Skip to content

Instantly share code, notes, and snippets.

@heschlie
Created October 19, 2017 21:22
Show Gist options
  • Save heschlie/ea23319a3c94d15e8bcbc511f73b1191 to your computer and use it in GitHub Desktop.
Save heschlie/ea23319a3c94d15e8bcbc511f73b1191 to your computer and use it in GitHub Desktop.
Calico policy controller log
2017-10-19 21:04:05,848 5 INFO Configuring /etc/hosts
2017-10-19 21:04:05,848 5 INFO Appended 'kubernetes.default -> 10.100.0.1' to /etc/hosts
2017-10-19 21:04:05,848 5 INFO Beginning execution
2017-10-19 21:04:05,848 5 DEBUG Getting ServiceAccount token from: /var/run/secrets/kubernetes.io/serviceaccount/token
2017-10-19 21:04:05,848 5 DEBUG Found ServiceAccount token: eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.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.BHHGFu6Vh3KNUoYyaFd9dztouf3wbOlf9RnNoGR8S_yVxvSYULUxmoTcGW8pBg3JkIX28Ca-x02Qi4c661QL3xNYiAHtgrf3RtEYU0r7g5QHYEFwbc2dgyjsqAc6up7lxEdEpzfEZuQoiAfGJMHudexIF0aunFFOYmbFV1TgvLY-zcNXYxxsqy5Q_HEDKDAjjBbMxG-m23Ci5q2wwmhqk_m02i0XkNvlBJSIG-6GfNQzGLRFlMIvGL5XVKV8Ak35GN66TqPT4JVY2GwuXQRIG4UDPVmj2cbgBsfpn9ykssq6RfdvLz9pB_lGU9ebJq6tA2FvEfhpZ1HBoFIy7UNK_g
2017-10-19 21:04:05,848 5 DEBUG Using auth token: eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.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.BHHGFu6Vh3KNUoYyaFd9dztouf3wbOlf9RnNoGR8S_yVxvSYULUxmoTcGW8pBg3JkIX28Ca-x02Qi4c661QL3xNYiAHtgrf3RtEYU0r7g5QHYEFwbc2dgyjsqAc6up7lxEdEpzfEZuQoiAfGJMHudexIF0aunFFOYmbFV1TgvLY-zcNXYxxsqy5Q_HEDKDAjjBbMxG-m23Ci5q2wwmhqk_m02i0XkNvlBJSIG-6GfNQzGLRFlMIvGL5XVKV8Ak35GN66TqPT4JVY2GwuXQRIG4UDPVmj2cbgBsfpn9ykssq6RfdvLz9pB_lGU9ebJq6tA2FvEfhpZ1HBoFIy7UNK_g
2017-10-19 21:04:05,848 5 DEBUG Setting NetworkPolicy ADDED handler: <function add_update_network_policy at 0x7ff6b8e768c0>
2017-10-19 21:04:05,848 5 DEBUG Setting NetworkPolicy MODIFIED handler: <function add_update_network_policy at 0x7ff6b8e768c0>
2017-10-19 21:04:05,848 5 DEBUG Setting NetworkPolicy DELETED handler: <function delete_network_policy at 0x7ff6b8e7ced8>
2017-10-19 21:04:05,848 5 DEBUG Setting Namespace ADDED handler: <function add_update_namespace at 0x7ff6b8e7cf50>
2017-10-19 21:04:05,848 5 DEBUG Setting Namespace MODIFIED handler: <function add_update_namespace at 0x7ff6b8e7cf50>
2017-10-19 21:04:05,849 5 DEBUG Setting Namespace DELETED handler: <function delete_namespace at 0x7ff6b8e7f0c8>
2017-10-19 21:04:05,849 5 DEBUG Setting Pod ADDED handler: <function add_pod at 0x7ff6b8e7f2a8>
2017-10-19 21:04:05,849 5 DEBUG Setting Pod MODIFIED handler: <function update_pod at 0x7ff6b8e7f320>
2017-10-19 21:04:05,849 5 DEBUG Setting Pod DELETED handler: <function delete_pod at 0x7ff6b8e7f410>
2017-10-19 21:04:05,849 5 INFO Leader election enabled? False
2017-10-19 21:04:05,849 5 DEBUG Attempting to remove old tier k8s-network-policy
2017-10-19 21:04:05,867 5 INFO Started worker thread for: NetworkPolicy
2017-10-19 21:04:05,867 5 INFO Syncing 'NetworkPolicy' objects
2017-10-19 21:04:05,868 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/networkpolicies' at version 'None'. stream=False
2017-10-19 21:04:05,870 5 INFO Started worker thread for: Namespace
2017-10-19 21:04:05,870 5 INFO Syncing 'Namespace' objects
2017-10-19 21:04:05,870 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/namespaces' at version 'None'. stream=False
2017-10-19 21:04:05,871 5 INFO Started worker thread for: Pod
2017-10-19 21:04:05,871 5 DEBUG Reading from event queue
2017-10-19 21:04:05,872 5 INFO Syncing 'Pod' objects
2017-10-19 21:04:05,872 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/pods' at version 'None'. stream=False
2017-10-19 21:04:05,931 5 DEBUG Response: <Response [200]>
2017-10-19 21:04:05,932 5 DEBUG NetworkPolicy metadata: {u'selfLink': u'/apis/extensions/v1beta1/networkpolicies', u'resourceVersion': u'327'}
2017-10-19 21:04:05,932 5 DEBUG 0 existing NetworkPolicy(s) - add to queue
2017-10-19 21:04:05,932 5 INFO Done syncing NetworkPolicy(s) - new resourceVersion: 327
2017-10-19 21:04:05,933 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:04:05,933 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '327'. stream=True
2017-10-19 21:04:05,941 5 DEBUG Response: <Response [200]>
2017-10-19 21:04:05,941 5 DEBUG Namespace metadata: {u'selfLink': u'/api/v1/namespaces', u'resourceVersion': u'327'}
2017-10-19 21:04:05,942 5 DEBUG 3 existing Namespace(s) - add to queue
2017-10-19 21:04:05,942 5 DEBUG Queueing update: {u'status': {u'phase': u'Active'}, u'spec': {u'finalizers': [u'kubernetes']}, u'metadata': {u'resourceVersion': u'4', u'creationTimestamp': u'2017-10-19T21:02:33Z', u'name': u'default', u'selfLink': u'/api/v1/namespaces/default', u'uid': u'd3f3d160-b510-11e7-912d-0800275f1e48'}}
2017-10-19 21:04:05,942 5 DEBUG Queueing update: {u'status': {u'phase': u'Active'}, u'spec': {u'finalizers': [u'kubernetes']}, u'metadata': {u'resourceVersion': u'41', u'creationTimestamp': u'2017-10-19T21:02:34Z', u'name': u'kube-public', u'selfLink': u'/api/v1/namespaces/kube-public', u'uid': u'd46eacd5-b510-11e7-912d-0800275f1e48'}}
2017-10-19 21:04:05,942 5 DEBUG Queueing update: {u'status': {u'phase': u'Active'}, u'spec': {u'finalizers': [u'kubernetes']}, u'metadata': {u'resourceVersion': u'29', u'creationTimestamp': u'2017-10-19T21:02:34Z', u'name': u'kube-system', u'selfLink': u'/api/v1/namespaces/kube-system', u'uid': u'd4486db7-b510-11e7-912d-0800275f1e48'}}
2017-10-19 21:04:05,942 5 INFO Done syncing Namespace(s) - new resourceVersion: 327
2017-10-19 21:04:05,942 5 DEBUG Read event: MODIFIED, Namespace, {
"status": {
"phase": "Active"
},
"spec": {
"finalizers": [
"kubernetes"
]
},
"metadata": {
"resourceVersion": "4",
"creationTimestamp": "2017-10-19T21:02:33Z",
"name": "default",
"selfLink": "/api/v1/namespaces/default",
"uid": "d3f3d160-b510-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:05,943 5 DEBUG Processing 'MODIFIED' for kind 'Namespace'
2017-10-19 21:04:05,943 5 DEBUG Looking up handler for event: ('Namespace', 'MODIFIED')
2017-10-19 21:04:05,943 5 DEBUG Adding/updating namespace: default
2017-10-19 21:04:05,943 5 DEBUG Generated namespace labels: {}
2017-10-19 21:04:05,944 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:04:05,944 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '327'. stream=True
2017-10-19 21:04:05,947 5 DEBUG Response: <Response [200]>
2017-10-19 21:04:05,948 5 DEBUG Pod metadata: {u'selfLink': u'/api/v1/pods', u'resourceVersion': u'327'}
2017-10-19 21:04:05,949 5 DEBUG 4 existing Pod(s) - add to queue
2017-10-19 21:04:05,949 5 DEBUG Queueing update: {u'status': {u'qosClass': u'Burstable', u'containerStatuses': [{u'restartCount': 0, u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'imageID': u'docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:46Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://f34658276eb8894133d7b859cd2aac19aeb8f6e680c927691f1f743a2e46ad53'}, {u'restartCount': 0, u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'imageID': u'docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:51Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://a3fa34a03af5f606f6e2b68a58254375201afdf511ba985f7d933ce657d0bc10'}], u'podIP': u'172.18.18.101', u'startTime': u'2017-10-19T21:03:31Z', u'hostIP': u'172.18.18.101', u'phase': u'Running', u'conditions': [{u'status': u'True', u'lastProbeTime': None, u'type': u'Initialized', u'lastTransitionTime': u'2017-10-19T21:03:31Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'Ready', u'lastTransitionTime': u'2017-10-19T21:04:01Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'PodScheduled', u'lastTransitionTime': u'2017-10-19T21:03:51Z'}]}, u'spec': {u'dnsPolicy': u'ClusterFirst', u'securityContext': {}, u'serviceAccountName': u'calico-node', u'schedulerName': u'default-scheduler', u'hostNetwork': True, u'serviceAccount': u'calico-node', u'terminationGracePeriodSeconds': 30, u'restartPolicy': u'Always', u'volumes': [{u'hostPath': {u'path': u'/lib/modules'}, u'name': u'lib-modules'}, {u'hostPath': {u'path': u'/var/run/calico'}, u'name': u'var-run-calico'}, {u'hostPath': {u'path': u'/opt/cni/bin'}, u'name': u'cni-bin-dir'}, {u'hostPath': {u'path': u'/etc/cni/net.d'}, u'name': u'cni-net-dir'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-etcd-secrets'}, u'name': u'etcd-certs'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-node-token-vk7vx'}, u'name': u'calico-node-token-vk7vx'}], u'tolerations': [{u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/notReady'}, {u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/unreachable'}], u'containers': [{u'livenessProbe': {u'httpGet': {u'path': u'/liveness', u'scheme': u'HTTP', u'port': 9099}, u'timeoutSeconds': 1, u'initialDelaySeconds': 10, u'periodSeconds': 10, u'successThreshold': 1, u'failureThreshold': 6}, u'terminationMessagePath': u'/dev/termination-log', u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'volumeMounts': [{u'readOnly': True, u'mountPath': u'/lib/modules', u'name': u'lib-modules'}, {u'mountPath': u'/var/run/calico', u'name': u'var-run-calico'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'calico_backend'}}, u'name': u'CALICO_NETWORKING_BACKEND'}, {u'name': u'CLUSTER_TYPE', u'value': u'k8s,bgp'}, {u'name': u'CALICO_DISABLE_FILE_LOGGING', u'value': u'true'}, {u'name': u'FELIX_DEFAULTENDPOINTTOHOSTACTION', u'value': u'ACCEPT'}, {u'name': u'CALICO_IPV4POOL_CIDR', u'value': u'192.168.0.0/16'}, {u'name': u'CALICO_IPV4POOL_IPIP', u'value': u'always'}, {u'name': u'FELIX_IPV6SUPPORT', u'value': u'false'}, {u'name': u'FELIX_LOGSEVERITYSCREEN', u'value': u'info'}, {u'name': u'FELIX_IPINIPMTU', u'value': u'1440'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_ca'}}, u'name': u'ETCD_CA_CERT_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_key'}}, u'name': u'ETCD_KEY_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_cert'}}, u'name': u'ETCD_CERT_FILE'}, {u'name': u'IP'}, {u'name': u'FELIX_HEALTHENABLED', u'value': u'true'}], u'imagePullPolicy': u'IfNotPresent', u'readinessProbe': {u'successThreshold': 1, u'httpGet': {u'path': u'/readiness', u'scheme': u'HTTP', u'port': 9099}, u'failureThreshold': 3, u'timeoutSeconds': 1, u'periodSeconds': 10}, u'securityContext': {u'privileged': True}, u'resources': {u'requests': {u'cpu': u'250m'}}}, {u'terminationMessagePath': u'/dev/termination-log', u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'volumeMounts': [{u'mountPath': u'/host/opt/cni/bin', u'name': u'cni-bin-dir'}, {u'mountPath': u'/host/etc/cni/net.d', u'name': u'cni-net-dir'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'command': [u'/install-cni.sh'], u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'cni_network_config'}}, u'name': u'CNI_NETWORK_CONFIG'}], u'imagePullPolicy': u'IfNotPresent', u'resources': {}}], u'nodeName': u'172.18.18.101'}, u'metadata': {u'name': u'calico-node-4ltlh', u'labels': {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', u'controller-revision-hash': u'3209084365'}, u'namespace': u'kube-system', u'ownerReferences': [{u'kind': u'DaemonSet', u'name': u'calico-node', u'apiVersion': u'extensions/v1beta1', u'controller': True, u'blockOwnerDeletion': True, u'uid': u'f560cc6d-b510-11e7-912d-0800275f1e48'}], u'resourceVersion': u'311', u'generateName': u'calico-node-', u'creationTimestamp': u'2017-10-19T21:03:31Z', u'annotations': {u'scheduler.alpha.kubernetes.io/critical-pod': u'', u'scheduler.alpha.kubernetes.io/tolerations': u'[{"key": "dedicated", "value": "master", "effect": "NoSchedule" },\n {"key":"CriticalAddonsOnly", "operator":"Exists"}]\n', u'kubernetes.io/created-by': u'{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"DaemonSet","namespace":"kube-system","name":"calico-node","uid":"f560cc6d-b510-11e7-912d-0800275f1e48","apiVersion":"extensions","resourceVersion":"181"}}\n'}, u'selfLink': u'/api/v1/namespaces/kube-system/pods/calico-node-4ltlh', u'uid': u'f60ef5a4-b510-11e7-912d-0800275f1e48'}}
2017-10-19 21:04:05,949 5 DEBUG Queueing update: {u'status': {u'qosClass': u'Burstable', u'containerStatuses': [{u'restartCount': 0, u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'imageID': u'docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:46Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://df2e0cb6c4a622146cc5c6a77afdd4160950319c55890f17623e325ba8162a50'}, {u'restartCount': 0, u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'imageID': u'docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:50Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://a14ddd11b973aa2b7fcc613d62bb7c74f684deef5d2a11276fc00ea5a0c5e072'}], u'podIP': u'172.18.18.103', u'startTime': u'2017-10-19T21:03:31Z', u'hostIP': u'172.18.18.103', u'phase': u'Running', u'conditions': [{u'status': u'True', u'lastProbeTime': None, u'type': u'Initialized', u'lastTransitionTime': u'2017-10-19T21:03:31Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'Ready', u'lastTransitionTime': u'2017-10-19T21:04:01Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'PodScheduled', u'lastTransitionTime': u'2017-10-19T21:03:50Z'}]}, u'spec': {u'dnsPolicy': u'ClusterFirst', u'securityContext': {}, u'serviceAccountName': u'calico-node', u'schedulerName': u'default-scheduler', u'hostNetwork': True, u'serviceAccount': u'calico-node', u'terminationGracePeriodSeconds': 30, u'restartPolicy': u'Always', u'volumes': [{u'hostPath': {u'path': u'/lib/modules'}, u'name': u'lib-modules'}, {u'hostPath': {u'path': u'/var/run/calico'}, u'name': u'var-run-calico'}, {u'hostPath': {u'path': u'/opt/cni/bin'}, u'name': u'cni-bin-dir'}, {u'hostPath': {u'path': u'/etc/cni/net.d'}, u'name': u'cni-net-dir'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-etcd-secrets'}, u'name': u'etcd-certs'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-node-token-vk7vx'}, u'name': u'calico-node-token-vk7vx'}], u'tolerations': [{u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/notReady'}, {u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/unreachable'}], u'containers': [{u'livenessProbe': {u'httpGet': {u'path': u'/liveness', u'scheme': u'HTTP', u'port': 9099}, u'timeoutSeconds': 1, u'initialDelaySeconds': 10, u'periodSeconds': 10, u'successThreshold': 1, u'failureThreshold': 6}, u'terminationMessagePath': u'/dev/termination-log', u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'volumeMounts': [{u'readOnly': True, u'mountPath': u'/lib/modules', u'name': u'lib-modules'}, {u'mountPath': u'/var/run/calico', u'name': u'var-run-calico'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'calico_backend'}}, u'name': u'CALICO_NETWORKING_BACKEND'}, {u'name': u'CLUSTER_TYPE', u'value': u'k8s,bgp'}, {u'name': u'CALICO_DISABLE_FILE_LOGGING', u'value': u'true'}, {u'name': u'FELIX_DEFAULTENDPOINTTOHOSTACTION', u'value': u'ACCEPT'}, {u'name': u'CALICO_IPV4POOL_CIDR', u'value': u'192.168.0.0/16'}, {u'name': u'CALICO_IPV4POOL_IPIP', u'value': u'always'}, {u'name': u'FELIX_IPV6SUPPORT', u'value': u'false'}, {u'name': u'FELIX_LOGSEVERITYSCREEN', u'value': u'info'}, {u'name': u'FELIX_IPINIPMTU', u'value': u'1440'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_ca'}}, u'name': u'ETCD_CA_CERT_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_key'}}, u'name': u'ETCD_KEY_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_cert'}}, u'name': u'ETCD_CERT_FILE'}, {u'name': u'IP'}, {u'name': u'FELIX_HEALTHENABLED', u'value': u'true'}], u'imagePullPolicy': u'IfNotPresent', u'readinessProbe': {u'successThreshold': 1, u'httpGet': {u'path': u'/readiness', u'scheme': u'HTTP', u'port': 9099}, u'failureThreshold': 3, u'timeoutSeconds': 1, u'periodSeconds': 10}, u'securityContext': {u'privileged': True}, u'resources': {u'requests': {u'cpu': u'250m'}}}, {u'terminationMessagePath': u'/dev/termination-log', u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'volumeMounts': [{u'mountPath': u'/host/opt/cni/bin', u'name': u'cni-bin-dir'}, {u'mountPath': u'/host/etc/cni/net.d', u'name': u'cni-net-dir'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'command': [u'/install-cni.sh'], u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'cni_network_config'}}, u'name': u'CNI_NETWORK_CONFIG'}], u'imagePullPolicy': u'IfNotPresent', u'resources': {}}], u'nodeName': u'172.18.18.103'}, u'metadata': {u'name': u'calico-node-pnq2z', u'labels': {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', u'controller-revision-hash': u'3209084365'}, u'namespace': u'kube-system', u'ownerReferences': [{u'kind': u'DaemonSet', u'name': u'calico-node', u'apiVersion': u'extensions/v1beta1', u'controller': True, u'blockOwnerDeletion': True, u'uid': u'f560cc6d-b510-11e7-912d-0800275f1e48'}], u'resourceVersion': u'308', u'generateName': u'calico-node-', u'creationTimestamp': u'2017-10-19T21:03:31Z', u'annotations': {u'scheduler.alpha.kubernetes.io/critical-pod': u'', u'scheduler.alpha.kubernetes.io/tolerations': u'[{"key": "dedicated", "value": "master", "effect": "NoSchedule" },\n {"key":"CriticalAddonsOnly", "operator":"Exists"}]\n', u'kubernetes.io/created-by': u'{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"DaemonSet","namespace":"kube-system","name":"calico-node","uid":"f560cc6d-b510-11e7-912d-0800275f1e48","apiVersion":"extensions","resourceVersion":"181"}}\n'}, u'selfLink': u'/api/v1/namespaces/kube-system/pods/calico-node-pnq2z', u'uid': u'f60e5211-b510-11e7-912d-0800275f1e48'}}
2017-10-19 21:04:05,949 5 DEBUG Queueing update: {u'status': {u'qosClass': u'Burstable', u'containerStatuses': [{u'restartCount': 0, u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'imageID': u'docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:46Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://075a805af05a5a597cbe740aea62b524cb2158d1cfa00562ebf09ec4b6623363'}, {u'restartCount': 0, u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'imageID': u'docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:50Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://9ccb32220acf167a901c95da57d5b17a1ad0a097bee4ab35129cd72a5691db6c'}], u'podIP': u'172.18.18.102', u'startTime': u'2017-10-19T21:03:31Z', u'hostIP': u'172.18.18.102', u'phase': u'Running', u'conditions': [{u'status': u'True', u'lastProbeTime': None, u'type': u'Initialized', u'lastTransitionTime': u'2017-10-19T21:03:31Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'Ready', u'lastTransitionTime': u'2017-10-19T21:04:01Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'PodScheduled', u'lastTransitionTime': u'2017-10-19T21:03:51Z'}]}, u'spec': {u'dnsPolicy': u'ClusterFirst', u'securityContext': {}, u'serviceAccountName': u'calico-node', u'schedulerName': u'default-scheduler', u'hostNetwork': True, u'serviceAccount': u'calico-node', u'terminationGracePeriodSeconds': 30, u'restartPolicy': u'Always', u'volumes': [{u'hostPath': {u'path': u'/lib/modules'}, u'name': u'lib-modules'}, {u'hostPath': {u'path': u'/var/run/calico'}, u'name': u'var-run-calico'}, {u'hostPath': {u'path': u'/opt/cni/bin'}, u'name': u'cni-bin-dir'}, {u'hostPath': {u'path': u'/etc/cni/net.d'}, u'name': u'cni-net-dir'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-etcd-secrets'}, u'name': u'etcd-certs'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-node-token-vk7vx'}, u'name': u'calico-node-token-vk7vx'}], u'tolerations': [{u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/notReady'}, {u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/unreachable'}], u'containers': [{u'livenessProbe': {u'httpGet': {u'path': u'/liveness', u'scheme': u'HTTP', u'port': 9099}, u'timeoutSeconds': 1, u'initialDelaySeconds': 10, u'periodSeconds': 10, u'successThreshold': 1, u'failureThreshold': 6}, u'terminationMessagePath': u'/dev/termination-log', u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'volumeMounts': [{u'readOnly': True, u'mountPath': u'/lib/modules', u'name': u'lib-modules'}, {u'mountPath': u'/var/run/calico', u'name': u'var-run-calico'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'calico_backend'}}, u'name': u'CALICO_NETWORKING_BACKEND'}, {u'name': u'CLUSTER_TYPE', u'value': u'k8s,bgp'}, {u'name': u'CALICO_DISABLE_FILE_LOGGING', u'value': u'true'}, {u'name': u'FELIX_DEFAULTENDPOINTTOHOSTACTION', u'value': u'ACCEPT'}, {u'name': u'CALICO_IPV4POOL_CIDR', u'value': u'192.168.0.0/16'}, {u'name': u'CALICO_IPV4POOL_IPIP', u'value': u'always'}, {u'name': u'FELIX_IPV6SUPPORT', u'value': u'false'}, {u'name': u'FELIX_LOGSEVERITYSCREEN', u'value': u'info'}, {u'name': u'FELIX_IPINIPMTU', u'value': u'1440'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_ca'}}, u'name': u'ETCD_CA_CERT_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_key'}}, u'name': u'ETCD_KEY_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_cert'}}, u'name': u'ETCD_CERT_FILE'}, {u'name': u'IP'}, {u'name': u'FELIX_HEALTHENABLED', u'value': u'true'}], u'imagePullPolicy': u'IfNotPresent', u'readinessProbe': {u'successThreshold': 1, u'httpGet': {u'path': u'/readiness', u'scheme': u'HTTP', u'port': 9099}, u'failureThreshold': 3, u'timeoutSeconds': 1, u'periodSeconds': 10}, u'securityContext': {u'privileged': True}, u'resources': {u'requests': {u'cpu': u'250m'}}}, {u'terminationMessagePath': u'/dev/termination-log', u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'volumeMounts': [{u'mountPath': u'/host/opt/cni/bin', u'name': u'cni-bin-dir'}, {u'mountPath': u'/host/etc/cni/net.d', u'name': u'cni-net-dir'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'command': [u'/install-cni.sh'], u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'cni_network_config'}}, u'name': u'CNI_NETWORK_CONFIG'}], u'imagePullPolicy': u'IfNotPresent', u'resources': {}}], u'nodeName': u'172.18.18.102'}, u'metadata': {u'name': u'calico-node-t0d59', u'labels': {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', u'controller-revision-hash': u'3209084365'}, u'namespace': u'kube-system', u'ownerReferences': [{u'kind': u'DaemonSet', u'name': u'calico-node', u'apiVersion': u'extensions/v1beta1', u'controller': True, u'blockOwnerDeletion': True, u'uid': u'f560cc6d-b510-11e7-912d-0800275f1e48'}], u'resourceVersion': u'309', u'generateName': u'calico-node-', u'creationTimestamp': u'2017-10-19T21:03:31Z', u'annotations': {u'scheduler.alpha.kubernetes.io/critical-pod': u'', u'scheduler.alpha.kubernetes.io/tolerations': u'[{"key": "dedicated", "value": "master", "effect": "NoSchedule" },\n {"key":"CriticalAddonsOnly", "operator":"Exists"}]\n', u'kubernetes.io/created-by': u'{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"DaemonSet","namespace":"kube-system","name":"calico-node","uid":"f560cc6d-b510-11e7-912d-0800275f1e48","apiVersion":"extensions","resourceVersion":"181"}}\n'}, u'selfLink': u'/api/v1/namespaces/kube-system/pods/calico-node-t0d59', u'uid': u'f60ebaf2-b510-11e7-912d-0800275f1e48'}}
2017-10-19 21:04:05,949 5 DEBUG Queueing update: {u'status': {u'qosClass': u'BestEffort', u'containerStatuses': [{u'restartCount': 0, u'name': u'calico-policy-controller', u'image': u'quay.io/calico/kube-policy-controller:v0.7.0', u'imageID': u'', u'state': {u'waiting': {u'reason': u'ContainerCreating'}}, u'ready': False, u'lastState': {}}], u'podIP': u'172.18.18.103', u'startTime': u'2017-10-19T21:04:02Z', u'hostIP': u'172.18.18.103', u'phase': u'Pending', u'conditions': [{u'status': u'True', u'lastProbeTime': None, u'type': u'Initialized', u'lastTransitionTime': u'2017-10-19T21:04:02Z'}, {u'status': u'False', u'lastTransitionTime': u'2017-10-19T21:04:02Z', u'reason': u'ContainersNotReady', u'lastProbeTime': None, u'message': u'containers with unready status: [calico-policy-controller]', u'type': u'Ready'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'PodScheduled', u'lastTransitionTime': u'2017-10-19T21:04:02Z'}]}, u'spec': {u'dnsPolicy': u'ClusterFirst', u'securityContext': {}, u'serviceAccountName': u'calico-policy-controller', u'schedulerName': u'default-scheduler', u'hostNetwork': True, u'serviceAccount': u'calico-policy-controller', u'terminationGracePeriodSeconds': 30, u'restartPolicy': u'Always', u'volumes': [{u'secret': {u'defaultMode': 420, u'secretName': u'calico-etcd-secrets'}, u'name': u'etcd-certs'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-policy-controller-token-cfjmt'}, u'name': u'calico-policy-controller-token-cfjmt'}], u'containers': [{u'terminationMessagePath': u'/dev/termination-log', u'name': u'calico-policy-controller', u'image': u'quay.io/calico/kube-policy-controller:v0.7.0', u'volumeMounts': [{u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-policy-controller-token-cfjmt'}], u'terminationMessagePolicy': u'File', u'env': [{u'name': u'LOG_LEVEL', u'value': u'debug'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_ca'}}, u'name': u'ETCD_CA_CERT_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_key'}}, u'name': u'ETCD_KEY_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_cert'}}, u'name': u'ETCD_CERT_FILE'}, {u'name': u'K8S_API', u'value': u'https://kubernetes.default:443'}, {u'name': u'CONFIGURE_ETC_HOSTS', u'value': u'true'}], u'imagePullPolicy': u'IfNotPresent', u'resources': {}}], u'nodeName': u'172.18.18.103'}, u'metadata': {u'name': u'calico-policy-controller-2476506652-d7fb8', u'labels': {u'pod-template-hash': u'2476506652', u'k8s-app': u'calico-policy'}, u'namespace': u'kube-system', u'ownerReferences': [{u'kind': u'ReplicaSet', u'name': u'calico-policy-controller-2476506652', u'apiVersion': u'extensions/v1beta1', u'controller': True, u'blockOwnerDeletion': True, u'uid': u'f56f35f8-b510-11e7-912d-0800275f1e48'}], u'resourceVersion': u'317', u'generateName': u'calico-policy-controller-2476506652-', u'creationTimestamp': u'2017-10-19T21:03:31Z', u'annotations': {u'kubernetes.io/created-by': u'{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"ReplicaSet","namespace":"kube-system","name":"calico-policy-controller-2476506652","uid":"f56f35f8-b510-11e7-912d-0800275f1e48","apiVersion":"extensions","resourceVersion":"185"}}\n'}, u'selfLink': u'/api/v1/namespaces/kube-system/pods/calico-policy-controller-2476506652-d7fb8', u'uid': u'f60f8e4f-b510-11e7-912d-0800275f1e48'}}
2017-10-19 21:04:05,950 5 INFO Done syncing Pod(s) - new resourceVersion: 327
2017-10-19 21:04:05,950 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:04:05,950 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '327'. stream=True
2017-10-19 21:04:05,958 5 DEBUG Created/updated profile for namespace default
2017-10-19 21:04:05,959 5 INFO Handled MODIFIED for Namespace: (None, u'default')
2017-10-19 21:04:05,959 5 DEBUG Reading from event queue
2017-10-19 21:04:05,959 5 DEBUG Read event: MODIFIED, Namespace, {
"status": {
"phase": "Active"
},
"spec": {
"finalizers": [
"kubernetes"
]
},
"metadata": {
"resourceVersion": "41",
"creationTimestamp": "2017-10-19T21:02:34Z",
"name": "kube-public",
"selfLink": "/api/v1/namespaces/kube-public",
"uid": "d46eacd5-b510-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:05,959 5 DEBUG Processing 'MODIFIED' for kind 'Namespace'
2017-10-19 21:04:05,959 5 DEBUG Looking up handler for event: ('Namespace', 'MODIFIED')
2017-10-19 21:04:05,959 5 DEBUG Adding/updating namespace: kube-public
2017-10-19 21:04:05,959 5 DEBUG Generated namespace labels: {}
2017-10-19 21:04:05,976 5 DEBUG Created/updated profile for namespace kube-public
2017-10-19 21:04:05,976 5 INFO Handled MODIFIED for Namespace: (None, u'kube-public')
2017-10-19 21:04:05,976 5 DEBUG Reading from event queue
2017-10-19 21:04:05,976 5 DEBUG Read event: MODIFIED, Namespace, {
"status": {
"phase": "Active"
},
"spec": {
"finalizers": [
"kubernetes"
]
},
"metadata": {
"resourceVersion": "29",
"creationTimestamp": "2017-10-19T21:02:34Z",
"name": "kube-system",
"selfLink": "/api/v1/namespaces/kube-system",
"uid": "d4486db7-b510-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:05,977 5 DEBUG Processing 'MODIFIED' for kind 'Namespace'
2017-10-19 21:04:05,977 5 DEBUG Looking up handler for event: ('Namespace', 'MODIFIED')
2017-10-19 21:04:05,977 5 DEBUG Adding/updating namespace: kube-system
2017-10-19 21:04:05,977 5 DEBUG Generated namespace labels: {}
2017-10-19 21:04:05,979 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:04:05,981 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:04:05,981 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:04:06,006 5 DEBUG Created/updated profile for namespace kube-system
2017-10-19 21:04:06,006 5 INFO Handled MODIFIED for Namespace: (None, u'kube-system')
2017-10-19 21:04:06,006 5 DEBUG Reading from event queue
2017-10-19 21:04:06,007 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"calico-policy-controller-2476506652-d7fb8","generateName":"calico-policy-controller-2476506652-","namespace":"kube-system","selfLink":"/api/v1/namespaces/kube-system/pods/calico-policy-controller-2476506652-d7fb8","uid":"f60f8e4f-b510-11e7-912d-0800275f1e48","resourceVersion":"329","creationTimestamp":"2017-10-19T21:03:31Z","labels":{"k8s-app":"calico-policy","pod-template-hash":"2476506652"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"kube-system\",\"name\":\"calico-policy-controller-2476506652\",\"uid\":\"f56f35f8-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"185\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"calico-policy-controller-2476506652","uid":"f56f35f8-b510-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etcd-certs","secret":{"secretName":"calico-etcd-secrets","defaultMode":420}},{"name":"calico-policy-controller-token-cfjmt","secret":{"secretName":"calico-policy-controller-token-cfjmt","defaultMode":420}}],"containers":[{"name":"calico-policy-controller","image":"quay.io/calico/kube-policy-controller:v0.7.0","env":[{"name":"LOG_LEVEL","value":"debug"},{"name":"ETCD_ENDPOINTS","valueFrom":{"configMapKeyRef":{"name":"calico-config","key":"etcd_endpoints"}}},{"name":"ETCD_CA_CERT_FILE","valueFrom":{"configMapKeyRef":{"name":"calico-config","key":"etcd_ca"}}},{"name":"ETCD_KEY_FILE","valueFrom":{"configMapKeyRef":{"name":"calico-config","key":"etcd_key"}}},{"name":"ETCD_CERT_FILE","valueFrom":{"configMapKeyRef":{"name":"calico-config","key":"etcd_cert"}}},{"name":"K8S_API","value":"https://kubernetes.default:443"},{"name":"CONFIGURE_ETC_HOSTS","value":"true"}],"resources":{},"volumeMounts":[{"name":"etcd-certs","mountPath":"/calico-secrets"},{"name":"calico-policy-controller-token-cfjmt","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"calico-policy-controller","serviceAccount":"calico-policy-controller","nodeName":"172.18.18.103","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Running","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:02Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:02Z"}],"hostIP":"172.18.18.103","podIP":"172.18.18.103","startTime":"2017-10-19T21:04:02Z","containerStatuses":[{"name":"calico-policy-controller","state":{"running":{"startedAt":"2017-10-19T21:04:05Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/calico/kube-policy-controller:v0.7.0","imageID":"docker-pullable://quay.io/calico/kube-policy-controller@sha256:3916d308f1c1681c19daccc35ddb621e4e93b49046343ebe9eda570c0f9fe5a4","containerID":"docker://e6060ee897397d2f17664b2bed4935093a324afdb4e327556440a4bcd0e66672"}],"qosClass":"BestEffort"}}}
2017-10-19 21:04:06,007 5 DEBUG MODIFIED Pod: calico-policy-controller-2476506652-d7fb8 to queue (3) (1508447046.01)
2017-10-19 21:04:06,007 5 DEBUG Update resourceVersion, was: 327, now: 329
2017-10-19 21:04:06,007 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"qosClass": "Burstable",
"containerStatuses": [
{
"restartCount": 0,
"name": "calico-node",
"image": "quay.io/calico/node:v2.5.1",
"imageID": "docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc",
"state": {
"running": {
"startedAt": "2017-10-19T21:03:46Z"
}
},
"ready": true,
"lastState": {},
"containerID": "docker://f34658276eb8894133d7b859cd2aac19aeb8f6e680c927691f1f743a2e46ad53"
},
{
"restartCount": 0,
"name": "install-cni",
"image": "quay.io/calico/cni:v1.10.0",
"imageID": "docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39",
"state": {
"running": {
"startedAt": "2017-10-19T21:03:51Z"
}
},
"ready": true,
"lastState": {},
"containerID": "docker://a3fa34a03af5f606f6e2b68a58254375201afdf511ba985f7d933ce657d0bc10"
}
],
"podIP": "172.18.18.101",
"startTime": "2017-10-19T21:03:31Z",
"hostIP": "172.18.18.101",
"phase": "Running",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "Initialized",
"lastTransitionTime": "2017-10-19T21:03:31Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "Ready",
"lastTransitionTime": "2017-10-19T21:04:01Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:03:51Z"
}
]
},
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "calico-node",
"schedulerName": "default-scheduler",
"hostNetwork": true,
"serviceAccount": "calico-node",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"hostPath": {
"path": "/lib/modules"
},
"name": "lib-modules"
},
{
"hostPath": {
"path": "/var/run/calico"
},
"name": "var-run-calico"
},
{
"hostPath": {
"path": "/opt/cni/bin"
},
"name": "cni-bin-dir"
},
{
"hostPath": {
"path": "/etc/cni/net.d"
},
"name": "cni-net-dir"
},
{
"secret": {
"defaultMode": 420,
"secretName": "calico-etcd-secrets"
},
"name": "etcd-certs"
},
{
"secret": {
"defaultMode": 420,
"secretName": "calico-node-token-vk7vx"
},
"name": "calico-node-token-vk7vx"
}
],
"tolerations": [
{
"operator": "Exists",
"effect": "NoExecute",
"key": "node.alpha.kubernetes.io/notReady"
},
{
"operator": "Exists",
"effect": "NoExecute",
"key": "node.alpha.kubernetes.io/unreachable"
}
],
"containers": [
{
"livenessProbe": {
"httpGet": {
"path": "/liveness",
"scheme": "HTTP",
"port": 9099
},
"timeoutSeconds": 1,
"initialDelaySeconds": 10,
"periodSeconds": 10,
"successThreshold": 1,
"failureThreshold": 6
},
"terminationMessagePath": "/dev/termination-log",
"name": "calico-node",
"image": "quay.io/calico/node:v2.5.1",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/lib/modules",
"name": "lib-modules"
},
{
"mountPath": "/var/run/calico",
"name": "var-run-calico"
},
{
"mountPath": "/calico-secrets",
"name": "etcd-certs"
},
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "calico-node-token-vk7vx"
}
],
"terminationMessagePolicy": "File",
"env": [
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_endpoints"
}
},
"name": "ETCD_ENDPOINTS"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "calico_backend"
}
},
"name": "CALICO_NETWORKING_BACKEND"
},
{
"name": "CLUSTER_TYPE",
"value": "k8s,bgp"
},
{
"name": "CALICO_DISABLE_FILE_LOGGING",
"value": "true"
},
{
"name": "FELIX_DEFAULTENDPOINTTOHOSTACTION",
"value": "ACCEPT"
},
{
"name": "CALICO_IPV4POOL_CIDR",
"value": "192.168.0.0/16"
},
{
"name": "CALICO_IPV4POOL_IPIP",
"value": "always"
},
{
"name": "FELIX_IPV6SUPPORT",
"value": "false"
},
{
"name": "FELIX_LOGSEVERITYSCREEN",
"value": "info"
},
{
"name": "FELIX_IPINIPMTU",
"value": "1440"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_ca"
}
},
"name": "ETCD_CA_CERT_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_key"
}
},
"name": "ETCD_KEY_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_cert"
}
},
"name": "ETCD_CERT_FILE"
},
{
"name": "IP"
},
{
"name": "FELIX_HEALTHENABLED",
"value": "true"
}
],
"imagePullPolicy": "IfNotPresent",
"readinessProbe": {
"successThreshold": 1,
"httpGet": {
"path": "/readiness",
"scheme": "HTTP",
"port": 9099
},
"failureThreshold": 3,
"timeoutSeconds": 1,
"periodSeconds": 10
},
"securityContext": {
"privileged": true
},
"resources": {
"requests": {
"cpu": "250m"
}
}
},
{
"terminationMessagePath": "/dev/termination-log",
"name": "install-cni",
"image": "quay.io/calico/cni:v1.10.0",
"volumeMounts": [
{
"mountPath": "/host/opt/cni/bin",
"name": "cni-bin-dir"
},
{
"mountPath": "/host/etc/cni/net.d",
"name": "cni-net-dir"
},
{
"mountPath": "/calico-secrets",
"name": "etcd-certs"
},
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "calico-node-token-vk7vx"
}
],
"terminationMessagePolicy": "File",
"command": [
"/install-cni.sh"
],
"env": [
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_endpoints"
}
},
"name": "ETCD_ENDPOINTS"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "cni_network_config"
}
},
"name": "CNI_NETWORK_CONFIG"
}
],
"imagePullPolicy": "IfNotPresent",
"resources": {}
}
],
"nodeName": "172.18.18.101"
},
"metadata": {
"name": "calico-node-4ltlh",
"labels": {
"k8s-app": "calico-node",
"pod-template-generation": "1",
"controller-revision-hash": "3209084365"
},
"namespace": "kube-system",
"ownerReferences": [
{
"kind": "DaemonSet",
"name": "calico-node",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "f560cc6d-b510-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "311",
"generateName": "calico-node-",
"creationTimestamp": "2017-10-19T21:03:31Z",
"annotations": {
"scheduler.alpha.kubernetes.io/critical-pod": "",
"scheduler.alpha.kubernetes.io/tolerations": "[{\"key\": \"dedicated\", \"value\": \"master\", \"effect\": \"NoSchedule\" },\n {\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]\n",
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"DaemonSet\",\"namespace\":\"kube-system\",\"name\":\"calico-node\",\"uid\":\"f560cc6d-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"181\"}}\n"
},
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-node-4ltlh",
"uid": "f60ef5a4-b510-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:06,007 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:06,007 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:06,007 5 DEBUG Updating pod: kube-system.calico-node-4ltlh
2017-10-19 21:04:06,008 5 DEBUG Compare labels on kube-system.calico-node-4ltlh. cached: None, new: {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', 'calico/k8s_ns': u'kube-system', u'controller-revision-hash': u'3209084365'}
2017-10-19 21:04:06,008 5 INFO Labels for kube-system.calico-node-4ltlh have been updated
2017-10-19 21:04:06,008 5 INFO No endpoint for kube-system.calico-node-4ltlh in cache, loading
2017-10-19 21:04:06,011 5 INFO Loaded endpoint and label caches
2017-10-19 21:04:06,011 5 INFO No endpoint for pod kube-system.calico-node-4ltlh - wait for creation
2017-10-19 21:04:06,011 5 INFO Handled MODIFIED for Pod: (u'kube-system', u'calico-node-4ltlh')
2017-10-19 21:04:06,012 5 DEBUG Reading from event queue
2017-10-19 21:04:06,012 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"qosClass": "Burstable",
"containerStatuses": [
{
"restartCount": 0,
"name": "calico-node",
"image": "quay.io/calico/node:v2.5.1",
"imageID": "docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc",
"state": {
"running": {
"startedAt": "2017-10-19T21:03:46Z"
}
},
"ready": true,
"lastState": {},
"containerID": "docker://df2e0cb6c4a622146cc5c6a77afdd4160950319c55890f17623e325ba8162a50"
},
{
"restartCount": 0,
"name": "install-cni",
"image": "quay.io/calico/cni:v1.10.0",
"imageID": "docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39",
"state": {
"running": {
"startedAt": "2017-10-19T21:03:50Z"
}
},
"ready": true,
"lastState": {},
"containerID": "docker://a14ddd11b973aa2b7fcc613d62bb7c74f684deef5d2a11276fc00ea5a0c5e072"
}
],
"podIP": "172.18.18.103",
"startTime": "2017-10-19T21:03:31Z",
"hostIP": "172.18.18.103",
"phase": "Running",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "Initialized",
"lastTransitionTime": "2017-10-19T21:03:31Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "Ready",
"lastTransitionTime": "2017-10-19T21:04:01Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:03:50Z"
}
]
},
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "calico-node",
"schedulerName": "default-scheduler",
"hostNetwork": true,
"serviceAccount": "calico-node",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"hostPath": {
"path": "/lib/modules"
},
"name": "lib-modules"
},
{
"hostPath": {
"path": "/var/run/calico"
},
"name": "var-run-calico"
},
{
"hostPath": {
"path": "/opt/cni/bin"
},
"name": "cni-bin-dir"
},
{
"hostPath": {
"path": "/etc/cni/net.d"
},
"name": "cni-net-dir"
},
{
"secret": {
"defaultMode": 420,
"secretName": "calico-etcd-secrets"
},
"name": "etcd-certs"
},
{
"secret": {
"defaultMode": 420,
"secretName": "calico-node-token-vk7vx"
},
"name": "calico-node-token-vk7vx"
}
],
"tolerations": [
{
"operator": "Exists",
"effect": "NoExecute",
"key": "node.alpha.kubernetes.io/notReady"
},
{
"operator": "Exists",
"effect": "NoExecute",
"key": "node.alpha.kubernetes.io/unreachable"
}
],
"containers": [
{
"livenessProbe": {
"httpGet": {
"path": "/liveness",
"scheme": "HTTP",
"port": 9099
},
"timeoutSeconds": 1,
"initialDelaySeconds": 10,
"periodSeconds": 10,
"successThreshold": 1,
"failureThreshold": 6
},
"terminationMessagePath": "/dev/termination-log",
"name": "calico-node",
"image": "quay.io/calico/node:v2.5.1",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/lib/modules",
"name": "lib-modules"
},
{
"mountPath": "/var/run/calico",
"name": "var-run-calico"
},
{
"mountPath": "/calico-secrets",
"name": "etcd-certs"
},
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "calico-node-token-vk7vx"
}
],
"terminationMessagePolicy": "File",
"env": [
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_endpoints"
}
},
"name": "ETCD_ENDPOINTS"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "calico_backend"
}
},
"name": "CALICO_NETWORKING_BACKEND"
},
{
"name": "CLUSTER_TYPE",
"value": "k8s,bgp"
},
{
"name": "CALICO_DISABLE_FILE_LOGGING",
"value": "true"
},
{
"name": "FELIX_DEFAULTENDPOINTTOHOSTACTION",
"value": "ACCEPT"
},
{
"name": "CALICO_IPV4POOL_CIDR",
"value": "192.168.0.0/16"
},
{
"name": "CALICO_IPV4POOL_IPIP",
"value": "always"
},
{
"name": "FELIX_IPV6SUPPORT",
"value": "false"
},
{
"name": "FELIX_LOGSEVERITYSCREEN",
"value": "info"
},
{
"name": "FELIX_IPINIPMTU",
"value": "1440"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_ca"
}
},
"name": "ETCD_CA_CERT_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_key"
}
},
"name": "ETCD_KEY_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_cert"
}
},
"name": "ETCD_CERT_FILE"
},
{
"name": "IP"
},
{
"name": "FELIX_HEALTHENABLED",
"value": "true"
}
],
"imagePullPolicy": "IfNotPresent",
"readinessProbe": {
"successThreshold": 1,
"httpGet": {
"path": "/readiness",
"scheme": "HTTP",
"port": 9099
},
"failureThreshold": 3,
"timeoutSeconds": 1,
"periodSeconds": 10
},
"securityContext": {
"privileged": true
},
"resources": {
"requests": {
"cpu": "250m"
}
}
},
{
"terminationMessagePath": "/dev/termination-log",
"name": "install-cni",
"image": "quay.io/calico/cni:v1.10.0",
"volumeMounts": [
{
"mountPath": "/host/opt/cni/bin",
"name": "cni-bin-dir"
},
{
"mountPath": "/host/etc/cni/net.d",
"name": "cni-net-dir"
},
{
"mountPath": "/calico-secrets",
"name": "etcd-certs"
},
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "calico-node-token-vk7vx"
}
],
"terminationMessagePolicy": "File",
"command": [
"/install-cni.sh"
],
"env": [
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_endpoints"
}
},
"name": "ETCD_ENDPOINTS"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "cni_network_config"
}
},
"name": "CNI_NETWORK_CONFIG"
}
],
"imagePullPolicy": "IfNotPresent",
"resources": {}
}
],
"nodeName": "172.18.18.103"
},
"metadata": {
"name": "calico-node-pnq2z",
"labels": {
"k8s-app": "calico-node",
"pod-template-generation": "1",
"controller-revision-hash": "3209084365"
},
"namespace": "kube-system",
"ownerReferences": [
{
"kind": "DaemonSet",
"name": "calico-node",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "f560cc6d-b510-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "308",
"generateName": "calico-node-",
"creationTimestamp": "2017-10-19T21:03:31Z",
"annotations": {
"scheduler.alpha.kubernetes.io/critical-pod": "",
"scheduler.alpha.kubernetes.io/tolerations": "[{\"key\": \"dedicated\", \"value\": \"master\", \"effect\": \"NoSchedule\" },\n {\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]\n",
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"DaemonSet\",\"namespace\":\"kube-system\",\"name\":\"calico-node\",\"uid\":\"f560cc6d-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"181\"}}\n"
},
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-node-pnq2z",
"uid": "f60e5211-b510-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:06,012 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:06,012 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:06,012 5 DEBUG Updating pod: kube-system.calico-node-pnq2z
2017-10-19 21:04:06,012 5 DEBUG Compare labels on kube-system.calico-node-pnq2z. cached: None, new: {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', 'calico/k8s_ns': u'kube-system', u'controller-revision-hash': u'3209084365'}
2017-10-19 21:04:06,013 5 INFO Labels for kube-system.calico-node-pnq2z have been updated
2017-10-19 21:04:06,013 5 INFO No endpoint for kube-system.calico-node-pnq2z in cache, loading
2017-10-19 21:04:06,016 5 INFO Loaded endpoint and label caches
2017-10-19 21:04:06,016 5 INFO No endpoint for pod kube-system.calico-node-pnq2z - wait for creation
2017-10-19 21:04:06,016 5 INFO Handled MODIFIED for Pod: (u'kube-system', u'calico-node-pnq2z')
2017-10-19 21:04:06,016 5 DEBUG Reading from event queue
2017-10-19 21:04:06,017 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"qosClass": "Burstable",
"containerStatuses": [
{
"restartCount": 0,
"name": "calico-node",
"image": "quay.io/calico/node:v2.5.1",
"imageID": "docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc",
"state": {
"running": {
"startedAt": "2017-10-19T21:03:46Z"
}
},
"ready": true,
"lastState": {},
"containerID": "docker://075a805af05a5a597cbe740aea62b524cb2158d1cfa00562ebf09ec4b6623363"
},
{
"restartCount": 0,
"name": "install-cni",
"image": "quay.io/calico/cni:v1.10.0",
"imageID": "docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39",
"state": {
"running": {
"startedAt": "2017-10-19T21:03:50Z"
}
},
"ready": true,
"lastState": {},
"containerID": "docker://9ccb32220acf167a901c95da57d5b17a1ad0a097bee4ab35129cd72a5691db6c"
}
],
"podIP": "172.18.18.102",
"startTime": "2017-10-19T21:03:31Z",
"hostIP": "172.18.18.102",
"phase": "Running",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "Initialized",
"lastTransitionTime": "2017-10-19T21:03:31Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "Ready",
"lastTransitionTime": "2017-10-19T21:04:01Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:03:51Z"
}
]
},
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "calico-node",
"schedulerName": "default-scheduler",
"hostNetwork": true,
"serviceAccount": "calico-node",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"hostPath": {
"path": "/lib/modules"
},
"name": "lib-modules"
},
{
"hostPath": {
"path": "/var/run/calico"
},
"name": "var-run-calico"
},
{
"hostPath": {
"path": "/opt/cni/bin"
},
"name": "cni-bin-dir"
},
{
"hostPath": {
"path": "/etc/cni/net.d"
},
"name": "cni-net-dir"
},
{
"secret": {
"defaultMode": 420,
"secretName": "calico-etcd-secrets"
},
"name": "etcd-certs"
},
{
"secret": {
"defaultMode": 420,
"secretName": "calico-node-token-vk7vx"
},
"name": "calico-node-token-vk7vx"
}
],
"tolerations": [
{
"operator": "Exists",
"effect": "NoExecute",
"key": "node.alpha.kubernetes.io/notReady"
},
{
"operator": "Exists",
"effect": "NoExecute",
"key": "node.alpha.kubernetes.io/unreachable"
}
],
"containers": [
{
"livenessProbe": {
"httpGet": {
"path": "/liveness",
"scheme": "HTTP",
"port": 9099
},
"timeoutSeconds": 1,
"initialDelaySeconds": 10,
"periodSeconds": 10,
"successThreshold": 1,
"failureThreshold": 6
},
"terminationMessagePath": "/dev/termination-log",
"name": "calico-node",
"image": "quay.io/calico/node:v2.5.1",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/lib/modules",
"name": "lib-modules"
},
{
"mountPath": "/var/run/calico",
"name": "var-run-calico"
},
{
"mountPath": "/calico-secrets",
"name": "etcd-certs"
},
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "calico-node-token-vk7vx"
}
],
"terminationMessagePolicy": "File",
"env": [
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_endpoints"
}
},
"name": "ETCD_ENDPOINTS"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "calico_backend"
}
},
"name": "CALICO_NETWORKING_BACKEND"
},
{
"name": "CLUSTER_TYPE",
"value": "k8s,bgp"
},
{
"name": "CALICO_DISABLE_FILE_LOGGING",
"value": "true"
},
{
"name": "FELIX_DEFAULTENDPOINTTOHOSTACTION",
"value": "ACCEPT"
},
{
"name": "CALICO_IPV4POOL_CIDR",
"value": "192.168.0.0/16"
},
{
"name": "CALICO_IPV4POOL_IPIP",
"value": "always"
},
{
"name": "FELIX_IPV6SUPPORT",
"value": "false"
},
{
"name": "FELIX_LOGSEVERITYSCREEN",
"value": "info"
},
{
"name": "FELIX_IPINIPMTU",
"value": "1440"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_ca"
}
},
"name": "ETCD_CA_CERT_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_key"
}
},
"name": "ETCD_KEY_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_cert"
}
},
"name": "ETCD_CERT_FILE"
},
{
"name": "IP"
},
{
"name": "FELIX_HEALTHENABLED",
"value": "true"
}
],
"imagePullPolicy": "IfNotPresent",
"readinessProbe": {
"successThreshold": 1,
"httpGet": {
"path": "/readiness",
"scheme": "HTTP",
"port": 9099
},
"failureThreshold": 3,
"timeoutSeconds": 1,
"periodSeconds": 10
},
"securityContext": {
"privileged": true
},
"resources": {
"requests": {
"cpu": "250m"
}
}
},
{
"terminationMessagePath": "/dev/termination-log",
"name": "install-cni",
"image": "quay.io/calico/cni:v1.10.0",
"volumeMounts": [
{
"mountPath": "/host/opt/cni/bin",
"name": "cni-bin-dir"
},
{
"mountPath": "/host/etc/cni/net.d",
"name": "cni-net-dir"
},
{
"mountPath": "/calico-secrets",
"name": "etcd-certs"
},
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "calico-node-token-vk7vx"
}
],
"terminationMessagePolicy": "File",
"command": [
"/install-cni.sh"
],
"env": [
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_endpoints"
}
},
"name": "ETCD_ENDPOINTS"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "cni_network_config"
}
},
"name": "CNI_NETWORK_CONFIG"
}
],
"imagePullPolicy": "IfNotPresent",
"resources": {}
}
],
"nodeName": "172.18.18.102"
},
"metadata": {
"name": "calico-node-t0d59",
"labels": {
"k8s-app": "calico-node",
"pod-template-generation": "1",
"controller-revision-hash": "3209084365"
},
"namespace": "kube-system",
"ownerReferences": [
{
"kind": "DaemonSet",
"name": "calico-node",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "f560cc6d-b510-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "309",
"generateName": "calico-node-",
"creationTimestamp": "2017-10-19T21:03:31Z",
"annotations": {
"scheduler.alpha.kubernetes.io/critical-pod": "",
"scheduler.alpha.kubernetes.io/tolerations": "[{\"key\": \"dedicated\", \"value\": \"master\", \"effect\": \"NoSchedule\" },\n {\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]\n",
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"DaemonSet\",\"namespace\":\"kube-system\",\"name\":\"calico-node\",\"uid\":\"f560cc6d-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"181\"}}\n"
},
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-node-t0d59",
"uid": "f60ebaf2-b510-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:06,017 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:06,017 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:06,017 5 DEBUG Updating pod: kube-system.calico-node-t0d59
2017-10-19 21:04:06,017 5 DEBUG Compare labels on kube-system.calico-node-t0d59. cached: None, new: {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', 'calico/k8s_ns': u'kube-system', u'controller-revision-hash': u'3209084365'}
2017-10-19 21:04:06,017 5 INFO Labels for kube-system.calico-node-t0d59 have been updated
2017-10-19 21:04:06,017 5 INFO No endpoint for kube-system.calico-node-t0d59 in cache, loading
2017-10-19 21:04:06,019 5 INFO Loaded endpoint and label caches
2017-10-19 21:04:06,019 5 INFO No endpoint for pod kube-system.calico-node-t0d59 - wait for creation
2017-10-19 21:04:06,020 5 INFO Handled MODIFIED for Pod: (u'kube-system', u'calico-node-t0d59')
2017-10-19 21:04:06,020 5 DEBUG Reading from event queue
2017-10-19 21:04:06,020 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"qosClass": "BestEffort",
"containerStatuses": [
{
"restartCount": 0,
"name": "calico-policy-controller",
"image": "quay.io/calico/kube-policy-controller:v0.7.0",
"imageID": "",
"state": {
"waiting": {
"reason": "ContainerCreating"
}
},
"ready": false,
"lastState": {}
}
],
"podIP": "172.18.18.103",
"startTime": "2017-10-19T21:04:02Z",
"hostIP": "172.18.18.103",
"phase": "Pending",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "Initialized",
"lastTransitionTime": "2017-10-19T21:04:02Z"
},
{
"status": "False",
"lastTransitionTime": "2017-10-19T21:04:02Z",
"reason": "ContainersNotReady",
"lastProbeTime": null,
"message": "containers with unready status: [calico-policy-controller]",
"type": "Ready"
},
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:04:02Z"
}
]
},
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "calico-policy-controller",
"schedulerName": "default-scheduler",
"hostNetwork": true,
"serviceAccount": "calico-policy-controller",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "calico-etcd-secrets"
},
"name": "etcd-certs"
},
{
"secret": {
"defaultMode": 420,
"secretName": "calico-policy-controller-token-cfjmt"
},
"name": "calico-policy-controller-token-cfjmt"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "calico-policy-controller",
"image": "quay.io/calico/kube-policy-controller:v0.7.0",
"volumeMounts": [
{
"mountPath": "/calico-secrets",
"name": "etcd-certs"
},
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "calico-policy-controller-token-cfjmt"
}
],
"terminationMessagePolicy": "File",
"env": [
{
"name": "LOG_LEVEL",
"value": "debug"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_endpoints"
}
},
"name": "ETCD_ENDPOINTS"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_ca"
}
},
"name": "ETCD_CA_CERT_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_key"
}
},
"name": "ETCD_KEY_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_cert"
}
},
"name": "ETCD_CERT_FILE"
},
{
"name": "K8S_API",
"value": "https://kubernetes.default:443"
},
{
"name": "CONFIGURE_ETC_HOSTS",
"value": "true"
}
],
"imagePullPolicy": "IfNotPresent",
"resources": {}
}
],
"nodeName": "172.18.18.103"
},
"metadata": {
"name": "calico-policy-controller-2476506652-d7fb8",
"labels": {
"pod-template-hash": "2476506652",
"k8s-app": "calico-policy"
},
"namespace": "kube-system",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "calico-policy-controller-2476506652",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "f56f35f8-b510-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "317",
"generateName": "calico-policy-controller-2476506652-",
"creationTimestamp": "2017-10-19T21:03:31Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"kube-system\",\"name\":\"calico-policy-controller-2476506652\",\"uid\":\"f56f35f8-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"185\"}}\n"
},
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-policy-controller-2476506652-d7fb8",
"uid": "f60f8e4f-b510-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:06,020 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:06,020 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:06,020 5 DEBUG Updating pod: kube-system.calico-policy-controller-2476506652-d7fb8
2017-10-19 21:04:06,020 5 DEBUG Compare labels on kube-system.calico-policy-controller-2476506652-d7fb8. cached: None, new: {u'pod-template-hash': u'2476506652', u'k8s-app': u'calico-policy', 'calico/k8s_ns': u'kube-system'}
2017-10-19 21:04:06,020 5 INFO Labels for kube-system.calico-policy-controller-2476506652-d7fb8 have been updated
2017-10-19 21:04:06,020 5 INFO No endpoint for kube-system.calico-policy-controller-2476506652-d7fb8 in cache, loading
2017-10-19 21:04:06,022 5 INFO Loaded endpoint and label caches
2017-10-19 21:04:06,022 5 INFO No endpoint for pod kube-system.calico-policy-controller-2476506652-d7fb8 - wait for creation
2017-10-19 21:04:06,023 5 INFO Handled MODIFIED for Pod: (u'kube-system', u'calico-policy-controller-2476506652-d7fb8')
2017-10-19 21:04:06,023 5 DEBUG Reading from event queue
2017-10-19 21:04:06,023 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"qosClass": "BestEffort",
"containerStatuses": [
{
"restartCount": 0,
"name": "calico-policy-controller",
"image": "quay.io/calico/kube-policy-controller:v0.7.0",
"imageID": "docker-pullable://quay.io/calico/kube-policy-controller@sha256:3916d308f1c1681c19daccc35ddb621e4e93b49046343ebe9eda570c0f9fe5a4",
"state": {
"running": {
"startedAt": "2017-10-19T21:04:05Z"
}
},
"ready": true,
"lastState": {},
"containerID": "docker://e6060ee897397d2f17664b2bed4935093a324afdb4e327556440a4bcd0e66672"
}
],
"podIP": "172.18.18.103",
"startTime": "2017-10-19T21:04:02Z",
"hostIP": "172.18.18.103",
"phase": "Running",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "Initialized",
"lastTransitionTime": "2017-10-19T21:04:02Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "Ready",
"lastTransitionTime": "2017-10-19T21:04:05Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:04:02Z"
}
]
},
"kind": "Pod",
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "calico-policy-controller",
"schedulerName": "default-scheduler",
"hostNetwork": true,
"serviceAccount": "calico-policy-controller",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "calico-etcd-secrets"
},
"name": "etcd-certs"
},
{
"secret": {
"defaultMode": 420,
"secretName": "calico-policy-controller-token-cfjmt"
},
"name": "calico-policy-controller-token-cfjmt"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "calico-policy-controller",
"image": "quay.io/calico/kube-policy-controller:v0.7.0",
"volumeMounts": [
{
"mountPath": "/calico-secrets",
"name": "etcd-certs"
},
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "calico-policy-controller-token-cfjmt"
}
],
"terminationMessagePolicy": "File",
"env": [
{
"name": "LOG_LEVEL",
"value": "debug"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_endpoints"
}
},
"name": "ETCD_ENDPOINTS"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_ca"
}
},
"name": "ETCD_CA_CERT_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_key"
}
},
"name": "ETCD_KEY_FILE"
},
{
"valueFrom": {
"configMapKeyRef": {
"name": "calico-config",
"key": "etcd_cert"
}
},
"name": "ETCD_CERT_FILE"
},
{
"name": "K8S_API",
"value": "https://kubernetes.default:443"
},
{
"name": "CONFIGURE_ETC_HOSTS",
"value": "true"
}
],
"imagePullPolicy": "IfNotPresent",
"resources": {}
}
],
"nodeName": "172.18.18.103"
},
"apiVersion": "v1",
"metadata": {
"name": "calico-policy-controller-2476506652-d7fb8",
"labels": {
"pod-template-hash": "2476506652",
"k8s-app": "calico-policy"
},
"namespace": "kube-system",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "calico-policy-controller-2476506652",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "f56f35f8-b510-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "329",
"generateName": "calico-policy-controller-2476506652-",
"creationTimestamp": "2017-10-19T21:03:31Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"kube-system\",\"name\":\"calico-policy-controller-2476506652\",\"uid\":\"f56f35f8-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"185\"}}\n"
},
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-policy-controller-2476506652-d7fb8",
"uid": "f60f8e4f-b510-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:06,023 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:06,023 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:06,023 5 DEBUG Updating pod: kube-system.calico-policy-controller-2476506652-d7fb8
2017-10-19 21:04:06,023 5 DEBUG Compare labels on kube-system.calico-policy-controller-2476506652-d7fb8. cached: None, new: {'pod-template-hash': '2476506652', 'k8s-app': 'calico-policy', 'calico/k8s_ns': 'kube-system'}
2017-10-19 21:04:06,023 5 INFO Labels for kube-system.calico-policy-controller-2476506652-d7fb8 have been updated
2017-10-19 21:04:06,023 5 INFO No endpoint for kube-system.calico-policy-controller-2476506652-d7fb8 in cache, loading
2017-10-19 21:04:06,038 5 INFO Loaded endpoint and label caches
2017-10-19 21:04:06,039 5 INFO No endpoint for pod kube-system.calico-policy-controller-2476506652-d7fb8 - wait for creation
2017-10-19 21:04:06,039 5 INFO Handled MODIFIED for Pod: ('kube-system', 'calico-policy-controller-2476506652-d7fb8')
2017-10-19 21:04:06,039 5 DEBUG Emptied the event queue
2017-10-19 21:04:06,039 5 DEBUG Reading from event queue
2017-10-19 21:04:15,986 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:04:15,987 5 DEBUG Normal read time out for Namespace
2017-10-19 21:04:15,991 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:04:15,991 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:04:15,991 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '327'. stream=True
2017-10-19 21:04:15,991 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:04:15,995 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:04:15,996 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '327'. stream=True
2017-10-19 21:04:16,016 5 DEBUG Normal read time out for Pod
2017-10-19 21:04:16,016 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:04:16,016 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:04:16,016 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '329'. stream=True
2017-10-19 21:04:16,032 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:04:16,032 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:04:16,033 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:04:26,037 5 DEBUG Normal read time out for Pod
2017-10-19 21:04:26,038 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:04:26,037 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:04:26,038 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:04:26,038 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:04:26,038 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '327'. stream=True
2017-10-19 21:04:26,037 5 DEBUG Normal read time out for Namespace
2017-10-19 21:04:26,040 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:04:26,040 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:04:26,040 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '327'. stream=True
2017-10-19 21:04:26,041 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:04:26,041 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '329'. stream=True
2017-10-19 21:04:26,067 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:04:26,068 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:04:26,069 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:04:34,282 5 DEBUG Read from API: {"type":"ADDED","object":{"kind":"Namespace","apiVersion":"v1","metadata":{"name":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo","uid":"1bc0ebf5-b511-11e7-912d-0800275f1e48","resourceVersion":"369","creationTimestamp":"2017-10-19T21:04:34Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}}}
2017-10-19 21:04:34,282 5 DEBUG ADDED Namespace: policy-demo to queue (0) (1508447074.28)
2017-10-19 21:04:34,283 5 DEBUG Read event: ADDED, Namespace, {
"status": {
"phase": "Active"
},
"kind": "Namespace",
"spec": {
"finalizers": [
"kubernetes"
]
},
"apiVersion": "v1",
"metadata": {
"resourceVersion": "369",
"creationTimestamp": "2017-10-19T21:04:34Z",
"name": "policy-demo",
"selfLink": "/api/v1/namespaces/policy-demo",
"uid": "1bc0ebf5-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:34,283 5 DEBUG Processing 'ADDED' for kind 'Namespace'
2017-10-19 21:04:34,283 5 DEBUG Looking up handler for event: ('Namespace', 'ADDED')
2017-10-19 21:04:34,283 5 DEBUG Adding/updating namespace: policy-demo
2017-10-19 21:04:34,283 5 DEBUG Generated namespace labels: {}
2017-10-19 21:04:34,283 5 DEBUG Update resourceVersion, was: 327, now: 369
2017-10-19 21:04:34,321 5 DEBUG Created/updated profile for namespace policy-demo
2017-10-19 21:04:34,322 5 INFO Handled ADDED for Namespace: (None, 'policy-demo')
2017-10-19 21:04:34,322 5 DEBUG Emptied the event queue
2017-10-19 21:04:34,322 5 DEBUG Reading from event queue
2017-10-19 21:04:34,549 5 DEBUG Read from API: {"type":"ADDED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-cndwl","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl","uid":"1be49648-b511-11e7-912d-0800275f1e48","resourceVersion":"378","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","qosClass":"BestEffort"}}}
2017-10-19 21:04:34,549 5 DEBUG ADDED Pod: nginx-4217019353-cndwl to queue (0) (1508447074.55)
2017-10-19 21:04:34,549 5 DEBUG Update resourceVersion, was: 329, now: 378
2017-10-19 21:04:34,549 5 DEBUG Read event: ADDED, Pod, {
"status": {
"phase": "Pending",
"qosClass": "BestEffort"
},
"kind": "Pod",
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "default",
"schedulerName": "default-scheduler",
"serviceAccount": "default",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "default-token-38j41"
},
"name": "default-token-38j41"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "nginx",
"image": "nginx",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "default-token-38j41"
}
],
"terminationMessagePolicy": "File",
"imagePullPolicy": "Always",
"resources": {}
}
]
},
"apiVersion": "v1",
"metadata": {
"name": "nginx-4217019353-cndwl",
"labels": {
"pod-template-hash": "4217019353",
"run": "nginx"
},
"namespace": "policy-demo",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "nginx-4217019353",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "378",
"generateName": "nginx-4217019353-",
"creationTimestamp": "2017-10-19T21:04:34Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"
},
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl",
"uid": "1be49648-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:34,549 5 DEBUG Processing 'ADDED' for kind 'Pod'
2017-10-19 21:04:34,549 5 DEBUG Looking up handler for event: ('Pod', 'ADDED')
2017-10-19 21:04:34,549 5 DEBUG Updated label cache with policy-demo.nginx-4217019353-cndwl: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}
2017-10-19 21:04:34,549 5 INFO Handled ADDED for Pod: ('policy-demo', 'nginx-4217019353-cndwl')
2017-10-19 21:04:34,549 5 DEBUG Emptied the event queue
2017-10-19 21:04:34,549 5 DEBUG Reading from event queue
2017-10-19 21:04:34,557 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-cndwl","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl","uid":"1be49648-b511-11e7-912d-0800275f1e48","resourceVersion":"379","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.102","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"qosClass":"BestEffort"}}}
2017-10-19 21:04:34,557 5 DEBUG MODIFIED Pod: nginx-4217019353-cndwl to queue (0) (1508447074.56)
2017-10-19 21:04:34,557 5 DEBUG Update resourceVersion, was: 378, now: 379
2017-10-19 21:04:34,557 5 DEBUG Read from API: {"type":"ADDED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-6ps02","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02","uid":"1bea5ba6-b511-11e7-912d-0800275f1e48","resourceVersion":"380","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","qosClass":"BestEffort"}}}
2017-10-19 21:04:34,557 5 DEBUG ADDED Pod: nginx-4217019353-6ps02 to queue (1) (1508447074.56)
2017-10-19 21:04:34,557 5 DEBUG Update resourceVersion, was: 379, now: 380
2017-10-19 21:04:34,558 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"phase": "Pending",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:04:34Z"
}
],
"qosClass": "BestEffort"
},
"kind": "Pod",
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "default",
"schedulerName": "default-scheduler",
"serviceAccount": "default",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "default-token-38j41"
},
"name": "default-token-38j41"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "nginx",
"image": "nginx",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "default-token-38j41"
}
],
"terminationMessagePolicy": "File",
"imagePullPolicy": "Always",
"resources": {}
}
],
"nodeName": "172.18.18.102"
},
"apiVersion": "v1",
"metadata": {
"name": "nginx-4217019353-cndwl",
"labels": {
"pod-template-hash": "4217019353",
"run": "nginx"
},
"namespace": "policy-demo",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "nginx-4217019353",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "379",
"generateName": "nginx-4217019353-",
"creationTimestamp": "2017-10-19T21:04:34Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"
},
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl",
"uid": "1be49648-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:34,558 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:34,558 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:34,558 5 DEBUG Updating pod: policy-demo.nginx-4217019353-cndwl
2017-10-19 21:04:34,558 5 DEBUG Compare labels on policy-demo.nginx-4217019353-cndwl. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}
2017-10-19 21:04:34,558 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-cndwl with no label change
2017-10-19 21:04:34,558 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-cndwl')
2017-10-19 21:04:34,558 5 DEBUG Reading from event queue
2017-10-19 21:04:34,558 5 DEBUG Read event: ADDED, Pod, {
"status": {
"phase": "Pending",
"qosClass": "BestEffort"
},
"kind": "Pod",
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "default",
"schedulerName": "default-scheduler",
"serviceAccount": "default",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "default-token-38j41"
},
"name": "default-token-38j41"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "nginx",
"image": "nginx",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "default-token-38j41"
}
],
"terminationMessagePolicy": "File",
"imagePullPolicy": "Always",
"resources": {}
}
]
},
"apiVersion": "v1",
"metadata": {
"name": "nginx-4217019353-6ps02",
"labels": {
"pod-template-hash": "4217019353",
"run": "nginx"
},
"namespace": "policy-demo",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "nginx-4217019353",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "380",
"generateName": "nginx-4217019353-",
"creationTimestamp": "2017-10-19T21:04:34Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"
},
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02",
"uid": "1bea5ba6-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:34,558 5 DEBUG Processing 'ADDED' for kind 'Pod'
2017-10-19 21:04:34,558 5 DEBUG Looking up handler for event: ('Pod', 'ADDED')
2017-10-19 21:04:34,558 5 DEBUG Updated label cache with policy-demo.nginx-4217019353-6ps02: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}
2017-10-19 21:04:34,558 5 INFO Handled ADDED for Pod: ('policy-demo', 'nginx-4217019353-6ps02')
2017-10-19 21:04:34,558 5 DEBUG Emptied the event queue
2017-10-19 21:04:34,558 5 DEBUG Reading from event queue
2017-10-19 21:04:34,565 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-6ps02","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02","uid":"1bea5ba6-b511-11e7-912d-0800275f1e48","resourceVersion":"381","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.103","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"qosClass":"BestEffort"}}}
2017-10-19 21:04:34,565 5 DEBUG MODIFIED Pod: nginx-4217019353-6ps02 to queue (0) (1508447074.57)
2017-10-19 21:04:34,565 5 DEBUG Update resourceVersion, was: 380, now: 381
2017-10-19 21:04:34,565 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"phase": "Pending",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:04:34Z"
}
],
"qosClass": "BestEffort"
},
"kind": "Pod",
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "default",
"schedulerName": "default-scheduler",
"serviceAccount": "default",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "default-token-38j41"
},
"name": "default-token-38j41"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "nginx",
"image": "nginx",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "default-token-38j41"
}
],
"terminationMessagePolicy": "File",
"imagePullPolicy": "Always",
"resources": {}
}
],
"nodeName": "172.18.18.103"
},
"apiVersion": "v1",
"metadata": {
"name": "nginx-4217019353-6ps02",
"labels": {
"pod-template-hash": "4217019353",
"run": "nginx"
},
"namespace": "policy-demo",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "nginx-4217019353",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "381",
"generateName": "nginx-4217019353-",
"creationTimestamp": "2017-10-19T21:04:34Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"
},
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02",
"uid": "1bea5ba6-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:34,565 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:34,567 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:34,567 5 DEBUG Updating pod: policy-demo.nginx-4217019353-6ps02
2017-10-19 21:04:34,567 5 DEBUG Compare labels on policy-demo.nginx-4217019353-6ps02. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}
2017-10-19 21:04:34,567 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-6ps02 with no label change
2017-10-19 21:04:34,567 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-6ps02')
2017-10-19 21:04:34,567 5 DEBUG Emptied the event queue
2017-10-19 21:04:34,567 5 DEBUG Reading from event queue
2017-10-19 21:04:34,579 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-cndwl","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl","uid":"1be49648-b511-11e7-912d-0800275f1e48","resourceVersion":"389","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.102","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z","reason":"ContainersNotReady","message":"containers with unready status: [nginx]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"hostIP":"172.18.18.102","startTime":"2017-10-19T21:04:34Z","containerStatuses":[{"name":"nginx","state":{"waiting":{"reason":"ContainerCreating"}},"lastState":{},"ready":false,"restartCount":0,"image":"nginx","imageID":""}],"qosClass":"BestEffort"}}}
2017-10-19 21:04:34,579 5 DEBUG MODIFIED Pod: nginx-4217019353-cndwl to queue (0) (1508447074.58)
2017-10-19 21:04:34,579 5 DEBUG Update resourceVersion, was: 381, now: 389
2017-10-19 21:04:34,579 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"qosClass": "BestEffort",
"containerStatuses": [
{
"restartCount": 0,
"name": "nginx",
"image": "nginx",
"imageID": "",
"state": {
"waiting": {
"reason": "ContainerCreating"
}
},
"ready": false,
"lastState": {}
}
],
"startTime": "2017-10-19T21:04:34Z",
"hostIP": "172.18.18.102",
"phase": "Pending",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "Initialized",
"lastTransitionTime": "2017-10-19T21:04:34Z"
},
{
"status": "False",
"lastTransitionTime": "2017-10-19T21:04:34Z",
"reason": "ContainersNotReady",
"lastProbeTime": null,
"message": "containers with unready status: [nginx]",
"type": "Ready"
},
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:04:34Z"
}
]
},
"kind": "Pod",
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "default",
"schedulerName": "default-scheduler",
"serviceAccount": "default",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "default-token-38j41"
},
"name": "default-token-38j41"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "nginx",
"image": "nginx",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "default-token-38j41"
}
],
"terminationMessagePolicy": "File",
"imagePullPolicy": "Always",
"resources": {}
}
],
"nodeName": "172.18.18.102"
},
"apiVersion": "v1",
"metadata": {
"name": "nginx-4217019353-cndwl",
"labels": {
"pod-template-hash": "4217019353",
"run": "nginx"
},
"namespace": "policy-demo",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "nginx-4217019353",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "389",
"generateName": "nginx-4217019353-",
"creationTimestamp": "2017-10-19T21:04:34Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"
},
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl",
"uid": "1be49648-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:34,579 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:34,579 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:34,579 5 DEBUG Updating pod: policy-demo.nginx-4217019353-cndwl
2017-10-19 21:04:34,579 5 DEBUG Compare labels on policy-demo.nginx-4217019353-cndwl. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}
2017-10-19 21:04:34,579 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-cndwl with no label change
2017-10-19 21:04:34,579 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-cndwl')
2017-10-19 21:04:34,579 5 DEBUG Emptied the event queue
2017-10-19 21:04:34,579 5 DEBUG Reading from event queue
2017-10-19 21:04:34,580 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-6ps02","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02","uid":"1bea5ba6-b511-11e7-912d-0800275f1e48","resourceVersion":"390","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.103","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z","reason":"ContainersNotReady","message":"containers with unready status: [nginx]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"hostIP":"172.18.18.103","startTime":"2017-10-19T21:04:34Z","containerStatuses":[{"name":"nginx","state":{"waiting":{"reason":"ContainerCreating"}},"lastState":{},"ready":false,"restartCount":0,"image":"nginx","imageID":""}],"qosClass":"BestEffort"}}}
2017-10-19 21:04:34,581 5 DEBUG MODIFIED Pod: nginx-4217019353-6ps02 to queue (0) (1508447074.58)
2017-10-19 21:04:34,581 5 DEBUG Update resourceVersion, was: 389, now: 390
2017-10-19 21:04:34,581 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"qosClass": "BestEffort",
"containerStatuses": [
{
"restartCount": 0,
"name": "nginx",
"image": "nginx",
"imageID": "",
"state": {
"waiting": {
"reason": "ContainerCreating"
}
},
"ready": false,
"lastState": {}
}
],
"startTime": "2017-10-19T21:04:34Z",
"hostIP": "172.18.18.103",
"phase": "Pending",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "Initialized",
"lastTransitionTime": "2017-10-19T21:04:34Z"
},
{
"status": "False",
"lastTransitionTime": "2017-10-19T21:04:34Z",
"reason": "ContainersNotReady",
"lastProbeTime": null,
"message": "containers with unready status: [nginx]",
"type": "Ready"
},
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:04:34Z"
}
]
},
"kind": "Pod",
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "default",
"schedulerName": "default-scheduler",
"serviceAccount": "default",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "default-token-38j41"
},
"name": "default-token-38j41"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "nginx",
"image": "nginx",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "default-token-38j41"
}
],
"terminationMessagePolicy": "File",
"imagePullPolicy": "Always",
"resources": {}
}
],
"nodeName": "172.18.18.103"
},
"apiVersion": "v1",
"metadata": {
"name": "nginx-4217019353-6ps02",
"labels": {
"pod-template-hash": "4217019353",
"run": "nginx"
},
"namespace": "policy-demo",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "nginx-4217019353",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "390",
"generateName": "nginx-4217019353-",
"creationTimestamp": "2017-10-19T21:04:34Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"
},
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02",
"uid": "1bea5ba6-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:34,581 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:34,581 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:34,581 5 DEBUG Updating pod: policy-demo.nginx-4217019353-6ps02
2017-10-19 21:04:34,581 5 DEBUG Compare labels on policy-demo.nginx-4217019353-6ps02. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}
2017-10-19 21:04:34,581 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-6ps02 with no label change
2017-10-19 21:04:34,581 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-6ps02')
2017-10-19 21:04:34,581 5 DEBUG Emptied the event queue
2017-10-19 21:04:34,581 5 DEBUG Reading from event queue
2017-10-19 21:04:35,296 5 DEBUG Read from API: {"type":"ADDED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:04:35,296 5 DEBUG ADDED NetworkPolicy: default-deny to queue (0) (1508447075.3)
2017-10-19 21:04:35,296 5 DEBUG Update resourceVersion, was: 327, now: 398
2017-10-19 21:04:35,296 5 DEBUG Read event: ADDED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:35,296 5 DEBUG Processing 'ADDED' for kind 'NetworkPolicy'
2017-10-19 21:04:35,297 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'ADDED')
2017-10-19 21:04:35,297 5 DEBUG Adding new network policy: policy-demo.default-deny
2017-10-19 21:04:35,297 5 DEBUG Calculating pod selector
2017-10-19 21:04:35,297 5 DEBUG Selector with 1 filters
2017-10-19 21:04:35,297 5 DEBUG Calculating inbound rules
2017-10-19 21:04:35,297 5 DEBUG Calculated total set of rules: []
2017-10-19 21:04:35,305 5 DEBUG Updated policy 'policy-demo.default-deny' for NetworkPolicy
2017-10-19 21:04:35,305 5 INFO Handled ADDED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:04:35,305 5 DEBUG Emptied the event queue
2017-10-19 21:04:35,305 5 DEBUG Reading from event queue
2017-10-19 21:04:41,562 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-cndwl","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl","uid":"1be49648-b511-11e7-912d-0800275f1e48","resourceVersion":"412","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.102","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Running","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:41Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"hostIP":"172.18.18.102","podIP":"192.168.154.193","startTime":"2017-10-19T21:04:34Z","containerStatuses":[{"name":"nginx","state":{"running":{"startedAt":"2017-10-19T21:04:41Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"nginx:latest","imageID":"docker-pullable://nginx@sha256:004ac1d5e791e705f12a17c80d7bb1e8f7f01aa7dca7deee6e65a03465392072","containerID":"docker://4da8f606fa6e100f09b02d65bbe6504cdb9bc2d78e395f68c4e5baad273f2808"}],"qosClass":"BestEffort"}}}
2017-10-19 21:04:41,562 5 DEBUG MODIFIED Pod: nginx-4217019353-cndwl to queue (0) (1508447081.56)
2017-10-19 21:04:41,562 5 DEBUG Update resourceVersion, was: 390, now: 412
2017-10-19 21:04:41,563 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"qosClass": "BestEffort",
"containerStatuses": [
{
"restartCount": 0,
"name": "nginx",
"image": "nginx:latest",
"imageID": "docker-pullable://nginx@sha256:004ac1d5e791e705f12a17c80d7bb1e8f7f01aa7dca7deee6e65a03465392072",
"state": {
"running": {
"startedAt": "2017-10-19T21:04:41Z"
}
},
"ready": true,
"lastState": {},
"containerID": "docker://4da8f606fa6e100f09b02d65bbe6504cdb9bc2d78e395f68c4e5baad273f2808"
}
],
"podIP": "192.168.154.193",
"startTime": "2017-10-19T21:04:34Z",
"hostIP": "172.18.18.102",
"phase": "Running",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "Initialized",
"lastTransitionTime": "2017-10-19T21:04:34Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "Ready",
"lastTransitionTime": "2017-10-19T21:04:41Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:04:34Z"
}
]
},
"kind": "Pod",
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "default",
"schedulerName": "default-scheduler",
"serviceAccount": "default",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "default-token-38j41"
},
"name": "default-token-38j41"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "nginx",
"image": "nginx",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "default-token-38j41"
}
],
"terminationMessagePolicy": "File",
"imagePullPolicy": "Always",
"resources": {}
}
],
"nodeName": "172.18.18.102"
},
"apiVersion": "v1",
"metadata": {
"name": "nginx-4217019353-cndwl",
"labels": {
"pod-template-hash": "4217019353",
"run": "nginx"
},
"namespace": "policy-demo",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "nginx-4217019353",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "412",
"generateName": "nginx-4217019353-",
"creationTimestamp": "2017-10-19T21:04:34Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"
},
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl",
"uid": "1be49648-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:41,563 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:41,563 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:41,563 5 DEBUG Updating pod: policy-demo.nginx-4217019353-cndwl
2017-10-19 21:04:41,563 5 DEBUG Compare labels on policy-demo.nginx-4217019353-cndwl. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}
2017-10-19 21:04:41,563 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-cndwl with no label change
2017-10-19 21:04:41,563 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-cndwl')
2017-10-19 21:04:41,563 5 DEBUG Emptied the event queue
2017-10-19 21:04:41,563 5 DEBUG Reading from event queue
2017-10-19 21:04:43,306 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-6ps02","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02","uid":"1bea5ba6-b511-11e7-912d-0800275f1e48","resourceVersion":"420","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.103","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Running","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"hostIP":"172.18.18.103","podIP":"192.168.44.193","startTime":"2017-10-19T21:04:34Z","containerStatuses":[{"name":"nginx","state":{"running":{"startedAt":"2017-10-19T21:04:43Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"nginx:latest","imageID":"docker-pullable://nginx@sha256:004ac1d5e791e705f12a17c80d7bb1e8f7f01aa7dca7deee6e65a03465392072","containerID":"docker://e489a98391f9886e05a686018e31670d7d503ea2f0959a2d8283789050bd1367"}],"qosClass":"BestEffort"}}}
2017-10-19 21:04:43,306 5 DEBUG MODIFIED Pod: nginx-4217019353-6ps02 to queue (0) (1508447083.31)
2017-10-19 21:04:43,306 5 DEBUG Update resourceVersion, was: 412, now: 420
2017-10-19 21:04:43,307 5 DEBUG Read event: MODIFIED, Pod, {
"status": {
"qosClass": "BestEffort",
"containerStatuses": [
{
"restartCount": 0,
"name": "nginx",
"image": "nginx:latest",
"imageID": "docker-pullable://nginx@sha256:004ac1d5e791e705f12a17c80d7bb1e8f7f01aa7dca7deee6e65a03465392072",
"state": {
"running": {
"startedAt": "2017-10-19T21:04:43Z"
}
},
"ready": true,
"lastState": {},
"containerID": "docker://e489a98391f9886e05a686018e31670d7d503ea2f0959a2d8283789050bd1367"
}
],
"podIP": "192.168.44.193",
"startTime": "2017-10-19T21:04:34Z",
"hostIP": "172.18.18.103",
"phase": "Running",
"conditions": [
{
"status": "True",
"lastProbeTime": null,
"type": "Initialized",
"lastTransitionTime": "2017-10-19T21:04:34Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "Ready",
"lastTransitionTime": "2017-10-19T21:04:43Z"
},
{
"status": "True",
"lastProbeTime": null,
"type": "PodScheduled",
"lastTransitionTime": "2017-10-19T21:04:34Z"
}
]
},
"kind": "Pod",
"spec": {
"dnsPolicy": "ClusterFirst",
"securityContext": {},
"serviceAccountName": "default",
"schedulerName": "default-scheduler",
"serviceAccount": "default",
"terminationGracePeriodSeconds": 30,
"restartPolicy": "Always",
"volumes": [
{
"secret": {
"defaultMode": 420,
"secretName": "default-token-38j41"
},
"name": "default-token-38j41"
}
],
"containers": [
{
"terminationMessagePath": "/dev/termination-log",
"name": "nginx",
"image": "nginx",
"volumeMounts": [
{
"readOnly": true,
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
"name": "default-token-38j41"
}
],
"terminationMessagePolicy": "File",
"imagePullPolicy": "Always",
"resources": {}
}
],
"nodeName": "172.18.18.103"
},
"apiVersion": "v1",
"metadata": {
"name": "nginx-4217019353-6ps02",
"labels": {
"pod-template-hash": "4217019353",
"run": "nginx"
},
"namespace": "policy-demo",
"ownerReferences": [
{
"kind": "ReplicaSet",
"name": "nginx-4217019353",
"apiVersion": "extensions/v1beta1",
"controller": true,
"blockOwnerDeletion": true,
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48"
}
],
"resourceVersion": "420",
"generateName": "nginx-4217019353-",
"creationTimestamp": "2017-10-19T21:04:34Z",
"annotations": {
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"
},
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02",
"uid": "1bea5ba6-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:43,307 5 DEBUG Processing 'MODIFIED' for kind 'Pod'
2017-10-19 21:04:43,307 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED')
2017-10-19 21:04:43,307 5 DEBUG Updating pod: policy-demo.nginx-4217019353-6ps02
2017-10-19 21:04:43,307 5 DEBUG Compare labels on policy-demo.nginx-4217019353-6ps02. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}
2017-10-19 21:04:43,307 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-6ps02 with no label change
2017-10-19 21:04:43,307 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-6ps02')
2017-10-19 21:04:43,307 5 DEBUG Emptied the event queue
2017-10-19 21:04:43,307 5 DEBUG Reading from event queue
2017-10-19 21:04:44,286 5 DEBUG Normal read time out for Namespace
2017-10-19 21:04:44,288 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:04:44,288 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:04:44,289 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:04:44,317 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:04:45,307 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:04:45,308 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:04:45,309 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:04:45,310 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:04:45,343 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:04:49,214 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:04:49,214 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447089.21)
2017-10-19 21:04:49,214 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:49,214 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:04:49,214 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:04:49,214 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:04:49,215 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:04:49,219 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:04:49,221 5 DEBUG Emptied the event queue
2017-10-19 21:04:49,221 5 DEBUG Reading from event queue
2017-10-19 21:04:53,316 5 DEBUG Normal read time out for Pod
2017-10-19 21:04:53,316 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:04:53,316 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:04:53,316 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:04:53,331 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:04:54,326 5 DEBUG Normal read time out for Namespace
2017-10-19 21:04:54,327 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:04:54,327 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:04:54,327 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:04:54,353 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:04:59,219 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:04:59,220 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:04:59,220 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:04:59,220 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:04:59,249 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:04:59,251 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:04:59,251 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447099.25)
2017-10-19 21:04:59,252 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:04:59,252 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:04:59,252 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:04:59,252 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:04:59,255 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:04:59,258 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:04:59,259 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:04:59,259 5 DEBUG Emptied the event queue
2017-10-19 21:04:59,259 5 DEBUG Reading from event queue
2017-10-19 21:05:03,336 5 DEBUG Normal read time out for Pod
2017-10-19 21:05:03,337 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:05:03,337 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:05:03,338 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:05:03,365 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:05:04,357 5 DEBUG Normal read time out for Namespace
2017-10-19 21:05:04,358 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:05:04,359 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:05:04,359 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:05:04,387 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:05:09,266 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:05:09,266 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:05:09,266 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:05:09,266 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:05:09,275 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:05:09,275 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:05:09,275 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447109.28)
2017-10-19 21:05:09,275 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:05:09,275 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:05:09,275 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:05:09,275 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:05:09,275 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:05:09,278 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:05:09,278 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:05:09,278 5 DEBUG Emptied the event queue
2017-10-19 21:05:09,278 5 DEBUG Reading from event queue
2017-10-19 21:05:13,380 5 DEBUG Normal read time out for Pod
2017-10-19 21:05:13,380 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:05:13,380 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:05:13,380 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:05:13,399 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:05:14,396 5 DEBUG Normal read time out for Namespace
2017-10-19 21:05:14,398 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:05:14,398 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:05:14,399 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:05:14,435 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:05:19,284 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:05:19,286 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:05:19,287 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:05:19,288 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:05:19,316 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:05:19,317 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:05:19,317 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447119.32)
2017-10-19 21:05:19,317 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:05:19,317 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:05:19,317 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:05:19,317 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:05:19,318 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:05:19,320 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:05:19,320 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:05:19,320 5 DEBUG Emptied the event queue
2017-10-19 21:05:19,320 5 DEBUG Reading from event queue
2017-10-19 21:05:23,406 5 DEBUG Normal read time out for Pod
2017-10-19 21:05:23,407 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:05:23,410 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:05:23,410 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:05:23,444 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:05:24,436 5 DEBUG Normal read time out for Namespace
2017-10-19 21:05:24,437 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:05:24,437 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:05:24,439 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:05:24,467 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:05:29,326 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:05:29,327 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:05:29,327 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:05:29,327 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:05:29,356 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:05:29,360 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:05:29,361 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447129.36)
2017-10-19 21:05:29,361 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:05:29,362 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:05:29,362 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:05:29,362 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:05:29,361 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:05:29,366 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:05:29,366 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:05:29,366 5 DEBUG Emptied the event queue
2017-10-19 21:05:29,367 5 DEBUG Reading from event queue
2017-10-19 21:05:33,451 5 DEBUG Normal read time out for Pod
2017-10-19 21:05:33,451 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:05:33,452 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:05:33,452 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:05:33,480 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:05:34,476 5 DEBUG Normal read time out for Namespace
2017-10-19 21:05:34,478 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:05:34,478 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:05:34,478 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:05:34,508 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:05:39,367 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:05:39,368 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:05:39,369 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:05:39,369 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:05:39,397 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:05:39,397 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:05:39,398 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447139.4)
2017-10-19 21:05:39,398 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:05:39,398 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:05:39,398 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:05:39,398 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:05:39,398 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:05:39,402 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:05:39,403 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:05:39,403 5 DEBUG Emptied the event queue
2017-10-19 21:05:39,403 5 DEBUG Reading from event queue
2017-10-19 21:05:43,486 5 DEBUG Normal read time out for Pod
2017-10-19 21:05:43,487 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:05:43,487 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:05:43,487 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:05:43,513 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:05:44,515 5 DEBUG Normal read time out for Namespace
2017-10-19 21:05:44,515 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:05:44,517 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:05:44,517 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:05:44,546 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:05:49,406 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:05:49,406 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:05:49,406 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:05:49,406 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:05:49,417 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:05:49,417 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:05:49,417 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447149.42)
2017-10-19 21:05:49,418 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:05:49,418 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:05:49,418 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:05:49,418 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:05:49,418 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:05:49,419 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:05:49,419 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:05:49,419 5 DEBUG Emptied the event queue
2017-10-19 21:05:49,419 5 DEBUG Reading from event queue
2017-10-19 21:05:53,517 5 DEBUG Normal read time out for Pod
2017-10-19 21:05:53,519 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:05:53,519 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:05:53,519 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:05:53,547 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:05:54,556 5 DEBUG Normal read time out for Namespace
2017-10-19 21:05:54,557 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:05:54,557 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:05:54,559 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:05:54,572 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:05:59,426 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:05:59,427 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:05:59,429 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:05:59,431 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:05:59,456 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:05:59,457 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:05:59,457 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447159.46)
2017-10-19 21:05:59,457 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:05:59,458 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:05:59,458 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:05:59,458 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:05:59,459 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:05:59,461 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:05:59,461 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:05:59,461 5 DEBUG Emptied the event queue
2017-10-19 21:05:59,461 5 DEBUG Reading from event queue
2017-10-19 21:06:03,550 5 DEBUG Normal read time out for Pod
2017-10-19 21:06:03,550 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:06:03,551 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:06:03,551 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:06:03,568 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:06:04,580 5 DEBUG Normal read time out for Namespace
2017-10-19 21:06:04,580 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:06:04,580 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:06:04,580 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:06:04,591 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:06:09,466 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:06:09,468 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:06:09,468 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:06:09,469 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:06:09,495 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:06:09,496 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:06:09,496 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447169.5)
2017-10-19 21:06:09,497 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:06:09,497 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:06:09,498 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:06:09,498 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:06:09,500 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:06:09,503 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:06:09,504 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:06:09,504 5 DEBUG Emptied the event queue
2017-10-19 21:06:09,504 5 DEBUG Reading from event queue
2017-10-19 21:06:13,580 5 DEBUG Normal read time out for Pod
2017-10-19 21:06:13,580 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:06:13,581 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:06:13,581 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:06:13,612 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:06:14,597 5 DEBUG Normal read time out for Namespace
2017-10-19 21:06:14,598 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:06:14,599 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:06:14,599 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:06:14,628 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:06:19,506 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:06:19,506 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:06:19,506 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:06:19,506 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:06:19,538 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:06:19,539 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:06:19,540 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447179.54)
2017-10-19 21:06:19,540 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:06:19,540 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:06:19,541 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:06:19,541 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:06:19,543 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:06:19,546 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:06:19,547 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:06:19,547 5 DEBUG Emptied the event queue
2017-10-19 21:06:19,547 5 DEBUG Reading from event queue
2017-10-19 21:06:23,616 5 DEBUG Normal read time out for Pod
2017-10-19 21:06:23,617 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:06:23,617 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:06:23,617 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:06:23,645 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:06:24,633 5 DEBUG Normal read time out for Namespace
2017-10-19 21:06:24,635 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:06:24,635 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:06:24,636 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:06:24,661 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:06:29,546 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:06:29,546 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:06:29,546 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:06:29,547 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:06:29,556 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:06:29,556 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:06:29,556 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447189.56)
2017-10-19 21:06:29,556 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:06:29,556 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:06:29,557 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:06:29,557 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:06:29,556 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:06:29,559 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:06:29,559 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:06:29,559 5 DEBUG Emptied the event queue
2017-10-19 21:06:29,559 5 DEBUG Reading from event queue
2017-10-19 21:06:33,657 5 DEBUG Normal read time out for Pod
2017-10-19 21:06:33,658 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:06:33,659 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:06:33,660 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:06:33,687 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:06:34,666 5 DEBUG Normal read time out for Namespace
2017-10-19 21:06:34,667 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:06:34,667 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:06:34,669 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:06:34,698 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:06:39,567 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:06:39,567 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:06:39,567 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:06:39,569 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:06:39,597 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:06:39,598 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:06:39,598 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447199.6)
2017-10-19 21:06:39,599 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:06:39,600 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:06:39,600 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:06:39,600 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:06:39,602 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:06:39,607 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:06:39,607 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:06:39,607 5 DEBUG Emptied the event queue
2017-10-19 21:06:39,607 5 DEBUG Reading from event queue
2017-10-19 21:06:43,696 5 DEBUG Normal read time out for Pod
2017-10-19 21:06:43,697 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:06:43,697 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:06:43,697 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:06:43,711 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:06:44,706 5 DEBUG Normal read time out for Namespace
2017-10-19 21:06:44,707 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:06:44,707 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:06:44,707 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:06:44,715 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:06:49,606 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:06:49,607 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:06:49,607 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:06:49,608 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:06:49,635 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:06:49,637 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:06:49,638 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447209.64)
2017-10-19 21:06:49,640 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:06:49,640 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:06:49,640 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:06:49,640 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:06:49,643 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:06:49,646 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:06:49,647 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:06:49,647 5 DEBUG Emptied the event queue
2017-10-19 21:06:49,647 5 DEBUG Reading from event queue
2017-10-19 21:06:53,716 5 DEBUG Normal read time out for Pod
2017-10-19 21:06:53,717 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:06:53,717 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:06:53,717 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:06:53,745 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:06:54,716 5 DEBUG Normal read time out for Namespace
2017-10-19 21:06:54,717 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:06:54,717 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:06:54,717 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:06:54,746 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:06:59,646 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:06:59,647 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:06:59,647 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:06:59,647 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:06:59,675 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:06:59,675 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:06:59,676 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447219.68)
2017-10-19 21:06:59,676 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:06:59,676 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:06:59,676 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:06:59,677 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:06:59,677 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:06:59,679 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:06:59,679 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:06:59,679 5 DEBUG Emptied the event queue
2017-10-19 21:06:59,680 5 DEBUG Reading from event queue
2017-10-19 21:07:03,745 5 DEBUG Normal read time out for Pod
2017-10-19 21:07:03,746 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:07:03,746 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:07:03,746 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:07:03,754 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:07:04,756 5 DEBUG Normal read time out for Namespace
2017-10-19 21:07:04,757 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:07:04,757 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:07:04,757 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:07:04,791 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:07:09,686 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:07:09,687 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:07:09,687 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:07:09,687 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:07:09,714 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:07:09,716 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:07:09,716 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447229.72)
2017-10-19 21:07:09,717 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:07:09,717 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:07:09,717 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:07:09,717 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:07:09,720 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:07:09,723 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:07:09,724 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:07:09,724 5 DEBUG Emptied the event queue
2017-10-19 21:07:09,724 5 DEBUG Reading from event queue
2017-10-19 21:07:13,755 5 DEBUG Normal read time out for Pod
2017-10-19 21:07:13,756 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:07:13,757 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:07:13,758 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:07:13,784 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:07:14,797 5 DEBUG Normal read time out for Namespace
2017-10-19 21:07:14,797 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:07:14,797 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:07:14,798 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:07:14,824 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:07:19,729 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:07:19,731 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:07:19,731 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:07:19,731 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:07:19,759 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:07:19,760 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:07:19,760 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447239.76)
2017-10-19 21:07:19,761 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:07:19,761 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:07:19,761 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:07:19,761 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:07:19,760 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:07:19,767 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:07:19,768 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:07:19,768 5 DEBUG Emptied the event queue
2017-10-19 21:07:19,768 5 DEBUG Reading from event queue
2017-10-19 21:07:23,786 5 DEBUG Normal read time out for Pod
2017-10-19 21:07:23,787 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:07:23,787 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:07:23,787 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:07:23,819 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:07:24,834 5 DEBUG Normal read time out for Namespace
2017-10-19 21:07:24,835 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:07:24,835 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:07:24,836 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:07:24,862 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:07:29,767 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:07:29,767 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:07:29,769 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:07:29,769 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:07:29,796 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:07:29,796 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:07:29,797 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447249.8)
2017-10-19 21:07:29,797 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:07:29,797 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:07:29,797 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:07:29,797 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:07:29,797 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:07:29,801 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:07:29,801 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:07:29,801 5 DEBUG Emptied the event queue
2017-10-19 21:07:29,801 5 DEBUG Reading from event queue
2017-10-19 21:07:33,826 5 DEBUG Normal read time out for Pod
2017-10-19 21:07:33,827 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:07:33,827 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:07:33,828 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:07:33,854 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:07:34,871 5 DEBUG Normal read time out for Namespace
2017-10-19 21:07:34,871 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:07:34,873 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:07:34,873 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:07:34,898 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:07:39,805 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:07:39,806 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:07:39,806 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:07:39,806 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:07:39,828 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:07:39,828 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:07:39,829 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447259.83)
2017-10-19 21:07:39,829 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:07:39,829 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:07:39,829 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:07:39,829 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:07:39,830 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:07:39,831 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:07:39,831 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:07:39,831 5 DEBUG Emptied the event queue
2017-10-19 21:07:39,831 5 DEBUG Reading from event queue
2017-10-19 21:07:43,856 5 DEBUG Normal read time out for Pod
2017-10-19 21:07:43,857 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:07:43,857 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:07:43,859 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:07:43,884 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:07:44,906 5 DEBUG Normal read time out for Namespace
2017-10-19 21:07:44,907 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:07:44,907 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:07:44,907 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:07:44,938 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:07:49,836 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:07:49,836 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:07:49,836 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:07:49,837 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:07:49,865 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:07:49,867 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:07:49,867 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447269.87)
2017-10-19 21:07:49,868 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:07:49,868 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:07:49,868 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:07:49,868 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:07:49,870 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:07:49,873 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:07:49,874 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:07:49,874 5 DEBUG Emptied the event queue
2017-10-19 21:07:49,874 5 DEBUG Reading from event queue
2017-10-19 21:07:53,886 5 DEBUG Normal read time out for Pod
2017-10-19 21:07:53,887 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:07:53,887 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:07:53,887 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:07:53,916 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:07:54,946 5 DEBUG Normal read time out for Namespace
2017-10-19 21:07:54,947 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:07:54,947 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:07:54,948 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:07:54,975 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:07:59,882 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:07:59,882 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:07:59,882 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:07:59,882 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:07:59,912 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:07:59,913 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:07:59,913 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447279.91)
2017-10-19 21:07:59,914 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:07:59,914 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:07:59,914 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:07:59,915 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:07:59,917 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:07:59,919 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:07:59,920 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:07:59,920 5 DEBUG Emptied the event queue
2017-10-19 21:07:59,920 5 DEBUG Reading from event queue
2017-10-19 21:08:03,926 5 DEBUG Normal read time out for Pod
2017-10-19 21:08:03,927 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:08:03,927 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:08:03,928 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:08:03,955 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:08:04,986 5 DEBUG Normal read time out for Namespace
2017-10-19 21:08:04,987 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:08:04,989 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:08:04,990 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:08:05,019 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:08:09,927 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:08:09,927 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:08:09,927 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:08:09,928 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:08:09,958 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:08:09,960 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:08:09,960 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447289.96)
2017-10-19 21:08:09,961 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:08:09,961 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:08:09,961 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:08:09,961 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:08:09,964 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:08:09,967 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:08:09,967 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:08:09,967 5 DEBUG Emptied the event queue
2017-10-19 21:08:09,968 5 DEBUG Reading from event queue
2017-10-19 21:08:13,966 5 DEBUG Normal read time out for Pod
2017-10-19 21:08:13,967 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:08:13,969 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:08:13,969 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:08:13,996 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:08:15,027 5 DEBUG Normal read time out for Namespace
2017-10-19 21:08:15,029 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:08:15,029 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:08:15,029 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:08:15,056 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:08:19,969 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:08:19,970 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:08:19,970 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:08:19,970 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:08:19,999 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:08:20,000 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:08:20,001 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447300.0)
2017-10-19 21:08:20,005 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:08:20,005 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:08:20,005 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:08:20,005 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:08:20,001 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:08:20,010 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:08:20,011 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:08:20,011 5 DEBUG Emptied the event queue
2017-10-19 21:08:20,011 5 DEBUG Reading from event queue
2017-10-19 21:08:24,007 5 DEBUG Normal read time out for Pod
2017-10-19 21:08:24,008 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:08:24,009 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:08:24,009 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:08:24,036 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:08:25,066 5 DEBUG Normal read time out for Namespace
2017-10-19 21:08:25,067 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:08:25,067 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:08:25,067 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:08:25,092 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:08:30,016 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:08:30,017 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:08:30,018 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:08:30,019 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:08:30,031 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:08:30,032 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:08:30,032 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447310.03)
2017-10-19 21:08:30,032 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:08:30,032 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:08:30,032 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:08:30,032 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:08:30,032 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:08:30,035 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:08:30,035 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:08:30,035 5 DEBUG Emptied the event queue
2017-10-19 21:08:30,035 5 DEBUG Reading from event queue
2017-10-19 21:08:34,046 5 DEBUG Normal read time out for Pod
2017-10-19 21:08:34,048 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:08:34,049 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:08:34,049 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:08:34,078 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:08:35,099 5 DEBUG Normal read time out for Namespace
2017-10-19 21:08:35,099 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:08:35,099 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:08:35,099 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:08:35,108 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:08:40,036 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:08:40,037 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:08:40,037 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:08:40,038 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:08:40,066 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:08:40,066 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:08:40,067 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447320.07)
2017-10-19 21:08:40,067 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:08:40,067 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:08:40,067 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:08:40,067 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:08:40,068 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:08:40,070 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:08:40,070 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:08:40,070 5 DEBUG Emptied the event queue
2017-10-19 21:08:40,070 5 DEBUG Reading from event queue
2017-10-19 21:08:44,094 5 DEBUG Normal read time out for Pod
2017-10-19 21:08:44,095 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:08:44,095 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:08:44,095 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:08:44,124 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:08:45,116 5 DEBUG Normal read time out for Namespace
2017-10-19 21:08:45,117 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:08:45,118 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:08:45,119 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:08:45,146 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:08:50,127 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:08:50,128 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:08:50,128 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:08:50,128 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:08:50,136 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:08:50,136 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:08:50,136 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447330.14)
2017-10-19 21:08:50,137 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:08:50,137 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:08:50,137 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:08:50,137 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:08:50,138 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:08:50,139 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:08:50,139 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:08:50,139 5 DEBUG Emptied the event queue
2017-10-19 21:08:50,139 5 DEBUG Reading from event queue
2017-10-19 21:08:54,128 5 DEBUG Normal read time out for Pod
2017-10-19 21:08:54,129 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:08:54,129 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:08:54,129 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:08:54,159 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:08:55,156 5 DEBUG Normal read time out for Namespace
2017-10-19 21:08:55,157 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:08:55,157 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:08:55,157 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:08:55,185 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:09:00,146 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:09:00,147 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:09:00,147 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:09:00,147 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:09:00,175 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:09:00,175 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:09:00,176 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447340.18)
2017-10-19 21:09:00,176 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:09:00,176 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:09:00,176 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:09:00,176 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:09:00,177 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:09:00,180 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:09:00,180 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:09:00,180 5 DEBUG Emptied the event queue
2017-10-19 21:09:00,180 5 DEBUG Reading from event queue
2017-10-19 21:09:04,166 5 DEBUG Normal read time out for Pod
2017-10-19 21:09:04,167 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:09:04,167 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:09:04,168 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:09:04,195 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:09:05,187 5 DEBUG Normal read time out for Namespace
2017-10-19 21:09:05,187 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:09:05,187 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:09:05,188 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:09:05,219 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:09:10,186 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:09:10,187 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:09:10,187 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:09:10,187 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:09:10,214 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:09:10,216 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:09:10,217 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447350.22)
2017-10-19 21:09:10,217 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:09:10,217 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:09:10,218 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:09:10,218 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:09:10,217 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:09:10,223 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:09:10,224 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:09:10,224 5 DEBUG Emptied the event queue
2017-10-19 21:09:10,224 5 DEBUG Reading from event queue
2017-10-19 21:09:14,196 5 DEBUG Normal read time out for Pod
2017-10-19 21:09:14,197 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:09:14,197 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:09:14,198 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:09:14,224 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:09:15,226 5 DEBUG Normal read time out for Namespace
2017-10-19 21:09:15,227 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:09:15,227 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:09:15,227 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:09:15,254 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:09:20,226 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:09:20,226 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:09:20,226 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:09:20,226 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:09:20,241 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:09:20,242 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:09:20,243 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447360.24)
2017-10-19 21:09:20,243 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:09:20,243 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:09:20,243 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:09:20,243 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:09:20,243 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:09:20,246 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:09:20,246 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:09:20,247 5 DEBUG Emptied the event queue
2017-10-19 21:09:20,247 5 DEBUG Reading from event queue
2017-10-19 21:09:24,237 5 DEBUG Normal read time out for Pod
2017-10-19 21:09:24,237 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:09:24,238 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:09:24,238 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:09:24,266 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:09:25,261 5 DEBUG Normal read time out for Namespace
2017-10-19 21:09:25,262 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:09:25,262 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:09:25,262 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:09:25,301 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:09:30,246 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:09:30,246 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:09:30,246 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:09:30,246 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:09:30,258 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:09:30,259 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:09:30,259 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447370.26)
2017-10-19 21:09:30,259 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:09:30,259 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:09:30,260 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:09:30,260 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:09:30,261 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:09:30,263 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:09:30,263 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:09:30,263 5 DEBUG Emptied the event queue
2017-10-19 21:09:30,264 5 DEBUG Reading from event queue
2017-10-19 21:09:34,276 5 DEBUG Normal read time out for Pod
2017-10-19 21:09:34,278 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:09:34,278 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:09:34,278 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:09:34,306 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:09:35,306 5 DEBUG Normal read time out for Namespace
2017-10-19 21:09:35,307 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:09:35,307 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:09:35,307 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:09:35,334 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:09:40,267 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:09:40,268 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:09:40,268 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:09:40,268 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:09:40,297 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:09:40,298 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:09:40,299 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447380.3)
2017-10-19 21:09:40,299 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:09:40,299 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:09:40,300 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:09:40,300 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:09:40,301 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:09:40,305 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:09:40,305 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:09:40,307 5 DEBUG Emptied the event queue
2017-10-19 21:09:40,307 5 DEBUG Reading from event queue
2017-10-19 21:09:44,316 5 DEBUG Normal read time out for Pod
2017-10-19 21:09:44,317 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:09:44,317 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:09:44,317 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:09:44,349 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:09:45,336 5 DEBUG Normal read time out for Namespace
2017-10-19 21:09:45,337 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:09:45,337 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:09:45,337 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:09:45,365 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:09:50,306 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:09:50,307 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:09:50,307 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:09:50,307 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:09:50,336 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:09:50,337 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:09:50,338 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447390.34)
2017-10-19 21:09:50,339 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:09:50,341 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:09:50,341 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:09:50,341 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:09:50,343 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:09:50,347 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:09:50,348 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:09:50,349 5 DEBUG Emptied the event queue
2017-10-19 21:09:50,349 5 DEBUG Reading from event queue
2017-10-19 21:09:54,356 5 DEBUG Normal read time out for Pod
2017-10-19 21:09:54,357 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:09:54,357 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:09:54,357 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:09:54,387 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:09:55,370 5 DEBUG Normal read time out for Namespace
2017-10-19 21:09:55,371 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:09:55,371 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:09:55,371 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:09:55,382 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:10:00,353 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:10:00,353 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:10:00,353 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:10:00,353 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:10:00,361 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:10:00,361 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:10:00,361 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447400.36)
2017-10-19 21:10:00,362 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:10:00,362 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:10:00,362 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:10:00,362 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:10:00,362 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:10:00,364 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:10:00,364 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:10:00,364 5 DEBUG Emptied the event queue
2017-10-19 21:10:00,364 5 DEBUG Reading from event queue
2017-10-19 21:10:04,395 5 DEBUG Normal read time out for Pod
2017-10-19 21:10:04,396 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:10:04,396 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:10:04,396 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:10:04,404 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:10:05,386 5 DEBUG Normal read time out for Namespace
2017-10-19 21:10:05,387 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:10:05,387 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:10:05,387 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:10:05,414 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:10:10,365 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:10:10,366 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:10:10,366 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:10:10,366 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:10:10,374 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:10:10,374 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:10:10,374 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447410.37)
2017-10-19 21:10:10,374 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:10:10,374 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:10:10,374 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:10:10,374 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:10:10,374 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:10:10,376 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:10:10,376 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:10:10,376 5 DEBUG Emptied the event queue
2017-10-19 21:10:10,376 5 DEBUG Reading from event queue
2017-10-19 21:10:14,406 5 DEBUG Normal read time out for Pod
2017-10-19 21:10:14,406 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:10:14,407 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:10:14,407 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:10:14,414 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:10:15,415 5 DEBUG Normal read time out for Namespace
2017-10-19 21:10:15,416 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:10:15,416 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:10:15,416 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:10:15,424 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:10:20,381 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:10:20,381 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:10:20,381 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:10:20,381 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:10:20,389 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:10:20,389 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:10:20,389 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447420.39)
2017-10-19 21:10:20,389 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:10:20,389 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:10:20,389 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:10:20,389 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:10:20,389 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:10:20,392 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:10:20,392 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:10:20,392 5 DEBUG Emptied the event queue
2017-10-19 21:10:20,392 5 DEBUG Reading from event queue
2017-10-19 21:10:24,415 5 DEBUG Normal read time out for Pod
2017-10-19 21:10:24,416 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:10:24,416 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:10:24,416 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:10:24,424 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:10:25,426 5 DEBUG Normal read time out for Namespace
2017-10-19 21:10:25,426 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:10:25,426 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:10:25,426 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:10:25,435 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:10:30,395 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:10:30,396 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:10:30,396 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:10:30,396 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:10:30,404 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:10:30,404 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:10:30,404 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447430.4)
2017-10-19 21:10:30,405 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:10:30,405 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:10:30,405 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:10:30,405 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:10:30,405 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:10:30,406 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:10:30,407 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:10:30,407 5 DEBUG Emptied the event queue
2017-10-19 21:10:30,407 5 DEBUG Reading from event queue
2017-10-19 21:10:34,426 5 DEBUG Normal read time out for Pod
2017-10-19 21:10:34,426 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:10:34,426 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:10:34,427 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:10:34,434 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:10:35,445 5 DEBUG Normal read time out for Namespace
2017-10-19 21:10:35,446 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:10:35,446 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:10:35,446 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:10:35,455 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:10:40,406 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:10:40,407 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:10:40,407 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:10:40,407 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:10:40,433 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:10:40,434 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:10:40,434 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447440.43)
2017-10-19 21:10:40,435 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:10:40,435 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:10:40,435 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:10:40,436 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:10:40,438 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:10:40,442 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:10:40,442 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:10:40,442 5 DEBUG Emptied the event queue
2017-10-19 21:10:40,442 5 DEBUG Reading from event queue
2017-10-19 21:10:44,439 5 DEBUG Normal read time out for Pod
2017-10-19 21:10:44,439 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:10:44,440 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:10:44,440 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:10:44,467 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:10:45,463 5 DEBUG Normal read time out for Namespace
2017-10-19 21:10:45,464 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:10:45,464 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:10:45,464 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:10:45,497 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:10:50,450 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:10:50,450 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:10:50,450 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:10:50,451 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:10:50,479 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:10:50,483 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:10:50,483 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447450.48)
2017-10-19 21:10:50,484 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:10:50,484 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:10:50,485 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:10:50,485 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:10:50,487 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:10:50,491 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:10:50,491 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:10:50,491 5 DEBUG Emptied the event queue
2017-10-19 21:10:50,492 5 DEBUG Reading from event queue
2017-10-19 21:10:54,479 5 DEBUG Normal read time out for Pod
2017-10-19 21:10:54,479 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:10:54,480 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:10:54,480 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:10:54,510 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:10:55,500 5 DEBUG Normal read time out for Namespace
2017-10-19 21:10:55,501 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:10:55,501 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:10:55,501 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:10:55,531 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:11:00,499 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:11:00,499 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:11:00,499 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:11:00,499 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:11:00,511 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:11:00,511 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:11:00,511 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447460.51)
2017-10-19 21:11:00,512 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:11:00,512 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:11:00,512 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:11:00,512 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:11:00,512 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:11:00,514 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:11:00,514 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:11:00,514 5 DEBUG Emptied the event queue
2017-10-19 21:11:00,514 5 DEBUG Reading from event queue
2017-10-19 21:11:04,521 5 DEBUG Normal read time out for Pod
2017-10-19 21:11:04,521 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:11:04,522 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:11:04,522 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:11:04,630 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:11:05,542 5 DEBUG Normal read time out for Namespace
2017-10-19 21:11:05,542 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:11:05,542 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:11:05,542 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:11:05,552 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:11:10,524 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:11:10,524 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:11:10,524 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:11:10,524 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:11:10,537 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:11:10,538 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:11:10,538 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447470.54)
2017-10-19 21:11:10,538 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:11:10,539 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:11:10,539 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:11:10,539 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:11:10,538 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:11:10,541 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:11:10,541 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:11:10,541 5 DEBUG Emptied the event queue
2017-10-19 21:11:10,541 5 DEBUG Reading from event queue
2017-10-19 21:11:14,640 5 DEBUG Normal read time out for Pod
2017-10-19 21:11:14,640 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:11:14,640 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:11:14,640 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:11:14,651 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:11:15,564 5 DEBUG Normal read time out for Namespace
2017-10-19 21:11:15,564 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:11:15,564 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:11:15,564 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:11:15,580 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:11:20,554 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:11:20,554 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:11:20,554 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:11:20,554 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:11:20,563 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:11:20,563 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:11:20,563 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447480.56)
2017-10-19 21:11:20,574 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:11:20,574 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:11:20,574 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:11:20,574 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:11:20,574 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:11:20,586 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:11:20,586 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:11:20,586 5 DEBUG Emptied the event queue
2017-10-19 21:11:20,586 5 DEBUG Reading from event queue
2017-10-19 21:11:24,662 5 DEBUG Normal read time out for Pod
2017-10-19 21:11:24,662 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:11:24,662 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:11:24,662 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:11:24,673 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:11:25,586 5 DEBUG Normal read time out for Namespace
2017-10-19 21:11:25,586 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:11:25,586 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:11:25,586 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:11:25,594 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
2017-10-19 21:11:30,581 5 DEBUG Normal read time out for NetworkPolicy
2017-10-19 21:11:30,581 5 DEBUG Restarting watch on resource: NetworkPolicy
2017-10-19 21:11:30,581 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies
2017-10-19 21:11:30,581 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True
2017-10-19 21:11:30,589 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]>
2017-10-19 21:11:30,589 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}}
2017-10-19 21:11:30,590 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447490.59)
2017-10-19 21:11:30,590 5 DEBUG Update resourceVersion, was: 398, now: 398
2017-10-19 21:11:30,590 5 DEBUG Read event: DELETED, NetworkPolicy, {
"kind": "NetworkPolicy",
"spec": {
"podSelector": {}
},
"apiVersion": "extensions/v1beta1",
"metadata": {
"name": "default-deny",
"generation": 1,
"namespace": "policy-demo",
"resourceVersion": "398",
"creationTimestamp": "2017-10-19T21:04:35Z",
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny",
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48"
}
}
2017-10-19 21:11:30,590 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy'
2017-10-19 21:11:30,590 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED')
2017-10-19 21:11:30,590 5 DEBUG Deleting network policy: policy-demo.default-deny
2017-10-19 21:11:30,592 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted
2017-10-19 21:11:30,592 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny')
2017-10-19 21:11:30,592 5 DEBUG Emptied the event queue
2017-10-19 21:11:30,592 5 DEBUG Reading from event queue
2017-10-19 21:11:34,682 5 DEBUG Normal read time out for Pod
2017-10-19 21:11:34,682 5 DEBUG Restarting watch on resource: Pod
2017-10-19 21:11:34,682 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods
2017-10-19 21:11:34,683 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True
2017-10-19 21:11:34,716 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]>
2017-10-19 21:11:35,605 5 DEBUG Normal read time out for Namespace
2017-10-19 21:11:35,605 5 DEBUG Restarting watch on resource: Namespace
2017-10-19 21:11:35,605 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces
2017-10-19 21:11:35,605 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True
2017-10-19 21:11:35,613 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment