xc001de3e60}, 0x1, 0xc00369ab40) | |
/src/vendor/gomodules.xyz/wait/wait.go:166 +0x13b | |
gomodules.xyz/wait.JitterUntil(0x0, 0x12a05f200, 0x0, 0x0, 0x0) | |
/src/vendor/gomodules.xyz/wait/wait.go:132 +0x89 | |
gomodules.xyz/wait.Until(...) | |
/src/vendor/gomodules.xyz/wait/wait.go:89 | |
gomodules.xyz/wait.Forever(0x0, 0x0) | |
/src/vendor/gomodules.xyz/wait/wait.go:80 +0x28 | |
created by gomodules.xyz/logs.InitLogs | |
/src/vendor/gomodules.xyz/logs/lib.go:118 +0x79 | |
goroutine 100 [IO wait]: | |
internal/poll.runtime_pollWait(0x7f76dce54a88, 0x72) | |
/usr/local/go/src/runtime/netpoll.go:229 +0x89 | |
internal/poll.(*pollDesc).wait(0xc002efed00, 0xc005670800, 0x0) | |
/usr/local/go/src/internal/poll/fd_poll_runtime.go:84 +0x32 | |
internal/poll.(*pollDesc).waitRead(...) | |
/usr/local/go/src/internal/poll/fd_poll_runtime.go:89 | |
internal/poll.(*FD).Read(0xc002efed00, {0xc005670800, 0x15cc, 0x15cc}) | |
/usr/local/go/src/internal/poll/fd_unix.go:167 +0x25a | |
net.(*netFD).Read(0xc002efed00, {0xc005670800, 0xc0031ed440, 0x0}) | |
/usr/local/go/src/net/fd_posix.go:56 +0x29 | |
net.(*conn).Read(0xc00054eb10, {0xc005670800, 0x5, 0xc00343f7f0}) | |
/usr/local/go/src/net/net.go:183 +0x45 | |
crypto/tls.(*atLeastReader).Read(0xc001c4e6c0, {0xc005670800, 0x0, 0x409bcd}) | |
/usr/local/go/src/crypto/tls/conn.go:777 +0x3d | |
bytes.(*Buffer).ReadFrom(0xc0031a3078, {0x4e62220, 0xc001c4e6c0}) | |
/usr/local/go/src/bytes/buffer.go:204 +0x98 | |
crypto/tls.(*Conn).readFromUntil(0xc0031a2e00, {0x4e660a0, 0xc00054eb10}, 0x463e3b) | |
/usr/local/go/src/crypto/tls/conn.go:799 +0xe5 | |
crypto/tls.(*Conn).readRecordOrCCS(0xc0031a2e00, 0x0) | |
/usr/local/go/src/crypto/tls/conn.go:606 +0x112 | |
crypto/tls.(*Conn).readRecord(...) | |
/usr/local/go/src/crypto/tls/conn.go:574 | |
crypto/tls.(*Conn).Read(0xc0031a2e00, {0xc0036a0000, 0x1000, 0xc00343fcd0}) | |
/usr/local/go/src/crypto/tls/conn.go:1277 +0x16f | |
bufio.(*Reader).Read(0xc003677740, {0xc003665458, 0x9, 0xc00343fd10}) | |
/usr/local/go/src/bufio/bufio.go:227 +0x1b4 | |
io.ReadAtLeast({0x4e62020, 0xc003677740}, {0xc003665458, 0x9, 0x9}, 0x9) | |
/usr/local/go/src/io/io.go:328 +0x9a | |
io.ReadFull(...) | |
/usr/local/go/src/io/io.go:347 | |
net/http.http2readFrameHeader({0xc003665458, 0x9, 0x69d86b}, {0x4e62020, 0xc003677740}) | |
/usr/local/go/src/net/http/h2_bundle.go:1553 +0x6e | |
net/http.(*http2Framer).ReadFrame(0xc003665420) | |
/usr/local/go/src/net/http/h2_bundle.go:1811 +0x95 | |
net/http.(*http2clientConnReadLoop).run(0xc00343ffa0) | |
/usr/local/go/src/net/http/h2_bundle.go:8437 +0x165 | |
net/http.(*http2ClientConn).readLoop(0xc0003b2d80) | |
/usr/local/go/src/net/http/h2_bundle.go:8359 +0x79 | |
created by net/http.(*http2Transport).newClientConn | |
/usr/local/go/src/net/http/h2_bundle.go:7311 +0xb45 | |
goroutine 121 [chan receive]: | |
kmodules.xyz/client-go/tools/cli.SendPeriodicAnalytics.func2() | |
/src/vendor/kmodules.xyz/client-go/tools/cli/cli.go:57 +0x85 | |
created by kmodules.xyz/client-go/tools/cli.SendPeriodicAnalytics | |
/src/vendor/kmodules.xyz/client-go/tools/cli/cli.go:56 +0xd3 | |
goroutine 122 [chan receive]: | |
k8s.io/client-go/util/workqueue.(*Type).updateUnfinishedWorkLoop(0xc00378a8a0) | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:204 +0xa7 | |
created by k8s.io/client-go/util/workqueue.newQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:62 +0x1af | |
goroutine 123 [select]: | |
k8s.io/client-go/util/workqueue.(*delayingType).waitingLoop(0xc00378aa20) | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:231 +0x34e | |
created by k8s.io/client-go/util/workqueue.newDelayingQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:68 +0x23b | |
goroutine 124 [chan receive]: | |
k8s.io/client-go/util/workqueue.(*Type).updateUnfinishedWorkLoop(0xc0044d1200) | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:204 +0xa7 | |
created by k8s.io/client-go/util/workqueue.newQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:62 +0x1af | |
goroutine 125 [select]: | |
k8s.io/client-go/util/workqueue.(*delayingType).waitingLoop(0xc0044d1380) | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:231 +0x34e | |
created by k8s.io/client-go/util/workqueue.newDelayingQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:68 +0x23b | |
goroutine 126 [chan receive]: | |
k8s.io/client-go/util/workqueue.(*Type).updateUnfinishedWorkLoop(0xc0044d13e0) | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:204 +0xa7 | |
created by k8s.io/client-go/util/workqueue.newQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:62 +0x1af | |
goroutine 127 [select]: | |
k8s.io/client-go/util/workqueue.(*delayingType).waitingLoop(0xc0044d1500) | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:231 +0x34e | |
created by k8s.io/client-go/util/workqueue.newDelayingQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:68 +0x23b | |
goroutine 128 [chan receive]: | |
k8s.io/client-go/util/workqueue.(*Type).updateUnfinishedWorkLoop(0xc0044d15c0) | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:204 +0xa7 | |
created by k8s.io/client-go/util/workqueue.newQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:62 +0x1af | |
goroutine 129 [select]: | |
k8s.io/client-go/util/workqueue.(*delayingType).waitingLoop(0xc0044d1740) | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:231 +0x34e | |
created by k8s.io/client-go/util/workqueue.newDelayingQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:68 +0x23b | |
goroutine 134 [select]: | |
net/http.(*persistConn).readLoop(0xc0037cd8c0) | |
/usr/local/go/src/net/http/transport.go:2207 +0xd8a | |
created by net/http.(*Transport).dialConn | |
/usr/local/go/src/net/http/transport.go:1747 +0x1e05 | |
goroutine 135 [select]: | |
net/http.(*persistConn).writeLoop(0xc0037cd8c0) | |
/usr/local/go/src/net/http/transport.go:2386 +0xfb | |
created by net/http.(*Transport).dialConn | |
/usr/local/go/src/net/http/transport.go:1748 +0x1e65 | |
~/Coding/RubymineProjects/metashop/development/k8s/kubedb master +9 !2 ?2 ─────────────────────────────────── | |
❯ | |
####################################################################### | |
~/Coding/RubymineProjects/metashop/development/k8s/kubedb master +9 !2 ?2 ────────────────────── minikube ⎈ | |
❯ kubectl logs -n kubedb deploy/kubedb-kubedb-community --previous | |
I1101 22:33:59.897422 1 log.go:184] FLAG: --add-dir-header="false" | |
I1101 22:33:59.897478 1 log.go:184] FLAG: --alsologtostderr="false" | |
I1101 22:33:59.897483 1 log.go:184] FLAG: --bypass-validating-webhook-xray="false" | |
I1101 22:33:59.897520 1 log.go:184] FLAG: --enable-analytics="true" | |
I1101 22:33:59.897526 1 log.go:184] FLAG: --log-backtrace-at=":0" | |
I1101 22:33:59.897530 1 log.go:184] FLAG: --log-dir="" | |
I1101 22:33:59.897534 1 log.go:184] FLAG: --log-file="" | |
I1101 22:33:59.897538 1 log.go:184] FLAG: --log-file-max-size="1800" | |
I1101 22:33:59.897542 1 log.go:184] FLAG: --log-flush-frequency="5s" | |
I1101 22:33:59.897545 1 log.go:184] FLAG: --logtostderr="true" | |
I1101 22:33:59.897549 1 log.go:184] FLAG: --one-output="false" | |
I1101 22:33:59.897553 1 log.go:184] FLAG: --skip-headers="false" | |
I1101 22:33:59.897556 1 log.go:184] FLAG: --skip-log-headers="false" | |
I1101 22:33:59.897560 1 log.go:184] FLAG: --stderrthreshold="2" | |
I1101 22:33:59.897563 1 log.go:184] FLAG: --use-kubeapiserver-fqdn-for-aks="true" | |
I1101 22:33:59.897567 1 log.go:184] FLAG: --v="3" | |
I1101 22:33:59.897570 1 log.go:184] FLAG: --vmodule="" | |
I1101 22:34:00.069153 1 run.go:41] Starting kubedb-server... | |
I1101 22:34:00.069667 1 dynamic_serving_content.go:111] Loaded a new cert/key pair for "serving-cert::/var/serving-cert/tls.crt::/var/serving-cert/tls.key" | |
I1101 22:34:00.496354 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController | |
I1101 22:34:00.497129 1 audit.go:301] No audit policy file provided, no events will be recorded for log backend | |
Error: license status expired | |
Usage: | |
kubedb-operator run [flags] | |
Flags: | |
--audit-log-batch-buffer-size int The size of the buffer to store events before batching and writing. Only used in batch mode. (default 10000) | |
--audit-log-batch-max-size int The maximum size of a batch. Only used in batch mode. (default 1) | |
--audit-log-batch-max-wait duration The amount of time to wait before force writing the batch that hadn't reached the max size. Only used in batch mode. | |
--audit-log-batch-throttle-burst int Maximum number of requests sent at the same moment if ThrottleQPS was not utilized before. Only used in batch mode. | |
--audit-log-batch-throttle-enable Whether batching throttling is enabled. Only used in batch mode. | |
--audit-log-batch-throttle-qps float32 Maximum average number of batches per second. Only used in batch mode. | |
--audit-log-compress If set, the rotated log files will be compressed using gzip. | |
--audit-log-format string Format of saved audits. "legacy" indicates 1-line text format for each event. "json" indicates structured json format. Known formats are legacy,json. (default "json") | |
--audit-log-maxage int The maximum number of days to retain old audit log files based on the timestamp encoded in their filename. | |
--audit-log-maxbackup int The maximum number of old audit log files to retain. | |
--audit-log-maxsize int The maximum size in megabytes of the audit log file before it gets rotated. | |
--audit-log-mode string Strategy for sending audit events. Blocking indicates sending events should block server responses. Batch causes the backend to buffer and write events asynchronously. Known modes are batch,blocking,blocking-strict. (default "blocking") | |
--audit-log-path string If set, all requests coming to the apiserver will be logged to this file. '-' means standard out. | |
--audit-log-truncate-enabled Whether event and batch truncating is enabled. | |
--audit-log-truncate-max-batch-size int Maximum size of the batch sent to the underlying backend. Actual serialized size can be several hundreds of bytes greater. If a batch exceeds this limit, it is split into several batches of smaller size. (default 10485760) | |
--audit-log-truncate-max-event-size int Maximum size of the audit event sent to the underlying backend. If the size of an event is greater than this number, first request and response are removed, and if this doesn't reduce the size enough, event is discarded. (default 102400) | |
--audit-log-version string API group and version used for serializing audit events written to log. (default "audit.k8s.io/v1") | |
--audit-policy-file string Path to the file that defines the audit policy configuration. | |
--audit-webhook-batch-buffer-size int The size of the buffer to store events before batching and writing. Only used in batch mode. (default 10000) | |
--audit-webhook-batch-max-size int The maximum size of a batch. Only used in batch mode. (default 400) | |
--audit-webhook-batch-max-wait duration The amount of time to wait before force writing the batch that hadn't reached the max size. Only used in batch mode. (default 30s) | |
--audit-webhook-batch-throttle-burst int Maximum number of requests sent at the same moment if ThrottleQPS was not utilized before. Only used in batch mode. (default 15) | |
--audit-webhook-batch-throttle-enable Whether batching throttling is enabled. Only used in batch mode. (default true) | |
--audit-webhook-batch-throttle-qps float32 Maximum average number of batches per second. Only used in batch mode. (default 10) | |
--audit-webhook-config-file string Path to a kubeconfig formatted file that defines the audit webhook configuration. | |
--audit-webhook-initial-backoff duration The amount of time to wait before retrying the first failed request. (default 10s) | |
--audit-webhook-mode string Strategy for sending audit events. Blocking indicates sending events should block server responses. Batch causes the backend to buffer and write events asynchronously. Known modes are batch,blocking,blocking-strict. (default "batch") | |
--audit-webhook-truncate-enabled Whether event and batch truncating is enabled. | |
--audit-webhook-truncate-max-batch-size int Maximum size of the batch sent to the underlying backend. Actual serialized size can be several hundreds of bytes greater. If a batch exceeds this limit, it is split into several batches of smaller size. (default 10485760) | |
--audit-webhook-truncate-max-event-size int Maximum size of the audit event sent to the underlying backend. If the size of an event is greater than this number, first request and response are removed, and if this doesn't reduce the size enough, event is discarded. (default 102400) | |
--audit-webhook-version string API group and version used for serializing audit events written to webhook. (default "audit.k8s.io/v1") | |
--authentication-kubeconfig string kubeconfig file pointing at the 'core' kubernetes server with enough rights to create tokenreviews.authentication.k8s.io. | |
--authentication-skip-lookup If false, the authentication-kubeconfig will be used to lookup missing authentication configuration from the cluster. | |
--authentication-token-webhook-cache-ttl duration The duration to cache responses from the webhook token authenticator. (default 10s) | |
--authentication-tolerate-lookup-failure If true, failures to look up missing authentication configuration from the cluster are not considered fatal. Note that this can result in authentication that treats all requests as anonymous. | |
--authorization-always-allow-paths strings A list of HTTP paths to skip during authorization, i.e. these are authorized without contacting the 'core' kubernetes server. (default [/healthz,/readyz,/livez]) | |
--authorization-kubeconfig string kubeconfig file pointing at the 'core' kubernetes server with enough rights to create subjectaccessreviews.authorization.k8s.io. | |
--authorization-webhook-cache-authorized-ttl duration The duration to cache 'authorized' responses from the webhook authorizer. (default 10s) | |
--authorization-webhook-cache-unauthorized-ttl duration The duration to cache 'unauthorized' responses from the webhook authorizer. (default 10s) | |
--bind-address ip The IP address on which to listen for the --secure-port port. The associated interface(s) must be reachable by the rest of the cluster, and by CLI/web clients. If blank or an unspecified address (0.0.0.0 or ::), all interfaces will be used. (default 0.0.0.0) | |
--burst int The maximum burst for throttle (default 1000000) | |
--cert-dir string The directory where the TLS certs are located. If --tls-cert-file and --tls-private-key-file are provided, this flag will be ignored. (default "apiserver.local.config/certificates") | |
--client-ca-file string If set, any request presenting a client certificate signed by one of the authorities in the client-ca-file is authenticated with an identity corresponding to the CommonName of the client certificate. | |
--contention-profiling Enable lock contention profiling, if profiling is enabled | |
--egress-selector-config-file string File with apiserver egress selector configuration. | |
--enable-mutating-webhook If true, enables mutating webhooks for KubeDB CRDs. (default false) | |
--enable-validating-webhook If true, enables validating webhooks for KubeDB CRDs. (default false) | |
-h, --help help for run | |
--http2-max-streams-per-connection int The limit that the server gives to clients for the maximum number of streams in an HTTP/2 connection. Zero means to use golang's default. (default 1000) | |
--kubeconfig string kubeconfig file pointing at the 'core' kubernetes server. | |
--label-key-blacklist strings list of keys that are not propagated from a CRD object to its offshoots (default [app.kubernetes.io/name,app.kubernetes.io/version,app.kubernetes.io/instance,app.kubernetes.io/managed-by]) | |
--license-file string Path to license file (default "") | |
--permit-address-sharing If true, SO_REUSEADDR will be used when binding the port. This allows binding to wildcard IPs like 0.0.0.0 and specific IPs in parallel, and it avoids waiting for the kernel to release sockets in TIME_WAIT state. [default=false] | |
--permit-port-sharing If true, SO_REUSEPORT will be used when binding the port, which allows more than one instance to bind on the same address and port. [default=false] | |
--profiling Enable profiling via web interface host:port/debug/pprof/ (default true) | |
--qps float The maximum QPS to the master from this client (default 1e+06) | |
--readiness-probe-interval duration The time between two consecutive health checks that the operator performs to the database. (default 10s) | |
--requestheader-allowed-names strings List of client certificate common names to allow to provide usernames in headers specified by --requestheader-username-headers. If empty, any client certificate validated by the authorities in --requestheader-client-ca-file is allowed. | |
--requestheader-client-ca-file string Root certificate bundle to use to verify client certificates on incoming requests before trusting usernames in headers specified by --requestheader-username-headers. WARNING: generally do not depend on authorization being already done for incoming requests. | |
--requestheader-extra-headers-prefix strings List of request header prefixes to inspect. X-Remote-Extra- is suggested. (default [x-remote-extra-]) | |
--requestheader-group-headers strings List of request headers to inspect for groups. X-Remote-Group is suggested. (default [x-remote-group]) | |
--requestheader-username-headers strings List of request headers to inspect for usernames. X-Remote-User is common. (default [x-remote-user]) | |
--resync-period duration If non-zero, will re-list this often. Otherwise, re-list will be delayed aslong as possible (until the upstream source closes the watch or times out. (default 10m0s) | |
--secure-port int The port on which to serve HTTPS with authentication and authorization. If 0, don't serve HTTPS at all. (default 443) | |
--tls-cert-file string File containing the default x509 Certificate for HTTPS. (CA cert, if any, concatenated after server cert). If HTTPS serving is enabled, and --tls-cert-file and --tls-private-key-file are not provided, a self-signed certificate and key are generated for the public address and saved to the directory specified by --cert-dir. | |
--tls-cipher-suites strings Comma-separated list of cipher suites for the server. If omitted, the default Go cipher suites will be used. | |
Preferred values: TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384. | |
Insecure values: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_RC4_128_SHA. | |
--tls-min-version string Minimum TLS version supported. Possible values: VersionTLS10, VersionTLS11, VersionTLS12, VersionTLS13 | |
--tls-private-key-file string File containing the default x509 private key matching --tls-cert-file. | |
--tls-sni-cert-key namedCertKey A pair of x509 certificate and private key file paths, optionally suffixed with a list of domain patterns which are fully qualified domain names, possibly with prefixed wildcard segments. The domain patterns also allow IP addresses, but IPs should only be used if the apiserver has visibility to the IP address requested by a client. If no domain patterns are provided, the names of the certificate are extracted. Non-wildcard matches trump over wildcard matches, explicit domain patterns trump over extracted names. For multiple key/certificate pairs, use the --tls-sni-cert-key multiple times. Examples: "example.crt,example.key" or "foo.crt,foo.key:*.foo.com,foo.com". (default []) | |
Global Flags: | |
--add-dir-header If true, adds the file directory to the header of the log messages | |
--alsologtostderr log to standard error as well as files | |
--bypass-validating-webhook-xray if true, bypasses validating webhook xray checks | |
--enable-analytics Send analytical events to Google Analytics (default true) | |
--log-backtrace-at traceLocation when logging hits line file:N, emit a stack trace (default :0) | |
--log-dir string If non-empty, write log files in this directory | |
--log-file string If non-empty, use this log file | |
--log-file-max-size uint Defines the maximum size a log file can grow to. Unit is megabytes. If the value is 0, the maximum file size is unlimited. (default 1800) | |
--log-flush-frequency duration Maximum number of seconds between log flushes (default 5s) | |
--logtostderr log to standard error instead of files (default true) | |
--one-output If true, only write logs to their native severity level (vs also writing to each lower severity level) | |
--skip-headers If true, avoid header prefixes in the log messages | |
--skip-log-headers If true, avoid headers when opening log files | |
--stderrthreshold severity logs at or above this threshold go to stderr (default 2) | |
--use-kubeapiserver-fqdn-for-aks if true, uses kube-apiserver FQDN for AKS cluster to workaround https://github.com/Azure/AKS/issues/522 (default true) | |
-v, --v Level number for the log level verbosity (default 0) | |
--vmodule moduleSpec comma-separated list of pattern=N settings for file-filtered logging | |
F1101 22:34:00.516982 1 main.go:35] license status expired | |
goroutine 1 [running]: | |
k8s.io/klog/v2.stacks(0x1) | |
/src/vendor/k8s.io/klog/v2/klog.go:1021 +0x8a | |
k8s.io/klog/v2.(*loggingT).output(0x6f5fa80, 0x3, {0x0, 0x0}, 0xc0056e40e0, {0x59f2388, 0xc00056a000}, 0xc0037b7110, 0x0) | |
/src/vendor/k8s.io/klog/v2/klog.go:970 +0x569 | |
k8s.io/klog/v2.(*loggingT).printDepth(0x6f60c20, 0x100000, {0x0, 0x0}, {0x0, 0x0}, 0x60, {0xc0037b7110, 0x1, 0x1}) | |
/src/vendor/k8s.io/klog/v2/klog.go:733 +0x191 | |
k8s.io/klog/v2.(*loggingT).print(...) | |
/src/vendor/k8s.io/klog/v2/klog.go:715 | |
k8s.io/klog/v2.Fatal(...) | |
/src/vendor/k8s.io/klog/v2/klog.go:1489 | |
main.main() | |
/src/cmd/operator/main.go:35 +0xfe | |
goroutine 18 [chan receive]: | |
k8s.io/klog/v2.(*loggingT).flushDaemon(0x0) | |
/src/vendor/k8s.io/klog/v2/klog.go:1164 +0x6a | |
created by k8s.io/klog/v2.init.0 | |
/src/vendor/k8s.io/klog/v2/klog.go:418 +0xfb | |
goroutine 116 [chan receive]: | |
kmodules.xyz/client-go/tools/cli.SendPeriodicAnalytics.func2() | |
/src/vendor/kmodules.xyz/client-go/tools/cli/cli.go:57 +0x85 | |
created by kmodules.xyz/client-go/tools/cli.SendPeriodicAnalytics | |
/src/vendor/kmodules.xyz/client-go/tools/cli/cli.go:56 +0xd3 | |
goroutine 46 [IO wait]: | |
internal/poll.runtime_pollWait(0x7ff6856d13b0, 0x72) | |
/usr/local/go/src/runtime/netpoll.go:229 +0x89 | |
internal/poll.(*pollDesc).wait(0xc000444c80, 0xc00160f300, 0x0) | |
/usr/local/go/src/internal/poll/fd_poll_runtime.go:84 +0x32 | |
internal/poll.(*pollDesc).waitRead(...) | |
/usr/local/go/src/internal/poll/fd_poll_runtime.go:89 | |
internal/poll.(*FD).Read(0xc000444c80, {0xc00160f300, 0x1810, 0x1810}) | |
/usr/local/go/src/internal/poll/fd_unix.go:167 +0x25a | |
net.(*netFD).Read(0xc000444c80, {0xc00160f300, 0xc00160f347, 0x229}) | |
/usr/local/go/src/net/fd_posix.go:56 +0x29 | |
net.(*conn).Read(0xc0002f45e8, {0xc00160f300, 0x4f77fe, 0xc00057b7f0}) | |
/usr/local/go/src/net/net.go:183 +0x45 | |
crypto/tls.(*atLeastReader).Read(0xc003d5cb10, {0xc00160f300, 0x0, 0x409bcd}) | |
/usr/local/go/src/crypto/tls/conn.go:777 +0x3d | |
bytes.(*Buffer).ReadFrom(0xc0004805f8, {0x4e62220, 0xc003d5cb10}) | |
/usr/local/go/src/bytes/buffer.go:204 +0x98 | |
crypto/tls.(*Conn).readFromUntil(0xc000480380, {0x4e660a0, 0xc0002f45e8}, 0x17ce) | |
/usr/local/go/src/crypto/tls/conn.go:799 +0xe5 | |
crypto/tls.(*Conn).readRecordOrCCS(0xc000480380, 0x0) | |
/usr/local/go/src/crypto/tls/conn.go:606 +0x112 | |
crypto/tls.(*Conn).readRecord(...) | |
/usr/local/go/src/crypto/tls/conn.go:574 | |
crypto/tls.(*Conn).Read(0xc000480380, {0xc0003b6000, 0x1000, 0xc0046a03c0}) | |
/usr/local/go/src/crypto/tls/conn.go:1277 +0x16f | |
bufio.(*Reader).Read(0xc0003734a0, {0xc0003821f8, 0x9, 0xc0046a48c0}) | |
/usr/local/go/src/bufio/bufio.go:227 +0x1b4 | |
io.ReadAtLeast({0x4e62020, 0xc0003734a0}, {0xc0003821f8, 0x9, 0x9}, 0x9) | |
/usr/local/go/src/io/io.go:328 +0x9a | |
io.ReadFull(...) | |
/usr/local/go/src/io/io.go:347 | |
golang.org/x/net/http2.readFrameHeader({0xc0003821f8, 0x9, 0xc000070400}, {0x4e62020, 0xc0003734a0}) | |
/src/vendor/golang.org/x/net/http2/frame.go:237 +0x6e | |
golang.org/x/net/http2.(*Framer).ReadFrame(0xc0003821c0) | |
/src/vendor/golang.org/x/net/http2/frame.go:492 +0x95 | |
golang.org/x/net/http2.(*clientConnReadLoop).run(0xc00057bfa0) | |
/src/vendor/golang.org/x/net/http2/transport.go:1819 +0x165 | |
golang.org/x/net/http2.(*ClientConn).readLoop(0xc0001d2c00) | |
/src/vendor/golang.org/x/net/http2/transport.go:1741 +0x79 | |
created by golang.org/x/net/http2.(*Transport).newClientConn | |
/src/vendor/golang.org/x/net/http2/transport.go:705 +0xb45 | |
goroutine 48 [select]: | |
gomodules.xyz/wait.BackoffUntil(0xc0000e5fa0, {0x4e64200, 0xc002cab560}, 0x1, 0xc0043b3380) | |
/src/vendor/gomodules.xyz/wait/wait.go:166 +0x13b | |
gomodules.xyz/wait.JitterUntil(0x3725730, 0x12a05f200, 0x0, 0xa5, 0x82d400) | |
/src/vendor/gomodules.xyz/wait/wait.go:132 +0x89 | |
gomodules.xyz/wait.Until(...) | |
/src/vendor/gomodules.xyz/wait/wait.go:89 | |
gomodules.xyz/wait.Forever(0xc00010c580, 0xc0001d2c00) | |
/src/vendor/gomodules.xyz/wait/wait.go:80 +0x28 | |
created by gomodules.xyz/logs.InitLogs | |
/src/vendor/gomodules.xyz/logs/lib.go:118 +0x79 | |
goroutine 62 [sleep]: | |
time.Sleep(0x6fc23ac00) | |
/usr/local/go/src/runtime/time.go:193 +0x12e | |
sigs.k8s.io/controller-runtime/pkg/log.init.0.func1() | |
/src/vendor/sigs.k8s.io/controller-runtime/pkg/log/log.go:63 +0x38 | |
created by sigs.k8s.io/controller-runtime/pkg/log.init.0 | |
/src/vendor/sigs.k8s.io/controller-runtime/pkg/log/log.go:62 +0x25 | |
goroutine 83 [select]: | |
go.opencensus.io/stats/view.(*worker).start(0xc0003d01e0) | |
/src/vendor/go.opencensus.io/stats/view/worker.go:154 +0xb9 | |
created by go.opencensus.io/stats/view.init.0 | |
/src/vendor/go.opencensus.io/stats/view/worker.go:32 +0x87 | |
goroutine 47 [chan receive]: | |
k8s.io/apiserver/pkg/server.SetupSignalContext.func1() | |
/src/vendor/k8s.io/apiserver/pkg/server/signal.go:48 +0x2b | |
created by k8s.io/apiserver/pkg/server.SetupSignalContext | |
/src/vendor/k8s.io/apiserver/pkg/server/signal.go:47 +0xe7 | |
goroutine 93 [syscall]: | |
os/signal.signal_recv() | |
/usr/local/go/src/runtime/sigqueue.go:169 +0x98 | |
os/signal.loop() | |
/usr/local/go/src/os/signal/signal_unix.go:24 +0x19 | |
created by os/signal.Notify.func1.1 | |
/usr/local/go/src/os/signal/signal.go:151 +0x2c | |
goroutine 105 [IO wait]: | |
internal/poll.runtime_pollWait(0x7ff6856d11e0, 0x72) | |
/usr/local/go/src/runtime/netpoll.go:229 +0x89 | |
internal/poll.(*pollDesc).wait(0xc0036e4700, 0xc003842000, 0x0) | |
/usr/local/go/src/internal/poll/fd_poll_runtime.go:84 +0x32 | |
internal/poll.(*pollDesc).waitRead(...) | |
/usr/local/go/src/internal/poll/fd_poll_runtime.go:89 | |
internal/poll.(*FD).Read(0xc0036e4700, {0xc003842000, 0x15cc, 0x15cc}) | |
/usr/local/go/src/internal/poll/fd_unix.go:167 +0x25a | |
net.(*netFD).Read(0xc0036e4700, {0xc003842000, 0xc00386e930, 0x0}) | |
/usr/local/go/src/net/fd_posix.go:56 +0x29 | |
net.(*conn).Read(0xc0056e00a0, {0xc003842000, 0x5, 0xc0038117f0}) | |
/usr/local/go/src/net/net.go:183 +0x45 | |
crypto/tls.(*atLeastReader).Read(0xc002cd5710, {0xc003842000, 0x0, 0x409bcd}) | |
/usr/local/go/src/crypto/tls/conn.go:777 +0x3d | |
bytes.(*Buffer).ReadFrom(0xc0056f33f8, {0x4e62220, 0xc002cd5710}) | |
/usr/local/go/src/bytes/buffer.go:204 +0x98 | |
crypto/tls.(*Conn).readFromUntil(0xc0056f3180, {0x4e660a0, 0xc0056e00a0}, 0x463e3b) | |
/usr/local/go/src/crypto/tls/conn.go:799 +0xe5 | |
crypto/tls.(*Conn).readRecordOrCCS(0xc0056f3180, 0x0) | |
/usr/local/go/src/crypto/tls/conn.go:606 +0x112 | |
crypto/tls.(*Conn).readRecord(...) | |
/usr/local/go/src/crypto/tls/conn.go:574 | |
crypto/tls.(*Conn).Read(0xc0056f3180, {0xc003bb4000, 0x1000, 0xc003811cd0}) | |
/usr/local/go/src/crypto/tls/conn.go:1277 +0x16f | |
bufio.(*Reader).Read(0xc003b994a0, {0xc003b8f458, 0x9, 0xc003811d10}) | |
/usr/local/go/src/bufio/bufio.go:227 +0x1b4 | |
io.ReadAtLeast({0x4e62020, 0xc003b994a0}, {0xc003b8f458, 0x9, 0x9}, 0x9) | |
/usr/local/go/src/io/io.go:328 +0x9a | |
io.ReadFull(...) | |
/usr/local/go/src/io/io.go:347 | |
net/http.http2readFrameHeader({0xc003b8f458, 0x9, 0x69d86b}, {0x4e62020, 0xc003b994a0}) | |
/usr/local/go/src/net/http/h2_bundle.go:1553 +0x6e | |
net/http.(*http2Framer).ReadFrame(0xc003b8f420) | |
/usr/local/go/src/net/http/h2_bundle.go:1811 +0x95 | |
net/http.(*http2clientConnReadLoop).run(0xc003811fa0) | |
/usr/local/go/src/net/http/h2_bundle.go:8437 +0x165 | |
net/http.(*http2ClientConn).readLoop(0xc003800480) | |
/usr/local/go/src/net/http/h2_bundle.go:8359 +0x79 | |
created by net/http.(*http2Transport).newClientConn | |
/usr/local/go/src/net/http/h2_bundle.go:7311 +0xb45 | |
goroutine 117 [chan receive]: | |
k8s.io/client-go/util/workqueue.(*Type).updateUnfinishedWorkLoop(0xc00389aba0) | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:204 +0xa7 | |
created by k8s.io/client-go/util/workqueue.newQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:62 +0x1af | |
goroutine 118 [select]: | |
k8s.io/client-go/util/workqueue.(*delayingType).waitingLoop(0xc00389ad20) | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:231 +0x34e | |
created by k8s.io/client-go/util/workqueue.newDelayingQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:68 +0x23b | |
goroutine 119 [chan receive]: | |
k8s.io/client-go/util/workqueue.(*Type).updateUnfinishedWorkLoop(0xc004413500) | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:204 +0xa7 | |
created by k8s.io/client-go/util/workqueue.newQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:62 +0x1af | |
goroutine 120 [select]: | |
k8s.io/client-go/util/workqueue.(*delayingType).waitingLoop(0xc004413680) | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:231 +0x34e | |
created by k8s.io/client-go/util/workqueue.newDelayingQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:68 +0x23b | |
goroutine 121 [chan receive]: | |
k8s.io/client-go/util/workqueue.(*Type).updateUnfinishedWorkLoop(0xc0044136e0) | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:204 +0xa7 | |
created by k8s.io/client-go/util/workqueue.newQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:62 +0x1af | |
goroutine 122 [select]: | |
k8s.io/client-go/util/workqueue.(*delayingType).waitingLoop(0xc004413800) | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:231 +0x34e | |
created by k8s.io/client-go/util/workqueue.newDelayingQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:68 +0x23b | |
goroutine 123 [chan receive]: | |
k8s.io/client-go/util/workqueue.(*Type).updateUnfinishedWorkLoop(0xc0044138c0) | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:204 +0xa7 | |
created by k8s.io/client-go/util/workqueue.newQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/queue.go:62 +0x1af | |
goroutine 124 [select]: | |
k8s.io/client-go/util/workqueue.(*delayingType).waitingLoop(0xc004413a40) | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:231 +0x34e | |
created by k8s.io/client-go/util/workqueue.newDelayingQueue | |
/src/vendor/k8s.io/client-go/util/workqueue/delaying_queue.go:68 +0x23b | |
goroutine 129 [select]: | |
net/http.(*persistConn).readLoop(0xc003659680) | |
/usr/local/go/src/net/http/transport.go:2207 +0xd8a | |
created by net/http.(*Transport).dialConn | |
/usr/local/go/src/net/http/transport.go:1747 +0x1e05 | |
goroutine 130 [select]: | |
net/http.(*persistConn).writeLoop(0xc003659680) | |
/usr/local/go/src/net/http/transport.go:2386 +0xfb | |
created by net/http.(*Transport).dialConn | |
/usr/local/go/src/net/http/transport.go:1748 +0x1e65 | |
~/Coding/RubymineProjects/metashop/development/k8s/kubedb master +9 !2 ?2 ─────────────────────────────────── | |
❯ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment