Created
October 19, 2017 21:22
-
-
Save heschlie/ea23319a3c94d15e8bcbc511f73b1191 to your computer and use it in GitHub Desktop.
Calico policy controller log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2017-10-19 21:04:05,848 5 INFO Configuring /etc/hosts | |
2017-10-19 21:04:05,848 5 INFO Appended 'kubernetes.default -> 10.100.0.1' to /etc/hosts | |
2017-10-19 21:04:05,848 5 INFO Beginning execution | |
2017-10-19 21:04:05,848 5 DEBUG Getting ServiceAccount token from: /var/run/secrets/kubernetes.io/serviceaccount/token | |
2017-10-19 21:04:05,848 5 DEBUG Found ServiceAccount token: eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJrdWJlLXN5c3RlbSIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VjcmV0Lm5hbWUiOiJjYWxpY28tcG9saWN5LWNvbnRyb2xsZXItdG9rZW4tY2ZqbXQiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC5uYW1lIjoiY2FsaWNvLXBvbGljeS1jb250cm9sbGVyIiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZXJ2aWNlLWFjY291bnQudWlkIjoiZjU2ZDA1NmEtYjUxMC0xMWU3LTkxMmQtMDgwMDI3NWYxZTQ4Iiwic3ViIjoic3lzdGVtOnNlcnZpY2VhY2NvdW50Omt1YmUtc3lzdGVtOmNhbGljby1wb2xpY3ktY29udHJvbGxlciJ9.BHHGFu6Vh3KNUoYyaFd9dztouf3wbOlf9RnNoGR8S_yVxvSYULUxmoTcGW8pBg3JkIX28Ca-x02Qi4c661QL3xNYiAHtgrf3RtEYU0r7g5QHYEFwbc2dgyjsqAc6up7lxEdEpzfEZuQoiAfGJMHudexIF0aunFFOYmbFV1TgvLY-zcNXYxxsqy5Q_HEDKDAjjBbMxG-m23Ci5q2wwmhqk_m02i0XkNvlBJSIG-6GfNQzGLRFlMIvGL5XVKV8Ak35GN66TqPT4JVY2GwuXQRIG4UDPVmj2cbgBsfpn9ykssq6RfdvLz9pB_lGU9ebJq6tA2FvEfhpZ1HBoFIy7UNK_g | |
2017-10-19 21:04:05,848 5 DEBUG Using auth token: eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.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.BHHGFu6Vh3KNUoYyaFd9dztouf3wbOlf9RnNoGR8S_yVxvSYULUxmoTcGW8pBg3JkIX28Ca-x02Qi4c661QL3xNYiAHtgrf3RtEYU0r7g5QHYEFwbc2dgyjsqAc6up7lxEdEpzfEZuQoiAfGJMHudexIF0aunFFOYmbFV1TgvLY-zcNXYxxsqy5Q_HEDKDAjjBbMxG-m23Ci5q2wwmhqk_m02i0XkNvlBJSIG-6GfNQzGLRFlMIvGL5XVKV8Ak35GN66TqPT4JVY2GwuXQRIG4UDPVmj2cbgBsfpn9ykssq6RfdvLz9pB_lGU9ebJq6tA2FvEfhpZ1HBoFIy7UNK_g | |
2017-10-19 21:04:05,848 5 DEBUG Setting NetworkPolicy ADDED handler: <function add_update_network_policy at 0x7ff6b8e768c0> | |
2017-10-19 21:04:05,848 5 DEBUG Setting NetworkPolicy MODIFIED handler: <function add_update_network_policy at 0x7ff6b8e768c0> | |
2017-10-19 21:04:05,848 5 DEBUG Setting NetworkPolicy DELETED handler: <function delete_network_policy at 0x7ff6b8e7ced8> | |
2017-10-19 21:04:05,848 5 DEBUG Setting Namespace ADDED handler: <function add_update_namespace at 0x7ff6b8e7cf50> | |
2017-10-19 21:04:05,848 5 DEBUG Setting Namespace MODIFIED handler: <function add_update_namespace at 0x7ff6b8e7cf50> | |
2017-10-19 21:04:05,849 5 DEBUG Setting Namespace DELETED handler: <function delete_namespace at 0x7ff6b8e7f0c8> | |
2017-10-19 21:04:05,849 5 DEBUG Setting Pod ADDED handler: <function add_pod at 0x7ff6b8e7f2a8> | |
2017-10-19 21:04:05,849 5 DEBUG Setting Pod MODIFIED handler: <function update_pod at 0x7ff6b8e7f320> | |
2017-10-19 21:04:05,849 5 DEBUG Setting Pod DELETED handler: <function delete_pod at 0x7ff6b8e7f410> | |
2017-10-19 21:04:05,849 5 INFO Leader election enabled? False | |
2017-10-19 21:04:05,849 5 DEBUG Attempting to remove old tier k8s-network-policy | |
2017-10-19 21:04:05,867 5 INFO Started worker thread for: NetworkPolicy | |
2017-10-19 21:04:05,867 5 INFO Syncing 'NetworkPolicy' objects | |
2017-10-19 21:04:05,868 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/networkpolicies' at version 'None'. stream=False | |
2017-10-19 21:04:05,870 5 INFO Started worker thread for: Namespace | |
2017-10-19 21:04:05,870 5 INFO Syncing 'Namespace' objects | |
2017-10-19 21:04:05,870 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/namespaces' at version 'None'. stream=False | |
2017-10-19 21:04:05,871 5 INFO Started worker thread for: Pod | |
2017-10-19 21:04:05,871 5 DEBUG Reading from event queue | |
2017-10-19 21:04:05,872 5 INFO Syncing 'Pod' objects | |
2017-10-19 21:04:05,872 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/pods' at version 'None'. stream=False | |
2017-10-19 21:04:05,931 5 DEBUG Response: <Response [200]> | |
2017-10-19 21:04:05,932 5 DEBUG NetworkPolicy metadata: {u'selfLink': u'/apis/extensions/v1beta1/networkpolicies', u'resourceVersion': u'327'} | |
2017-10-19 21:04:05,932 5 DEBUG 0 existing NetworkPolicy(s) - add to queue | |
2017-10-19 21:04:05,932 5 INFO Done syncing NetworkPolicy(s) - new resourceVersion: 327 | |
2017-10-19 21:04:05,933 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:04:05,933 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '327'. stream=True | |
2017-10-19 21:04:05,941 5 DEBUG Response: <Response [200]> | |
2017-10-19 21:04:05,941 5 DEBUG Namespace metadata: {u'selfLink': u'/api/v1/namespaces', u'resourceVersion': u'327'} | |
2017-10-19 21:04:05,942 5 DEBUG 3 existing Namespace(s) - add to queue | |
2017-10-19 21:04:05,942 5 DEBUG Queueing update: {u'status': {u'phase': u'Active'}, u'spec': {u'finalizers': [u'kubernetes']}, u'metadata': {u'resourceVersion': u'4', u'creationTimestamp': u'2017-10-19T21:02:33Z', u'name': u'default', u'selfLink': u'/api/v1/namespaces/default', u'uid': u'd3f3d160-b510-11e7-912d-0800275f1e48'}} | |
2017-10-19 21:04:05,942 5 DEBUG Queueing update: {u'status': {u'phase': u'Active'}, u'spec': {u'finalizers': [u'kubernetes']}, u'metadata': {u'resourceVersion': u'41', u'creationTimestamp': u'2017-10-19T21:02:34Z', u'name': u'kube-public', u'selfLink': u'/api/v1/namespaces/kube-public', u'uid': u'd46eacd5-b510-11e7-912d-0800275f1e48'}} | |
2017-10-19 21:04:05,942 5 DEBUG Queueing update: {u'status': {u'phase': u'Active'}, u'spec': {u'finalizers': [u'kubernetes']}, u'metadata': {u'resourceVersion': u'29', u'creationTimestamp': u'2017-10-19T21:02:34Z', u'name': u'kube-system', u'selfLink': u'/api/v1/namespaces/kube-system', u'uid': u'd4486db7-b510-11e7-912d-0800275f1e48'}} | |
2017-10-19 21:04:05,942 5 INFO Done syncing Namespace(s) - new resourceVersion: 327 | |
2017-10-19 21:04:05,942 5 DEBUG Read event: MODIFIED, Namespace, { | |
"status": { | |
"phase": "Active" | |
}, | |
"spec": { | |
"finalizers": [ | |
"kubernetes" | |
] | |
}, | |
"metadata": { | |
"resourceVersion": "4", | |
"creationTimestamp": "2017-10-19T21:02:33Z", | |
"name": "default", | |
"selfLink": "/api/v1/namespaces/default", | |
"uid": "d3f3d160-b510-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:05,943 5 DEBUG Processing 'MODIFIED' for kind 'Namespace' | |
2017-10-19 21:04:05,943 5 DEBUG Looking up handler for event: ('Namespace', 'MODIFIED') | |
2017-10-19 21:04:05,943 5 DEBUG Adding/updating namespace: default | |
2017-10-19 21:04:05,943 5 DEBUG Generated namespace labels: {} | |
2017-10-19 21:04:05,944 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:04:05,944 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '327'. stream=True | |
2017-10-19 21:04:05,947 5 DEBUG Response: <Response [200]> | |
2017-10-19 21:04:05,948 5 DEBUG Pod metadata: {u'selfLink': u'/api/v1/pods', u'resourceVersion': u'327'} | |
2017-10-19 21:04:05,949 5 DEBUG 4 existing Pod(s) - add to queue | |
2017-10-19 21:04:05,949 5 DEBUG Queueing update: {u'status': {u'qosClass': u'Burstable', u'containerStatuses': [{u'restartCount': 0, u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'imageID': u'docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:46Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://f34658276eb8894133d7b859cd2aac19aeb8f6e680c927691f1f743a2e46ad53'}, {u'restartCount': 0, u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'imageID': u'docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:51Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://a3fa34a03af5f606f6e2b68a58254375201afdf511ba985f7d933ce657d0bc10'}], u'podIP': u'172.18.18.101', u'startTime': u'2017-10-19T21:03:31Z', u'hostIP': u'172.18.18.101', u'phase': u'Running', u'conditions': [{u'status': u'True', u'lastProbeTime': None, u'type': u'Initialized', u'lastTransitionTime': u'2017-10-19T21:03:31Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'Ready', u'lastTransitionTime': u'2017-10-19T21:04:01Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'PodScheduled', u'lastTransitionTime': u'2017-10-19T21:03:51Z'}]}, u'spec': {u'dnsPolicy': u'ClusterFirst', u'securityContext': {}, u'serviceAccountName': u'calico-node', u'schedulerName': u'default-scheduler', u'hostNetwork': True, u'serviceAccount': u'calico-node', u'terminationGracePeriodSeconds': 30, u'restartPolicy': u'Always', u'volumes': [{u'hostPath': {u'path': u'/lib/modules'}, u'name': u'lib-modules'}, {u'hostPath': {u'path': u'/var/run/calico'}, u'name': u'var-run-calico'}, {u'hostPath': {u'path': u'/opt/cni/bin'}, u'name': u'cni-bin-dir'}, {u'hostPath': {u'path': u'/etc/cni/net.d'}, u'name': u'cni-net-dir'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-etcd-secrets'}, u'name': u'etcd-certs'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-node-token-vk7vx'}, u'name': u'calico-node-token-vk7vx'}], u'tolerations': [{u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/notReady'}, {u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/unreachable'}], u'containers': [{u'livenessProbe': {u'httpGet': {u'path': u'/liveness', u'scheme': u'HTTP', u'port': 9099}, u'timeoutSeconds': 1, u'initialDelaySeconds': 10, u'periodSeconds': 10, u'successThreshold': 1, u'failureThreshold': 6}, u'terminationMessagePath': u'/dev/termination-log', u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'volumeMounts': [{u'readOnly': True, u'mountPath': u'/lib/modules', u'name': u'lib-modules'}, {u'mountPath': u'/var/run/calico', u'name': u'var-run-calico'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'calico_backend'}}, u'name': u'CALICO_NETWORKING_BACKEND'}, {u'name': u'CLUSTER_TYPE', u'value': u'k8s,bgp'}, {u'name': u'CALICO_DISABLE_FILE_LOGGING', u'value': u'true'}, {u'name': u'FELIX_DEFAULTENDPOINTTOHOSTACTION', u'value': u'ACCEPT'}, {u'name': u'CALICO_IPV4POOL_CIDR', u'value': u'192.168.0.0/16'}, {u'name': u'CALICO_IPV4POOL_IPIP', u'value': u'always'}, {u'name': u'FELIX_IPV6SUPPORT', u'value': u'false'}, {u'name': u'FELIX_LOGSEVERITYSCREEN', u'value': u'info'}, {u'name': u'FELIX_IPINIPMTU', u'value': u'1440'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_ca'}}, u'name': u'ETCD_CA_CERT_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_key'}}, u'name': u'ETCD_KEY_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_cert'}}, u'name': u'ETCD_CERT_FILE'}, {u'name': u'IP'}, {u'name': u'FELIX_HEALTHENABLED', u'value': u'true'}], u'imagePullPolicy': u'IfNotPresent', u'readinessProbe': {u'successThreshold': 1, u'httpGet': {u'path': u'/readiness', u'scheme': u'HTTP', u'port': 9099}, u'failureThreshold': 3, u'timeoutSeconds': 1, u'periodSeconds': 10}, u'securityContext': {u'privileged': True}, u'resources': {u'requests': {u'cpu': u'250m'}}}, {u'terminationMessagePath': u'/dev/termination-log', u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'volumeMounts': [{u'mountPath': u'/host/opt/cni/bin', u'name': u'cni-bin-dir'}, {u'mountPath': u'/host/etc/cni/net.d', u'name': u'cni-net-dir'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'command': [u'/install-cni.sh'], u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'cni_network_config'}}, u'name': u'CNI_NETWORK_CONFIG'}], u'imagePullPolicy': u'IfNotPresent', u'resources': {}}], u'nodeName': u'172.18.18.101'}, u'metadata': {u'name': u'calico-node-4ltlh', u'labels': {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', u'controller-revision-hash': u'3209084365'}, u'namespace': u'kube-system', u'ownerReferences': [{u'kind': u'DaemonSet', u'name': u'calico-node', u'apiVersion': u'extensions/v1beta1', u'controller': True, u'blockOwnerDeletion': True, u'uid': u'f560cc6d-b510-11e7-912d-0800275f1e48'}], u'resourceVersion': u'311', u'generateName': u'calico-node-', u'creationTimestamp': u'2017-10-19T21:03:31Z', u'annotations': {u'scheduler.alpha.kubernetes.io/critical-pod': u'', u'scheduler.alpha.kubernetes.io/tolerations': u'[{"key": "dedicated", "value": "master", "effect": "NoSchedule" },\n {"key":"CriticalAddonsOnly", "operator":"Exists"}]\n', u'kubernetes.io/created-by': u'{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"DaemonSet","namespace":"kube-system","name":"calico-node","uid":"f560cc6d-b510-11e7-912d-0800275f1e48","apiVersion":"extensions","resourceVersion":"181"}}\n'}, u'selfLink': u'/api/v1/namespaces/kube-system/pods/calico-node-4ltlh', u'uid': u'f60ef5a4-b510-11e7-912d-0800275f1e48'}} | |
2017-10-19 21:04:05,949 5 DEBUG Queueing update: {u'status': {u'qosClass': u'Burstable', u'containerStatuses': [{u'restartCount': 0, u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'imageID': u'docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:46Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://df2e0cb6c4a622146cc5c6a77afdd4160950319c55890f17623e325ba8162a50'}, {u'restartCount': 0, u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'imageID': u'docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:50Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://a14ddd11b973aa2b7fcc613d62bb7c74f684deef5d2a11276fc00ea5a0c5e072'}], u'podIP': u'172.18.18.103', u'startTime': u'2017-10-19T21:03:31Z', u'hostIP': u'172.18.18.103', u'phase': u'Running', u'conditions': [{u'status': u'True', u'lastProbeTime': None, u'type': u'Initialized', u'lastTransitionTime': u'2017-10-19T21:03:31Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'Ready', u'lastTransitionTime': u'2017-10-19T21:04:01Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'PodScheduled', u'lastTransitionTime': u'2017-10-19T21:03:50Z'}]}, u'spec': {u'dnsPolicy': u'ClusterFirst', u'securityContext': {}, u'serviceAccountName': u'calico-node', u'schedulerName': u'default-scheduler', u'hostNetwork': True, u'serviceAccount': u'calico-node', u'terminationGracePeriodSeconds': 30, u'restartPolicy': u'Always', u'volumes': [{u'hostPath': {u'path': u'/lib/modules'}, u'name': u'lib-modules'}, {u'hostPath': {u'path': u'/var/run/calico'}, u'name': u'var-run-calico'}, {u'hostPath': {u'path': u'/opt/cni/bin'}, u'name': u'cni-bin-dir'}, {u'hostPath': {u'path': u'/etc/cni/net.d'}, u'name': u'cni-net-dir'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-etcd-secrets'}, u'name': u'etcd-certs'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-node-token-vk7vx'}, u'name': u'calico-node-token-vk7vx'}], u'tolerations': [{u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/notReady'}, {u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/unreachable'}], u'containers': [{u'livenessProbe': {u'httpGet': {u'path': u'/liveness', u'scheme': u'HTTP', u'port': 9099}, u'timeoutSeconds': 1, u'initialDelaySeconds': 10, u'periodSeconds': 10, u'successThreshold': 1, u'failureThreshold': 6}, u'terminationMessagePath': u'/dev/termination-log', u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'volumeMounts': [{u'readOnly': True, u'mountPath': u'/lib/modules', u'name': u'lib-modules'}, {u'mountPath': u'/var/run/calico', u'name': u'var-run-calico'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'calico_backend'}}, u'name': u'CALICO_NETWORKING_BACKEND'}, {u'name': u'CLUSTER_TYPE', u'value': u'k8s,bgp'}, {u'name': u'CALICO_DISABLE_FILE_LOGGING', u'value': u'true'}, {u'name': u'FELIX_DEFAULTENDPOINTTOHOSTACTION', u'value': u'ACCEPT'}, {u'name': u'CALICO_IPV4POOL_CIDR', u'value': u'192.168.0.0/16'}, {u'name': u'CALICO_IPV4POOL_IPIP', u'value': u'always'}, {u'name': u'FELIX_IPV6SUPPORT', u'value': u'false'}, {u'name': u'FELIX_LOGSEVERITYSCREEN', u'value': u'info'}, {u'name': u'FELIX_IPINIPMTU', u'value': u'1440'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_ca'}}, u'name': u'ETCD_CA_CERT_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_key'}}, u'name': u'ETCD_KEY_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_cert'}}, u'name': u'ETCD_CERT_FILE'}, {u'name': u'IP'}, {u'name': u'FELIX_HEALTHENABLED', u'value': u'true'}], u'imagePullPolicy': u'IfNotPresent', u'readinessProbe': {u'successThreshold': 1, u'httpGet': {u'path': u'/readiness', u'scheme': u'HTTP', u'port': 9099}, u'failureThreshold': 3, u'timeoutSeconds': 1, u'periodSeconds': 10}, u'securityContext': {u'privileged': True}, u'resources': {u'requests': {u'cpu': u'250m'}}}, {u'terminationMessagePath': u'/dev/termination-log', u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'volumeMounts': [{u'mountPath': u'/host/opt/cni/bin', u'name': u'cni-bin-dir'}, {u'mountPath': u'/host/etc/cni/net.d', u'name': u'cni-net-dir'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'command': [u'/install-cni.sh'], u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'cni_network_config'}}, u'name': u'CNI_NETWORK_CONFIG'}], u'imagePullPolicy': u'IfNotPresent', u'resources': {}}], u'nodeName': u'172.18.18.103'}, u'metadata': {u'name': u'calico-node-pnq2z', u'labels': {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', u'controller-revision-hash': u'3209084365'}, u'namespace': u'kube-system', u'ownerReferences': [{u'kind': u'DaemonSet', u'name': u'calico-node', u'apiVersion': u'extensions/v1beta1', u'controller': True, u'blockOwnerDeletion': True, u'uid': u'f560cc6d-b510-11e7-912d-0800275f1e48'}], u'resourceVersion': u'308', u'generateName': u'calico-node-', u'creationTimestamp': u'2017-10-19T21:03:31Z', u'annotations': {u'scheduler.alpha.kubernetes.io/critical-pod': u'', u'scheduler.alpha.kubernetes.io/tolerations': u'[{"key": "dedicated", "value": "master", "effect": "NoSchedule" },\n {"key":"CriticalAddonsOnly", "operator":"Exists"}]\n', u'kubernetes.io/created-by': u'{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"DaemonSet","namespace":"kube-system","name":"calico-node","uid":"f560cc6d-b510-11e7-912d-0800275f1e48","apiVersion":"extensions","resourceVersion":"181"}}\n'}, u'selfLink': u'/api/v1/namespaces/kube-system/pods/calico-node-pnq2z', u'uid': u'f60e5211-b510-11e7-912d-0800275f1e48'}} | |
2017-10-19 21:04:05,949 5 DEBUG Queueing update: {u'status': {u'qosClass': u'Burstable', u'containerStatuses': [{u'restartCount': 0, u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'imageID': u'docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:46Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://075a805af05a5a597cbe740aea62b524cb2158d1cfa00562ebf09ec4b6623363'}, {u'restartCount': 0, u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'imageID': u'docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39', u'state': {u'running': {u'startedAt': u'2017-10-19T21:03:50Z'}}, u'ready': True, u'lastState': {}, u'containerID': u'docker://9ccb32220acf167a901c95da57d5b17a1ad0a097bee4ab35129cd72a5691db6c'}], u'podIP': u'172.18.18.102', u'startTime': u'2017-10-19T21:03:31Z', u'hostIP': u'172.18.18.102', u'phase': u'Running', u'conditions': [{u'status': u'True', u'lastProbeTime': None, u'type': u'Initialized', u'lastTransitionTime': u'2017-10-19T21:03:31Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'Ready', u'lastTransitionTime': u'2017-10-19T21:04:01Z'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'PodScheduled', u'lastTransitionTime': u'2017-10-19T21:03:51Z'}]}, u'spec': {u'dnsPolicy': u'ClusterFirst', u'securityContext': {}, u'serviceAccountName': u'calico-node', u'schedulerName': u'default-scheduler', u'hostNetwork': True, u'serviceAccount': u'calico-node', u'terminationGracePeriodSeconds': 30, u'restartPolicy': u'Always', u'volumes': [{u'hostPath': {u'path': u'/lib/modules'}, u'name': u'lib-modules'}, {u'hostPath': {u'path': u'/var/run/calico'}, u'name': u'var-run-calico'}, {u'hostPath': {u'path': u'/opt/cni/bin'}, u'name': u'cni-bin-dir'}, {u'hostPath': {u'path': u'/etc/cni/net.d'}, u'name': u'cni-net-dir'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-etcd-secrets'}, u'name': u'etcd-certs'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-node-token-vk7vx'}, u'name': u'calico-node-token-vk7vx'}], u'tolerations': [{u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/notReady'}, {u'operator': u'Exists', u'effect': u'NoExecute', u'key': u'node.alpha.kubernetes.io/unreachable'}], u'containers': [{u'livenessProbe': {u'httpGet': {u'path': u'/liveness', u'scheme': u'HTTP', u'port': 9099}, u'timeoutSeconds': 1, u'initialDelaySeconds': 10, u'periodSeconds': 10, u'successThreshold': 1, u'failureThreshold': 6}, u'terminationMessagePath': u'/dev/termination-log', u'name': u'calico-node', u'image': u'quay.io/calico/node:v2.5.1', u'volumeMounts': [{u'readOnly': True, u'mountPath': u'/lib/modules', u'name': u'lib-modules'}, {u'mountPath': u'/var/run/calico', u'name': u'var-run-calico'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'calico_backend'}}, u'name': u'CALICO_NETWORKING_BACKEND'}, {u'name': u'CLUSTER_TYPE', u'value': u'k8s,bgp'}, {u'name': u'CALICO_DISABLE_FILE_LOGGING', u'value': u'true'}, {u'name': u'FELIX_DEFAULTENDPOINTTOHOSTACTION', u'value': u'ACCEPT'}, {u'name': u'CALICO_IPV4POOL_CIDR', u'value': u'192.168.0.0/16'}, {u'name': u'CALICO_IPV4POOL_IPIP', u'value': u'always'}, {u'name': u'FELIX_IPV6SUPPORT', u'value': u'false'}, {u'name': u'FELIX_LOGSEVERITYSCREEN', u'value': u'info'}, {u'name': u'FELIX_IPINIPMTU', u'value': u'1440'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_ca'}}, u'name': u'ETCD_CA_CERT_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_key'}}, u'name': u'ETCD_KEY_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_cert'}}, u'name': u'ETCD_CERT_FILE'}, {u'name': u'IP'}, {u'name': u'FELIX_HEALTHENABLED', u'value': u'true'}], u'imagePullPolicy': u'IfNotPresent', u'readinessProbe': {u'successThreshold': 1, u'httpGet': {u'path': u'/readiness', u'scheme': u'HTTP', u'port': 9099}, u'failureThreshold': 3, u'timeoutSeconds': 1, u'periodSeconds': 10}, u'securityContext': {u'privileged': True}, u'resources': {u'requests': {u'cpu': u'250m'}}}, {u'terminationMessagePath': u'/dev/termination-log', u'name': u'install-cni', u'image': u'quay.io/calico/cni:v1.10.0', u'volumeMounts': [{u'mountPath': u'/host/opt/cni/bin', u'name': u'cni-bin-dir'}, {u'mountPath': u'/host/etc/cni/net.d', u'name': u'cni-net-dir'}, {u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-node-token-vk7vx'}], u'terminationMessagePolicy': u'File', u'command': [u'/install-cni.sh'], u'env': [{u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'cni_network_config'}}, u'name': u'CNI_NETWORK_CONFIG'}], u'imagePullPolicy': u'IfNotPresent', u'resources': {}}], u'nodeName': u'172.18.18.102'}, u'metadata': {u'name': u'calico-node-t0d59', u'labels': {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', u'controller-revision-hash': u'3209084365'}, u'namespace': u'kube-system', u'ownerReferences': [{u'kind': u'DaemonSet', u'name': u'calico-node', u'apiVersion': u'extensions/v1beta1', u'controller': True, u'blockOwnerDeletion': True, u'uid': u'f560cc6d-b510-11e7-912d-0800275f1e48'}], u'resourceVersion': u'309', u'generateName': u'calico-node-', u'creationTimestamp': u'2017-10-19T21:03:31Z', u'annotations': {u'scheduler.alpha.kubernetes.io/critical-pod': u'', u'scheduler.alpha.kubernetes.io/tolerations': u'[{"key": "dedicated", "value": "master", "effect": "NoSchedule" },\n {"key":"CriticalAddonsOnly", "operator":"Exists"}]\n', u'kubernetes.io/created-by': u'{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"DaemonSet","namespace":"kube-system","name":"calico-node","uid":"f560cc6d-b510-11e7-912d-0800275f1e48","apiVersion":"extensions","resourceVersion":"181"}}\n'}, u'selfLink': u'/api/v1/namespaces/kube-system/pods/calico-node-t0d59', u'uid': u'f60ebaf2-b510-11e7-912d-0800275f1e48'}} | |
2017-10-19 21:04:05,949 5 DEBUG Queueing update: {u'status': {u'qosClass': u'BestEffort', u'containerStatuses': [{u'restartCount': 0, u'name': u'calico-policy-controller', u'image': u'quay.io/calico/kube-policy-controller:v0.7.0', u'imageID': u'', u'state': {u'waiting': {u'reason': u'ContainerCreating'}}, u'ready': False, u'lastState': {}}], u'podIP': u'172.18.18.103', u'startTime': u'2017-10-19T21:04:02Z', u'hostIP': u'172.18.18.103', u'phase': u'Pending', u'conditions': [{u'status': u'True', u'lastProbeTime': None, u'type': u'Initialized', u'lastTransitionTime': u'2017-10-19T21:04:02Z'}, {u'status': u'False', u'lastTransitionTime': u'2017-10-19T21:04:02Z', u'reason': u'ContainersNotReady', u'lastProbeTime': None, u'message': u'containers with unready status: [calico-policy-controller]', u'type': u'Ready'}, {u'status': u'True', u'lastProbeTime': None, u'type': u'PodScheduled', u'lastTransitionTime': u'2017-10-19T21:04:02Z'}]}, u'spec': {u'dnsPolicy': u'ClusterFirst', u'securityContext': {}, u'serviceAccountName': u'calico-policy-controller', u'schedulerName': u'default-scheduler', u'hostNetwork': True, u'serviceAccount': u'calico-policy-controller', u'terminationGracePeriodSeconds': 30, u'restartPolicy': u'Always', u'volumes': [{u'secret': {u'defaultMode': 420, u'secretName': u'calico-etcd-secrets'}, u'name': u'etcd-certs'}, {u'secret': {u'defaultMode': 420, u'secretName': u'calico-policy-controller-token-cfjmt'}, u'name': u'calico-policy-controller-token-cfjmt'}], u'containers': [{u'terminationMessagePath': u'/dev/termination-log', u'name': u'calico-policy-controller', u'image': u'quay.io/calico/kube-policy-controller:v0.7.0', u'volumeMounts': [{u'mountPath': u'/calico-secrets', u'name': u'etcd-certs'}, {u'readOnly': True, u'mountPath': u'/var/run/secrets/kubernetes.io/serviceaccount', u'name': u'calico-policy-controller-token-cfjmt'}], u'terminationMessagePolicy': u'File', u'env': [{u'name': u'LOG_LEVEL', u'value': u'debug'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_endpoints'}}, u'name': u'ETCD_ENDPOINTS'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_ca'}}, u'name': u'ETCD_CA_CERT_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_key'}}, u'name': u'ETCD_KEY_FILE'}, {u'valueFrom': {u'configMapKeyRef': {u'name': u'calico-config', u'key': u'etcd_cert'}}, u'name': u'ETCD_CERT_FILE'}, {u'name': u'K8S_API', u'value': u'https://kubernetes.default:443'}, {u'name': u'CONFIGURE_ETC_HOSTS', u'value': u'true'}], u'imagePullPolicy': u'IfNotPresent', u'resources': {}}], u'nodeName': u'172.18.18.103'}, u'metadata': {u'name': u'calico-policy-controller-2476506652-d7fb8', u'labels': {u'pod-template-hash': u'2476506652', u'k8s-app': u'calico-policy'}, u'namespace': u'kube-system', u'ownerReferences': [{u'kind': u'ReplicaSet', u'name': u'calico-policy-controller-2476506652', u'apiVersion': u'extensions/v1beta1', u'controller': True, u'blockOwnerDeletion': True, u'uid': u'f56f35f8-b510-11e7-912d-0800275f1e48'}], u'resourceVersion': u'317', u'generateName': u'calico-policy-controller-2476506652-', u'creationTimestamp': u'2017-10-19T21:03:31Z', u'annotations': {u'kubernetes.io/created-by': u'{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"ReplicaSet","namespace":"kube-system","name":"calico-policy-controller-2476506652","uid":"f56f35f8-b510-11e7-912d-0800275f1e48","apiVersion":"extensions","resourceVersion":"185"}}\n'}, u'selfLink': u'/api/v1/namespaces/kube-system/pods/calico-policy-controller-2476506652-d7fb8', u'uid': u'f60f8e4f-b510-11e7-912d-0800275f1e48'}} | |
2017-10-19 21:04:05,950 5 INFO Done syncing Pod(s) - new resourceVersion: 327 | |
2017-10-19 21:04:05,950 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:04:05,950 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '327'. stream=True | |
2017-10-19 21:04:05,958 5 DEBUG Created/updated profile for namespace default | |
2017-10-19 21:04:05,959 5 INFO Handled MODIFIED for Namespace: (None, u'default') | |
2017-10-19 21:04:05,959 5 DEBUG Reading from event queue | |
2017-10-19 21:04:05,959 5 DEBUG Read event: MODIFIED, Namespace, { | |
"status": { | |
"phase": "Active" | |
}, | |
"spec": { | |
"finalizers": [ | |
"kubernetes" | |
] | |
}, | |
"metadata": { | |
"resourceVersion": "41", | |
"creationTimestamp": "2017-10-19T21:02:34Z", | |
"name": "kube-public", | |
"selfLink": "/api/v1/namespaces/kube-public", | |
"uid": "d46eacd5-b510-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:05,959 5 DEBUG Processing 'MODIFIED' for kind 'Namespace' | |
2017-10-19 21:04:05,959 5 DEBUG Looking up handler for event: ('Namespace', 'MODIFIED') | |
2017-10-19 21:04:05,959 5 DEBUG Adding/updating namespace: kube-public | |
2017-10-19 21:04:05,959 5 DEBUG Generated namespace labels: {} | |
2017-10-19 21:04:05,976 5 DEBUG Created/updated profile for namespace kube-public | |
2017-10-19 21:04:05,976 5 INFO Handled MODIFIED for Namespace: (None, u'kube-public') | |
2017-10-19 21:04:05,976 5 DEBUG Reading from event queue | |
2017-10-19 21:04:05,976 5 DEBUG Read event: MODIFIED, Namespace, { | |
"status": { | |
"phase": "Active" | |
}, | |
"spec": { | |
"finalizers": [ | |
"kubernetes" | |
] | |
}, | |
"metadata": { | |
"resourceVersion": "29", | |
"creationTimestamp": "2017-10-19T21:02:34Z", | |
"name": "kube-system", | |
"selfLink": "/api/v1/namespaces/kube-system", | |
"uid": "d4486db7-b510-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:05,977 5 DEBUG Processing 'MODIFIED' for kind 'Namespace' | |
2017-10-19 21:04:05,977 5 DEBUG Looking up handler for event: ('Namespace', 'MODIFIED') | |
2017-10-19 21:04:05,977 5 DEBUG Adding/updating namespace: kube-system | |
2017-10-19 21:04:05,977 5 DEBUG Generated namespace labels: {} | |
2017-10-19 21:04:05,979 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:04:05,981 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:04:05,981 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:04:06,006 5 DEBUG Created/updated profile for namespace kube-system | |
2017-10-19 21:04:06,006 5 INFO Handled MODIFIED for Namespace: (None, u'kube-system') | |
2017-10-19 21:04:06,006 5 DEBUG Reading from event queue | |
2017-10-19 21:04:06,007 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"calico-policy-controller-2476506652-d7fb8","generateName":"calico-policy-controller-2476506652-","namespace":"kube-system","selfLink":"/api/v1/namespaces/kube-system/pods/calico-policy-controller-2476506652-d7fb8","uid":"f60f8e4f-b510-11e7-912d-0800275f1e48","resourceVersion":"329","creationTimestamp":"2017-10-19T21:03:31Z","labels":{"k8s-app":"calico-policy","pod-template-hash":"2476506652"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"kube-system\",\"name\":\"calico-policy-controller-2476506652\",\"uid\":\"f56f35f8-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"185\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"calico-policy-controller-2476506652","uid":"f56f35f8-b510-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etcd-certs","secret":{"secretName":"calico-etcd-secrets","defaultMode":420}},{"name":"calico-policy-controller-token-cfjmt","secret":{"secretName":"calico-policy-controller-token-cfjmt","defaultMode":420}}],"containers":[{"name":"calico-policy-controller","image":"quay.io/calico/kube-policy-controller:v0.7.0","env":[{"name":"LOG_LEVEL","value":"debug"},{"name":"ETCD_ENDPOINTS","valueFrom":{"configMapKeyRef":{"name":"calico-config","key":"etcd_endpoints"}}},{"name":"ETCD_CA_CERT_FILE","valueFrom":{"configMapKeyRef":{"name":"calico-config","key":"etcd_ca"}}},{"name":"ETCD_KEY_FILE","valueFrom":{"configMapKeyRef":{"name":"calico-config","key":"etcd_key"}}},{"name":"ETCD_CERT_FILE","valueFrom":{"configMapKeyRef":{"name":"calico-config","key":"etcd_cert"}}},{"name":"K8S_API","value":"https://kubernetes.default:443"},{"name":"CONFIGURE_ETC_HOSTS","value":"true"}],"resources":{},"volumeMounts":[{"name":"etcd-certs","mountPath":"/calico-secrets"},{"name":"calico-policy-controller-token-cfjmt","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"calico-policy-controller","serviceAccount":"calico-policy-controller","nodeName":"172.18.18.103","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Running","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:02Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:02Z"}],"hostIP":"172.18.18.103","podIP":"172.18.18.103","startTime":"2017-10-19T21:04:02Z","containerStatuses":[{"name":"calico-policy-controller","state":{"running":{"startedAt":"2017-10-19T21:04:05Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/calico/kube-policy-controller:v0.7.0","imageID":"docker-pullable://quay.io/calico/kube-policy-controller@sha256:3916d308f1c1681c19daccc35ddb621e4e93b49046343ebe9eda570c0f9fe5a4","containerID":"docker://e6060ee897397d2f17664b2bed4935093a324afdb4e327556440a4bcd0e66672"}],"qosClass":"BestEffort"}}} | |
2017-10-19 21:04:06,007 5 DEBUG MODIFIED Pod: calico-policy-controller-2476506652-d7fb8 to queue (3) (1508447046.01) | |
2017-10-19 21:04:06,007 5 DEBUG Update resourceVersion, was: 327, now: 329 | |
2017-10-19 21:04:06,007 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"qosClass": "Burstable", | |
"containerStatuses": [ | |
{ | |
"restartCount": 0, | |
"name": "calico-node", | |
"image": "quay.io/calico/node:v2.5.1", | |
"imageID": "docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc", | |
"state": { | |
"running": { | |
"startedAt": "2017-10-19T21:03:46Z" | |
} | |
}, | |
"ready": true, | |
"lastState": {}, | |
"containerID": "docker://f34658276eb8894133d7b859cd2aac19aeb8f6e680c927691f1f743a2e46ad53" | |
}, | |
{ | |
"restartCount": 0, | |
"name": "install-cni", | |
"image": "quay.io/calico/cni:v1.10.0", | |
"imageID": "docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39", | |
"state": { | |
"running": { | |
"startedAt": "2017-10-19T21:03:51Z" | |
} | |
}, | |
"ready": true, | |
"lastState": {}, | |
"containerID": "docker://a3fa34a03af5f606f6e2b68a58254375201afdf511ba985f7d933ce657d0bc10" | |
} | |
], | |
"podIP": "172.18.18.101", | |
"startTime": "2017-10-19T21:03:31Z", | |
"hostIP": "172.18.18.101", | |
"phase": "Running", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Initialized", | |
"lastTransitionTime": "2017-10-19T21:03:31Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Ready", | |
"lastTransitionTime": "2017-10-19T21:04:01Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:03:51Z" | |
} | |
] | |
}, | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "calico-node", | |
"schedulerName": "default-scheduler", | |
"hostNetwork": true, | |
"serviceAccount": "calico-node", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"hostPath": { | |
"path": "/lib/modules" | |
}, | |
"name": "lib-modules" | |
}, | |
{ | |
"hostPath": { | |
"path": "/var/run/calico" | |
}, | |
"name": "var-run-calico" | |
}, | |
{ | |
"hostPath": { | |
"path": "/opt/cni/bin" | |
}, | |
"name": "cni-bin-dir" | |
}, | |
{ | |
"hostPath": { | |
"path": "/etc/cni/net.d" | |
}, | |
"name": "cni-net-dir" | |
}, | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-etcd-secrets" | |
}, | |
"name": "etcd-certs" | |
}, | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-node-token-vk7vx" | |
}, | |
"name": "calico-node-token-vk7vx" | |
} | |
], | |
"tolerations": [ | |
{ | |
"operator": "Exists", | |
"effect": "NoExecute", | |
"key": "node.alpha.kubernetes.io/notReady" | |
}, | |
{ | |
"operator": "Exists", | |
"effect": "NoExecute", | |
"key": "node.alpha.kubernetes.io/unreachable" | |
} | |
], | |
"containers": [ | |
{ | |
"livenessProbe": { | |
"httpGet": { | |
"path": "/liveness", | |
"scheme": "HTTP", | |
"port": 9099 | |
}, | |
"timeoutSeconds": 1, | |
"initialDelaySeconds": 10, | |
"periodSeconds": 10, | |
"successThreshold": 1, | |
"failureThreshold": 6 | |
}, | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "calico-node", | |
"image": "quay.io/calico/node:v2.5.1", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/lib/modules", | |
"name": "lib-modules" | |
}, | |
{ | |
"mountPath": "/var/run/calico", | |
"name": "var-run-calico" | |
}, | |
{ | |
"mountPath": "/calico-secrets", | |
"name": "etcd-certs" | |
}, | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "calico-node-token-vk7vx" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"env": [ | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_endpoints" | |
} | |
}, | |
"name": "ETCD_ENDPOINTS" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "calico_backend" | |
} | |
}, | |
"name": "CALICO_NETWORKING_BACKEND" | |
}, | |
{ | |
"name": "CLUSTER_TYPE", | |
"value": "k8s,bgp" | |
}, | |
{ | |
"name": "CALICO_DISABLE_FILE_LOGGING", | |
"value": "true" | |
}, | |
{ | |
"name": "FELIX_DEFAULTENDPOINTTOHOSTACTION", | |
"value": "ACCEPT" | |
}, | |
{ | |
"name": "CALICO_IPV4POOL_CIDR", | |
"value": "192.168.0.0/16" | |
}, | |
{ | |
"name": "CALICO_IPV4POOL_IPIP", | |
"value": "always" | |
}, | |
{ | |
"name": "FELIX_IPV6SUPPORT", | |
"value": "false" | |
}, | |
{ | |
"name": "FELIX_LOGSEVERITYSCREEN", | |
"value": "info" | |
}, | |
{ | |
"name": "FELIX_IPINIPMTU", | |
"value": "1440" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_ca" | |
} | |
}, | |
"name": "ETCD_CA_CERT_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_key" | |
} | |
}, | |
"name": "ETCD_KEY_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_cert" | |
} | |
}, | |
"name": "ETCD_CERT_FILE" | |
}, | |
{ | |
"name": "IP" | |
}, | |
{ | |
"name": "FELIX_HEALTHENABLED", | |
"value": "true" | |
} | |
], | |
"imagePullPolicy": "IfNotPresent", | |
"readinessProbe": { | |
"successThreshold": 1, | |
"httpGet": { | |
"path": "/readiness", | |
"scheme": "HTTP", | |
"port": 9099 | |
}, | |
"failureThreshold": 3, | |
"timeoutSeconds": 1, | |
"periodSeconds": 10 | |
}, | |
"securityContext": { | |
"privileged": true | |
}, | |
"resources": { | |
"requests": { | |
"cpu": "250m" | |
} | |
} | |
}, | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "install-cni", | |
"image": "quay.io/calico/cni:v1.10.0", | |
"volumeMounts": [ | |
{ | |
"mountPath": "/host/opt/cni/bin", | |
"name": "cni-bin-dir" | |
}, | |
{ | |
"mountPath": "/host/etc/cni/net.d", | |
"name": "cni-net-dir" | |
}, | |
{ | |
"mountPath": "/calico-secrets", | |
"name": "etcd-certs" | |
}, | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "calico-node-token-vk7vx" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"command": [ | |
"/install-cni.sh" | |
], | |
"env": [ | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_endpoints" | |
} | |
}, | |
"name": "ETCD_ENDPOINTS" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "cni_network_config" | |
} | |
}, | |
"name": "CNI_NETWORK_CONFIG" | |
} | |
], | |
"imagePullPolicy": "IfNotPresent", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.101" | |
}, | |
"metadata": { | |
"name": "calico-node-4ltlh", | |
"labels": { | |
"k8s-app": "calico-node", | |
"pod-template-generation": "1", | |
"controller-revision-hash": "3209084365" | |
}, | |
"namespace": "kube-system", | |
"ownerReferences": [ | |
{ | |
"kind": "DaemonSet", | |
"name": "calico-node", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "f560cc6d-b510-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "311", | |
"generateName": "calico-node-", | |
"creationTimestamp": "2017-10-19T21:03:31Z", | |
"annotations": { | |
"scheduler.alpha.kubernetes.io/critical-pod": "", | |
"scheduler.alpha.kubernetes.io/tolerations": "[{\"key\": \"dedicated\", \"value\": \"master\", \"effect\": \"NoSchedule\" },\n {\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]\n", | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"DaemonSet\",\"namespace\":\"kube-system\",\"name\":\"calico-node\",\"uid\":\"f560cc6d-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"181\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-node-4ltlh", | |
"uid": "f60ef5a4-b510-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:06,007 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:06,007 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:06,007 5 DEBUG Updating pod: kube-system.calico-node-4ltlh | |
2017-10-19 21:04:06,008 5 DEBUG Compare labels on kube-system.calico-node-4ltlh. cached: None, new: {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', 'calico/k8s_ns': u'kube-system', u'controller-revision-hash': u'3209084365'} | |
2017-10-19 21:04:06,008 5 INFO Labels for kube-system.calico-node-4ltlh have been updated | |
2017-10-19 21:04:06,008 5 INFO No endpoint for kube-system.calico-node-4ltlh in cache, loading | |
2017-10-19 21:04:06,011 5 INFO Loaded endpoint and label caches | |
2017-10-19 21:04:06,011 5 INFO No endpoint for pod kube-system.calico-node-4ltlh - wait for creation | |
2017-10-19 21:04:06,011 5 INFO Handled MODIFIED for Pod: (u'kube-system', u'calico-node-4ltlh') | |
2017-10-19 21:04:06,012 5 DEBUG Reading from event queue | |
2017-10-19 21:04:06,012 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"qosClass": "Burstable", | |
"containerStatuses": [ | |
{ | |
"restartCount": 0, | |
"name": "calico-node", | |
"image": "quay.io/calico/node:v2.5.1", | |
"imageID": "docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc", | |
"state": { | |
"running": { | |
"startedAt": "2017-10-19T21:03:46Z" | |
} | |
}, | |
"ready": true, | |
"lastState": {}, | |
"containerID": "docker://df2e0cb6c4a622146cc5c6a77afdd4160950319c55890f17623e325ba8162a50" | |
}, | |
{ | |
"restartCount": 0, | |
"name": "install-cni", | |
"image": "quay.io/calico/cni:v1.10.0", | |
"imageID": "docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39", | |
"state": { | |
"running": { | |
"startedAt": "2017-10-19T21:03:50Z" | |
} | |
}, | |
"ready": true, | |
"lastState": {}, | |
"containerID": "docker://a14ddd11b973aa2b7fcc613d62bb7c74f684deef5d2a11276fc00ea5a0c5e072" | |
} | |
], | |
"podIP": "172.18.18.103", | |
"startTime": "2017-10-19T21:03:31Z", | |
"hostIP": "172.18.18.103", | |
"phase": "Running", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Initialized", | |
"lastTransitionTime": "2017-10-19T21:03:31Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Ready", | |
"lastTransitionTime": "2017-10-19T21:04:01Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:03:50Z" | |
} | |
] | |
}, | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "calico-node", | |
"schedulerName": "default-scheduler", | |
"hostNetwork": true, | |
"serviceAccount": "calico-node", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"hostPath": { | |
"path": "/lib/modules" | |
}, | |
"name": "lib-modules" | |
}, | |
{ | |
"hostPath": { | |
"path": "/var/run/calico" | |
}, | |
"name": "var-run-calico" | |
}, | |
{ | |
"hostPath": { | |
"path": "/opt/cni/bin" | |
}, | |
"name": "cni-bin-dir" | |
}, | |
{ | |
"hostPath": { | |
"path": "/etc/cni/net.d" | |
}, | |
"name": "cni-net-dir" | |
}, | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-etcd-secrets" | |
}, | |
"name": "etcd-certs" | |
}, | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-node-token-vk7vx" | |
}, | |
"name": "calico-node-token-vk7vx" | |
} | |
], | |
"tolerations": [ | |
{ | |
"operator": "Exists", | |
"effect": "NoExecute", | |
"key": "node.alpha.kubernetes.io/notReady" | |
}, | |
{ | |
"operator": "Exists", | |
"effect": "NoExecute", | |
"key": "node.alpha.kubernetes.io/unreachable" | |
} | |
], | |
"containers": [ | |
{ | |
"livenessProbe": { | |
"httpGet": { | |
"path": "/liveness", | |
"scheme": "HTTP", | |
"port": 9099 | |
}, | |
"timeoutSeconds": 1, | |
"initialDelaySeconds": 10, | |
"periodSeconds": 10, | |
"successThreshold": 1, | |
"failureThreshold": 6 | |
}, | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "calico-node", | |
"image": "quay.io/calico/node:v2.5.1", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/lib/modules", | |
"name": "lib-modules" | |
}, | |
{ | |
"mountPath": "/var/run/calico", | |
"name": "var-run-calico" | |
}, | |
{ | |
"mountPath": "/calico-secrets", | |
"name": "etcd-certs" | |
}, | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "calico-node-token-vk7vx" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"env": [ | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_endpoints" | |
} | |
}, | |
"name": "ETCD_ENDPOINTS" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "calico_backend" | |
} | |
}, | |
"name": "CALICO_NETWORKING_BACKEND" | |
}, | |
{ | |
"name": "CLUSTER_TYPE", | |
"value": "k8s,bgp" | |
}, | |
{ | |
"name": "CALICO_DISABLE_FILE_LOGGING", | |
"value": "true" | |
}, | |
{ | |
"name": "FELIX_DEFAULTENDPOINTTOHOSTACTION", | |
"value": "ACCEPT" | |
}, | |
{ | |
"name": "CALICO_IPV4POOL_CIDR", | |
"value": "192.168.0.0/16" | |
}, | |
{ | |
"name": "CALICO_IPV4POOL_IPIP", | |
"value": "always" | |
}, | |
{ | |
"name": "FELIX_IPV6SUPPORT", | |
"value": "false" | |
}, | |
{ | |
"name": "FELIX_LOGSEVERITYSCREEN", | |
"value": "info" | |
}, | |
{ | |
"name": "FELIX_IPINIPMTU", | |
"value": "1440" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_ca" | |
} | |
}, | |
"name": "ETCD_CA_CERT_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_key" | |
} | |
}, | |
"name": "ETCD_KEY_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_cert" | |
} | |
}, | |
"name": "ETCD_CERT_FILE" | |
}, | |
{ | |
"name": "IP" | |
}, | |
{ | |
"name": "FELIX_HEALTHENABLED", | |
"value": "true" | |
} | |
], | |
"imagePullPolicy": "IfNotPresent", | |
"readinessProbe": { | |
"successThreshold": 1, | |
"httpGet": { | |
"path": "/readiness", | |
"scheme": "HTTP", | |
"port": 9099 | |
}, | |
"failureThreshold": 3, | |
"timeoutSeconds": 1, | |
"periodSeconds": 10 | |
}, | |
"securityContext": { | |
"privileged": true | |
}, | |
"resources": { | |
"requests": { | |
"cpu": "250m" | |
} | |
} | |
}, | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "install-cni", | |
"image": "quay.io/calico/cni:v1.10.0", | |
"volumeMounts": [ | |
{ | |
"mountPath": "/host/opt/cni/bin", | |
"name": "cni-bin-dir" | |
}, | |
{ | |
"mountPath": "/host/etc/cni/net.d", | |
"name": "cni-net-dir" | |
}, | |
{ | |
"mountPath": "/calico-secrets", | |
"name": "etcd-certs" | |
}, | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "calico-node-token-vk7vx" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"command": [ | |
"/install-cni.sh" | |
], | |
"env": [ | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_endpoints" | |
} | |
}, | |
"name": "ETCD_ENDPOINTS" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "cni_network_config" | |
} | |
}, | |
"name": "CNI_NETWORK_CONFIG" | |
} | |
], | |
"imagePullPolicy": "IfNotPresent", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.103" | |
}, | |
"metadata": { | |
"name": "calico-node-pnq2z", | |
"labels": { | |
"k8s-app": "calico-node", | |
"pod-template-generation": "1", | |
"controller-revision-hash": "3209084365" | |
}, | |
"namespace": "kube-system", | |
"ownerReferences": [ | |
{ | |
"kind": "DaemonSet", | |
"name": "calico-node", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "f560cc6d-b510-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "308", | |
"generateName": "calico-node-", | |
"creationTimestamp": "2017-10-19T21:03:31Z", | |
"annotations": { | |
"scheduler.alpha.kubernetes.io/critical-pod": "", | |
"scheduler.alpha.kubernetes.io/tolerations": "[{\"key\": \"dedicated\", \"value\": \"master\", \"effect\": \"NoSchedule\" },\n {\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]\n", | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"DaemonSet\",\"namespace\":\"kube-system\",\"name\":\"calico-node\",\"uid\":\"f560cc6d-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"181\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-node-pnq2z", | |
"uid": "f60e5211-b510-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:06,012 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:06,012 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:06,012 5 DEBUG Updating pod: kube-system.calico-node-pnq2z | |
2017-10-19 21:04:06,012 5 DEBUG Compare labels on kube-system.calico-node-pnq2z. cached: None, new: {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', 'calico/k8s_ns': u'kube-system', u'controller-revision-hash': u'3209084365'} | |
2017-10-19 21:04:06,013 5 INFO Labels for kube-system.calico-node-pnq2z have been updated | |
2017-10-19 21:04:06,013 5 INFO No endpoint for kube-system.calico-node-pnq2z in cache, loading | |
2017-10-19 21:04:06,016 5 INFO Loaded endpoint and label caches | |
2017-10-19 21:04:06,016 5 INFO No endpoint for pod kube-system.calico-node-pnq2z - wait for creation | |
2017-10-19 21:04:06,016 5 INFO Handled MODIFIED for Pod: (u'kube-system', u'calico-node-pnq2z') | |
2017-10-19 21:04:06,016 5 DEBUG Reading from event queue | |
2017-10-19 21:04:06,017 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"qosClass": "Burstable", | |
"containerStatuses": [ | |
{ | |
"restartCount": 0, | |
"name": "calico-node", | |
"image": "quay.io/calico/node:v2.5.1", | |
"imageID": "docker-pullable://quay.io/calico/node@sha256:c61f9e3ac4231291196e80f23a3dc43a82f37a7153aa03e3f0798577da4575dc", | |
"state": { | |
"running": { | |
"startedAt": "2017-10-19T21:03:46Z" | |
} | |
}, | |
"ready": true, | |
"lastState": {}, | |
"containerID": "docker://075a805af05a5a597cbe740aea62b524cb2158d1cfa00562ebf09ec4b6623363" | |
}, | |
{ | |
"restartCount": 0, | |
"name": "install-cni", | |
"image": "quay.io/calico/cni:v1.10.0", | |
"imageID": "docker-pullable://quay.io/calico/cni@sha256:df90cb1d18182fe41aef0eea293c0045473749e64b8dfd3e420db1a39e5edb39", | |
"state": { | |
"running": { | |
"startedAt": "2017-10-19T21:03:50Z" | |
} | |
}, | |
"ready": true, | |
"lastState": {}, | |
"containerID": "docker://9ccb32220acf167a901c95da57d5b17a1ad0a097bee4ab35129cd72a5691db6c" | |
} | |
], | |
"podIP": "172.18.18.102", | |
"startTime": "2017-10-19T21:03:31Z", | |
"hostIP": "172.18.18.102", | |
"phase": "Running", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Initialized", | |
"lastTransitionTime": "2017-10-19T21:03:31Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Ready", | |
"lastTransitionTime": "2017-10-19T21:04:01Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:03:51Z" | |
} | |
] | |
}, | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "calico-node", | |
"schedulerName": "default-scheduler", | |
"hostNetwork": true, | |
"serviceAccount": "calico-node", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"hostPath": { | |
"path": "/lib/modules" | |
}, | |
"name": "lib-modules" | |
}, | |
{ | |
"hostPath": { | |
"path": "/var/run/calico" | |
}, | |
"name": "var-run-calico" | |
}, | |
{ | |
"hostPath": { | |
"path": "/opt/cni/bin" | |
}, | |
"name": "cni-bin-dir" | |
}, | |
{ | |
"hostPath": { | |
"path": "/etc/cni/net.d" | |
}, | |
"name": "cni-net-dir" | |
}, | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-etcd-secrets" | |
}, | |
"name": "etcd-certs" | |
}, | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-node-token-vk7vx" | |
}, | |
"name": "calico-node-token-vk7vx" | |
} | |
], | |
"tolerations": [ | |
{ | |
"operator": "Exists", | |
"effect": "NoExecute", | |
"key": "node.alpha.kubernetes.io/notReady" | |
}, | |
{ | |
"operator": "Exists", | |
"effect": "NoExecute", | |
"key": "node.alpha.kubernetes.io/unreachable" | |
} | |
], | |
"containers": [ | |
{ | |
"livenessProbe": { | |
"httpGet": { | |
"path": "/liveness", | |
"scheme": "HTTP", | |
"port": 9099 | |
}, | |
"timeoutSeconds": 1, | |
"initialDelaySeconds": 10, | |
"periodSeconds": 10, | |
"successThreshold": 1, | |
"failureThreshold": 6 | |
}, | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "calico-node", | |
"image": "quay.io/calico/node:v2.5.1", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/lib/modules", | |
"name": "lib-modules" | |
}, | |
{ | |
"mountPath": "/var/run/calico", | |
"name": "var-run-calico" | |
}, | |
{ | |
"mountPath": "/calico-secrets", | |
"name": "etcd-certs" | |
}, | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "calico-node-token-vk7vx" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"env": [ | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_endpoints" | |
} | |
}, | |
"name": "ETCD_ENDPOINTS" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "calico_backend" | |
} | |
}, | |
"name": "CALICO_NETWORKING_BACKEND" | |
}, | |
{ | |
"name": "CLUSTER_TYPE", | |
"value": "k8s,bgp" | |
}, | |
{ | |
"name": "CALICO_DISABLE_FILE_LOGGING", | |
"value": "true" | |
}, | |
{ | |
"name": "FELIX_DEFAULTENDPOINTTOHOSTACTION", | |
"value": "ACCEPT" | |
}, | |
{ | |
"name": "CALICO_IPV4POOL_CIDR", | |
"value": "192.168.0.0/16" | |
}, | |
{ | |
"name": "CALICO_IPV4POOL_IPIP", | |
"value": "always" | |
}, | |
{ | |
"name": "FELIX_IPV6SUPPORT", | |
"value": "false" | |
}, | |
{ | |
"name": "FELIX_LOGSEVERITYSCREEN", | |
"value": "info" | |
}, | |
{ | |
"name": "FELIX_IPINIPMTU", | |
"value": "1440" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_ca" | |
} | |
}, | |
"name": "ETCD_CA_CERT_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_key" | |
} | |
}, | |
"name": "ETCD_KEY_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_cert" | |
} | |
}, | |
"name": "ETCD_CERT_FILE" | |
}, | |
{ | |
"name": "IP" | |
}, | |
{ | |
"name": "FELIX_HEALTHENABLED", | |
"value": "true" | |
} | |
], | |
"imagePullPolicy": "IfNotPresent", | |
"readinessProbe": { | |
"successThreshold": 1, | |
"httpGet": { | |
"path": "/readiness", | |
"scheme": "HTTP", | |
"port": 9099 | |
}, | |
"failureThreshold": 3, | |
"timeoutSeconds": 1, | |
"periodSeconds": 10 | |
}, | |
"securityContext": { | |
"privileged": true | |
}, | |
"resources": { | |
"requests": { | |
"cpu": "250m" | |
} | |
} | |
}, | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "install-cni", | |
"image": "quay.io/calico/cni:v1.10.0", | |
"volumeMounts": [ | |
{ | |
"mountPath": "/host/opt/cni/bin", | |
"name": "cni-bin-dir" | |
}, | |
{ | |
"mountPath": "/host/etc/cni/net.d", | |
"name": "cni-net-dir" | |
}, | |
{ | |
"mountPath": "/calico-secrets", | |
"name": "etcd-certs" | |
}, | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "calico-node-token-vk7vx" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"command": [ | |
"/install-cni.sh" | |
], | |
"env": [ | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_endpoints" | |
} | |
}, | |
"name": "ETCD_ENDPOINTS" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "cni_network_config" | |
} | |
}, | |
"name": "CNI_NETWORK_CONFIG" | |
} | |
], | |
"imagePullPolicy": "IfNotPresent", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.102" | |
}, | |
"metadata": { | |
"name": "calico-node-t0d59", | |
"labels": { | |
"k8s-app": "calico-node", | |
"pod-template-generation": "1", | |
"controller-revision-hash": "3209084365" | |
}, | |
"namespace": "kube-system", | |
"ownerReferences": [ | |
{ | |
"kind": "DaemonSet", | |
"name": "calico-node", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "f560cc6d-b510-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "309", | |
"generateName": "calico-node-", | |
"creationTimestamp": "2017-10-19T21:03:31Z", | |
"annotations": { | |
"scheduler.alpha.kubernetes.io/critical-pod": "", | |
"scheduler.alpha.kubernetes.io/tolerations": "[{\"key\": \"dedicated\", \"value\": \"master\", \"effect\": \"NoSchedule\" },\n {\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]\n", | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"DaemonSet\",\"namespace\":\"kube-system\",\"name\":\"calico-node\",\"uid\":\"f560cc6d-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"181\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-node-t0d59", | |
"uid": "f60ebaf2-b510-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:06,017 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:06,017 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:06,017 5 DEBUG Updating pod: kube-system.calico-node-t0d59 | |
2017-10-19 21:04:06,017 5 DEBUG Compare labels on kube-system.calico-node-t0d59. cached: None, new: {u'k8s-app': u'calico-node', u'pod-template-generation': u'1', 'calico/k8s_ns': u'kube-system', u'controller-revision-hash': u'3209084365'} | |
2017-10-19 21:04:06,017 5 INFO Labels for kube-system.calico-node-t0d59 have been updated | |
2017-10-19 21:04:06,017 5 INFO No endpoint for kube-system.calico-node-t0d59 in cache, loading | |
2017-10-19 21:04:06,019 5 INFO Loaded endpoint and label caches | |
2017-10-19 21:04:06,019 5 INFO No endpoint for pod kube-system.calico-node-t0d59 - wait for creation | |
2017-10-19 21:04:06,020 5 INFO Handled MODIFIED for Pod: (u'kube-system', u'calico-node-t0d59') | |
2017-10-19 21:04:06,020 5 DEBUG Reading from event queue | |
2017-10-19 21:04:06,020 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"qosClass": "BestEffort", | |
"containerStatuses": [ | |
{ | |
"restartCount": 0, | |
"name": "calico-policy-controller", | |
"image": "quay.io/calico/kube-policy-controller:v0.7.0", | |
"imageID": "", | |
"state": { | |
"waiting": { | |
"reason": "ContainerCreating" | |
} | |
}, | |
"ready": false, | |
"lastState": {} | |
} | |
], | |
"podIP": "172.18.18.103", | |
"startTime": "2017-10-19T21:04:02Z", | |
"hostIP": "172.18.18.103", | |
"phase": "Pending", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Initialized", | |
"lastTransitionTime": "2017-10-19T21:04:02Z" | |
}, | |
{ | |
"status": "False", | |
"lastTransitionTime": "2017-10-19T21:04:02Z", | |
"reason": "ContainersNotReady", | |
"lastProbeTime": null, | |
"message": "containers with unready status: [calico-policy-controller]", | |
"type": "Ready" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:04:02Z" | |
} | |
] | |
}, | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "calico-policy-controller", | |
"schedulerName": "default-scheduler", | |
"hostNetwork": true, | |
"serviceAccount": "calico-policy-controller", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-etcd-secrets" | |
}, | |
"name": "etcd-certs" | |
}, | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-policy-controller-token-cfjmt" | |
}, | |
"name": "calico-policy-controller-token-cfjmt" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "calico-policy-controller", | |
"image": "quay.io/calico/kube-policy-controller:v0.7.0", | |
"volumeMounts": [ | |
{ | |
"mountPath": "/calico-secrets", | |
"name": "etcd-certs" | |
}, | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "calico-policy-controller-token-cfjmt" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"env": [ | |
{ | |
"name": "LOG_LEVEL", | |
"value": "debug" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_endpoints" | |
} | |
}, | |
"name": "ETCD_ENDPOINTS" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_ca" | |
} | |
}, | |
"name": "ETCD_CA_CERT_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_key" | |
} | |
}, | |
"name": "ETCD_KEY_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_cert" | |
} | |
}, | |
"name": "ETCD_CERT_FILE" | |
}, | |
{ | |
"name": "K8S_API", | |
"value": "https://kubernetes.default:443" | |
}, | |
{ | |
"name": "CONFIGURE_ETC_HOSTS", | |
"value": "true" | |
} | |
], | |
"imagePullPolicy": "IfNotPresent", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.103" | |
}, | |
"metadata": { | |
"name": "calico-policy-controller-2476506652-d7fb8", | |
"labels": { | |
"pod-template-hash": "2476506652", | |
"k8s-app": "calico-policy" | |
}, | |
"namespace": "kube-system", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "calico-policy-controller-2476506652", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "f56f35f8-b510-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "317", | |
"generateName": "calico-policy-controller-2476506652-", | |
"creationTimestamp": "2017-10-19T21:03:31Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"kube-system\",\"name\":\"calico-policy-controller-2476506652\",\"uid\":\"f56f35f8-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"185\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-policy-controller-2476506652-d7fb8", | |
"uid": "f60f8e4f-b510-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:06,020 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:06,020 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:06,020 5 DEBUG Updating pod: kube-system.calico-policy-controller-2476506652-d7fb8 | |
2017-10-19 21:04:06,020 5 DEBUG Compare labels on kube-system.calico-policy-controller-2476506652-d7fb8. cached: None, new: {u'pod-template-hash': u'2476506652', u'k8s-app': u'calico-policy', 'calico/k8s_ns': u'kube-system'} | |
2017-10-19 21:04:06,020 5 INFO Labels for kube-system.calico-policy-controller-2476506652-d7fb8 have been updated | |
2017-10-19 21:04:06,020 5 INFO No endpoint for kube-system.calico-policy-controller-2476506652-d7fb8 in cache, loading | |
2017-10-19 21:04:06,022 5 INFO Loaded endpoint and label caches | |
2017-10-19 21:04:06,022 5 INFO No endpoint for pod kube-system.calico-policy-controller-2476506652-d7fb8 - wait for creation | |
2017-10-19 21:04:06,023 5 INFO Handled MODIFIED for Pod: (u'kube-system', u'calico-policy-controller-2476506652-d7fb8') | |
2017-10-19 21:04:06,023 5 DEBUG Reading from event queue | |
2017-10-19 21:04:06,023 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"qosClass": "BestEffort", | |
"containerStatuses": [ | |
{ | |
"restartCount": 0, | |
"name": "calico-policy-controller", | |
"image": "quay.io/calico/kube-policy-controller:v0.7.0", | |
"imageID": "docker-pullable://quay.io/calico/kube-policy-controller@sha256:3916d308f1c1681c19daccc35ddb621e4e93b49046343ebe9eda570c0f9fe5a4", | |
"state": { | |
"running": { | |
"startedAt": "2017-10-19T21:04:05Z" | |
} | |
}, | |
"ready": true, | |
"lastState": {}, | |
"containerID": "docker://e6060ee897397d2f17664b2bed4935093a324afdb4e327556440a4bcd0e66672" | |
} | |
], | |
"podIP": "172.18.18.103", | |
"startTime": "2017-10-19T21:04:02Z", | |
"hostIP": "172.18.18.103", | |
"phase": "Running", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Initialized", | |
"lastTransitionTime": "2017-10-19T21:04:02Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Ready", | |
"lastTransitionTime": "2017-10-19T21:04:05Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:04:02Z" | |
} | |
] | |
}, | |
"kind": "Pod", | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "calico-policy-controller", | |
"schedulerName": "default-scheduler", | |
"hostNetwork": true, | |
"serviceAccount": "calico-policy-controller", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-etcd-secrets" | |
}, | |
"name": "etcd-certs" | |
}, | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "calico-policy-controller-token-cfjmt" | |
}, | |
"name": "calico-policy-controller-token-cfjmt" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "calico-policy-controller", | |
"image": "quay.io/calico/kube-policy-controller:v0.7.0", | |
"volumeMounts": [ | |
{ | |
"mountPath": "/calico-secrets", | |
"name": "etcd-certs" | |
}, | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "calico-policy-controller-token-cfjmt" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"env": [ | |
{ | |
"name": "LOG_LEVEL", | |
"value": "debug" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_endpoints" | |
} | |
}, | |
"name": "ETCD_ENDPOINTS" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_ca" | |
} | |
}, | |
"name": "ETCD_CA_CERT_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_key" | |
} | |
}, | |
"name": "ETCD_KEY_FILE" | |
}, | |
{ | |
"valueFrom": { | |
"configMapKeyRef": { | |
"name": "calico-config", | |
"key": "etcd_cert" | |
} | |
}, | |
"name": "ETCD_CERT_FILE" | |
}, | |
{ | |
"name": "K8S_API", | |
"value": "https://kubernetes.default:443" | |
}, | |
{ | |
"name": "CONFIGURE_ETC_HOSTS", | |
"value": "true" | |
} | |
], | |
"imagePullPolicy": "IfNotPresent", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.103" | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"name": "calico-policy-controller-2476506652-d7fb8", | |
"labels": { | |
"pod-template-hash": "2476506652", | |
"k8s-app": "calico-policy" | |
}, | |
"namespace": "kube-system", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "calico-policy-controller-2476506652", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "f56f35f8-b510-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "329", | |
"generateName": "calico-policy-controller-2476506652-", | |
"creationTimestamp": "2017-10-19T21:03:31Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"kube-system\",\"name\":\"calico-policy-controller-2476506652\",\"uid\":\"f56f35f8-b510-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"185\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/kube-system/pods/calico-policy-controller-2476506652-d7fb8", | |
"uid": "f60f8e4f-b510-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:06,023 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:06,023 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:06,023 5 DEBUG Updating pod: kube-system.calico-policy-controller-2476506652-d7fb8 | |
2017-10-19 21:04:06,023 5 DEBUG Compare labels on kube-system.calico-policy-controller-2476506652-d7fb8. cached: None, new: {'pod-template-hash': '2476506652', 'k8s-app': 'calico-policy', 'calico/k8s_ns': 'kube-system'} | |
2017-10-19 21:04:06,023 5 INFO Labels for kube-system.calico-policy-controller-2476506652-d7fb8 have been updated | |
2017-10-19 21:04:06,023 5 INFO No endpoint for kube-system.calico-policy-controller-2476506652-d7fb8 in cache, loading | |
2017-10-19 21:04:06,038 5 INFO Loaded endpoint and label caches | |
2017-10-19 21:04:06,039 5 INFO No endpoint for pod kube-system.calico-policy-controller-2476506652-d7fb8 - wait for creation | |
2017-10-19 21:04:06,039 5 INFO Handled MODIFIED for Pod: ('kube-system', 'calico-policy-controller-2476506652-d7fb8') | |
2017-10-19 21:04:06,039 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:06,039 5 DEBUG Reading from event queue | |
2017-10-19 21:04:15,986 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:04:15,987 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:04:15,991 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:04:15,991 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:04:15,991 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '327'. stream=True | |
2017-10-19 21:04:15,991 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:04:15,995 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:04:15,996 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '327'. stream=True | |
2017-10-19 21:04:16,016 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:04:16,016 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:04:16,016 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:04:16,016 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '329'. stream=True | |
2017-10-19 21:04:16,032 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:04:16,032 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:04:16,033 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:04:26,037 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:04:26,038 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:04:26,037 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:04:26,038 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:04:26,038 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:04:26,038 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '327'. stream=True | |
2017-10-19 21:04:26,037 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:04:26,040 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:04:26,040 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:04:26,040 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '327'. stream=True | |
2017-10-19 21:04:26,041 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:04:26,041 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '329'. stream=True | |
2017-10-19 21:04:26,067 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:04:26,068 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:04:26,069 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:04:34,282 5 DEBUG Read from API: {"type":"ADDED","object":{"kind":"Namespace","apiVersion":"v1","metadata":{"name":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo","uid":"1bc0ebf5-b511-11e7-912d-0800275f1e48","resourceVersion":"369","creationTimestamp":"2017-10-19T21:04:34Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}}} | |
2017-10-19 21:04:34,282 5 DEBUG ADDED Namespace: policy-demo to queue (0) (1508447074.28) | |
2017-10-19 21:04:34,283 5 DEBUG Read event: ADDED, Namespace, { | |
"status": { | |
"phase": "Active" | |
}, | |
"kind": "Namespace", | |
"spec": { | |
"finalizers": [ | |
"kubernetes" | |
] | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"resourceVersion": "369", | |
"creationTimestamp": "2017-10-19T21:04:34Z", | |
"name": "policy-demo", | |
"selfLink": "/api/v1/namespaces/policy-demo", | |
"uid": "1bc0ebf5-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:34,283 5 DEBUG Processing 'ADDED' for kind 'Namespace' | |
2017-10-19 21:04:34,283 5 DEBUG Looking up handler for event: ('Namespace', 'ADDED') | |
2017-10-19 21:04:34,283 5 DEBUG Adding/updating namespace: policy-demo | |
2017-10-19 21:04:34,283 5 DEBUG Generated namespace labels: {} | |
2017-10-19 21:04:34,283 5 DEBUG Update resourceVersion, was: 327, now: 369 | |
2017-10-19 21:04:34,321 5 DEBUG Created/updated profile for namespace policy-demo | |
2017-10-19 21:04:34,322 5 INFO Handled ADDED for Namespace: (None, 'policy-demo') | |
2017-10-19 21:04:34,322 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:34,322 5 DEBUG Reading from event queue | |
2017-10-19 21:04:34,549 5 DEBUG Read from API: {"type":"ADDED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-cndwl","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl","uid":"1be49648-b511-11e7-912d-0800275f1e48","resourceVersion":"378","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","qosClass":"BestEffort"}}} | |
2017-10-19 21:04:34,549 5 DEBUG ADDED Pod: nginx-4217019353-cndwl to queue (0) (1508447074.55) | |
2017-10-19 21:04:34,549 5 DEBUG Update resourceVersion, was: 329, now: 378 | |
2017-10-19 21:04:34,549 5 DEBUG Read event: ADDED, Pod, { | |
"status": { | |
"phase": "Pending", | |
"qosClass": "BestEffort" | |
}, | |
"kind": "Pod", | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "default", | |
"schedulerName": "default-scheduler", | |
"serviceAccount": "default", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "default-token-38j41" | |
}, | |
"name": "default-token-38j41" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "nginx", | |
"image": "nginx", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "default-token-38j41" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"imagePullPolicy": "Always", | |
"resources": {} | |
} | |
] | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"name": "nginx-4217019353-cndwl", | |
"labels": { | |
"pod-template-hash": "4217019353", | |
"run": "nginx" | |
}, | |
"namespace": "policy-demo", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "nginx-4217019353", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "378", | |
"generateName": "nginx-4217019353-", | |
"creationTimestamp": "2017-10-19T21:04:34Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl", | |
"uid": "1be49648-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:34,549 5 DEBUG Processing 'ADDED' for kind 'Pod' | |
2017-10-19 21:04:34,549 5 DEBUG Looking up handler for event: ('Pod', 'ADDED') | |
2017-10-19 21:04:34,549 5 DEBUG Updated label cache with policy-demo.nginx-4217019353-cndwl: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'} | |
2017-10-19 21:04:34,549 5 INFO Handled ADDED for Pod: ('policy-demo', 'nginx-4217019353-cndwl') | |
2017-10-19 21:04:34,549 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:34,549 5 DEBUG Reading from event queue | |
2017-10-19 21:04:34,557 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-cndwl","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl","uid":"1be49648-b511-11e7-912d-0800275f1e48","resourceVersion":"379","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.102","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"qosClass":"BestEffort"}}} | |
2017-10-19 21:04:34,557 5 DEBUG MODIFIED Pod: nginx-4217019353-cndwl to queue (0) (1508447074.56) | |
2017-10-19 21:04:34,557 5 DEBUG Update resourceVersion, was: 378, now: 379 | |
2017-10-19 21:04:34,557 5 DEBUG Read from API: {"type":"ADDED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-6ps02","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02","uid":"1bea5ba6-b511-11e7-912d-0800275f1e48","resourceVersion":"380","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","qosClass":"BestEffort"}}} | |
2017-10-19 21:04:34,557 5 DEBUG ADDED Pod: nginx-4217019353-6ps02 to queue (1) (1508447074.56) | |
2017-10-19 21:04:34,557 5 DEBUG Update resourceVersion, was: 379, now: 380 | |
2017-10-19 21:04:34,558 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"phase": "Pending", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
} | |
], | |
"qosClass": "BestEffort" | |
}, | |
"kind": "Pod", | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "default", | |
"schedulerName": "default-scheduler", | |
"serviceAccount": "default", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "default-token-38j41" | |
}, | |
"name": "default-token-38j41" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "nginx", | |
"image": "nginx", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "default-token-38j41" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"imagePullPolicy": "Always", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.102" | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"name": "nginx-4217019353-cndwl", | |
"labels": { | |
"pod-template-hash": "4217019353", | |
"run": "nginx" | |
}, | |
"namespace": "policy-demo", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "nginx-4217019353", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "379", | |
"generateName": "nginx-4217019353-", | |
"creationTimestamp": "2017-10-19T21:04:34Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl", | |
"uid": "1be49648-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:34,558 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:34,558 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:34,558 5 DEBUG Updating pod: policy-demo.nginx-4217019353-cndwl | |
2017-10-19 21:04:34,558 5 DEBUG Compare labels on policy-demo.nginx-4217019353-cndwl. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'} | |
2017-10-19 21:04:34,558 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-cndwl with no label change | |
2017-10-19 21:04:34,558 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-cndwl') | |
2017-10-19 21:04:34,558 5 DEBUG Reading from event queue | |
2017-10-19 21:04:34,558 5 DEBUG Read event: ADDED, Pod, { | |
"status": { | |
"phase": "Pending", | |
"qosClass": "BestEffort" | |
}, | |
"kind": "Pod", | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "default", | |
"schedulerName": "default-scheduler", | |
"serviceAccount": "default", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "default-token-38j41" | |
}, | |
"name": "default-token-38j41" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "nginx", | |
"image": "nginx", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "default-token-38j41" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"imagePullPolicy": "Always", | |
"resources": {} | |
} | |
] | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"name": "nginx-4217019353-6ps02", | |
"labels": { | |
"pod-template-hash": "4217019353", | |
"run": "nginx" | |
}, | |
"namespace": "policy-demo", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "nginx-4217019353", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "380", | |
"generateName": "nginx-4217019353-", | |
"creationTimestamp": "2017-10-19T21:04:34Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02", | |
"uid": "1bea5ba6-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:34,558 5 DEBUG Processing 'ADDED' for kind 'Pod' | |
2017-10-19 21:04:34,558 5 DEBUG Looking up handler for event: ('Pod', 'ADDED') | |
2017-10-19 21:04:34,558 5 DEBUG Updated label cache with policy-demo.nginx-4217019353-6ps02: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'} | |
2017-10-19 21:04:34,558 5 INFO Handled ADDED for Pod: ('policy-demo', 'nginx-4217019353-6ps02') | |
2017-10-19 21:04:34,558 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:34,558 5 DEBUG Reading from event queue | |
2017-10-19 21:04:34,565 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-6ps02","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02","uid":"1bea5ba6-b511-11e7-912d-0800275f1e48","resourceVersion":"381","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.103","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"qosClass":"BestEffort"}}} | |
2017-10-19 21:04:34,565 5 DEBUG MODIFIED Pod: nginx-4217019353-6ps02 to queue (0) (1508447074.57) | |
2017-10-19 21:04:34,565 5 DEBUG Update resourceVersion, was: 380, now: 381 | |
2017-10-19 21:04:34,565 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"phase": "Pending", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
} | |
], | |
"qosClass": "BestEffort" | |
}, | |
"kind": "Pod", | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "default", | |
"schedulerName": "default-scheduler", | |
"serviceAccount": "default", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "default-token-38j41" | |
}, | |
"name": "default-token-38j41" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "nginx", | |
"image": "nginx", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "default-token-38j41" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"imagePullPolicy": "Always", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.103" | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"name": "nginx-4217019353-6ps02", | |
"labels": { | |
"pod-template-hash": "4217019353", | |
"run": "nginx" | |
}, | |
"namespace": "policy-demo", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "nginx-4217019353", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "381", | |
"generateName": "nginx-4217019353-", | |
"creationTimestamp": "2017-10-19T21:04:34Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02", | |
"uid": "1bea5ba6-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:34,565 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:34,567 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:34,567 5 DEBUG Updating pod: policy-demo.nginx-4217019353-6ps02 | |
2017-10-19 21:04:34,567 5 DEBUG Compare labels on policy-demo.nginx-4217019353-6ps02. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'} | |
2017-10-19 21:04:34,567 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-6ps02 with no label change | |
2017-10-19 21:04:34,567 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-6ps02') | |
2017-10-19 21:04:34,567 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:34,567 5 DEBUG Reading from event queue | |
2017-10-19 21:04:34,579 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-cndwl","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl","uid":"1be49648-b511-11e7-912d-0800275f1e48","resourceVersion":"389","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.102","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z","reason":"ContainersNotReady","message":"containers with unready status: [nginx]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"hostIP":"172.18.18.102","startTime":"2017-10-19T21:04:34Z","containerStatuses":[{"name":"nginx","state":{"waiting":{"reason":"ContainerCreating"}},"lastState":{},"ready":false,"restartCount":0,"image":"nginx","imageID":""}],"qosClass":"BestEffort"}}} | |
2017-10-19 21:04:34,579 5 DEBUG MODIFIED Pod: nginx-4217019353-cndwl to queue (0) (1508447074.58) | |
2017-10-19 21:04:34,579 5 DEBUG Update resourceVersion, was: 381, now: 389 | |
2017-10-19 21:04:34,579 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"qosClass": "BestEffort", | |
"containerStatuses": [ | |
{ | |
"restartCount": 0, | |
"name": "nginx", | |
"image": "nginx", | |
"imageID": "", | |
"state": { | |
"waiting": { | |
"reason": "ContainerCreating" | |
} | |
}, | |
"ready": false, | |
"lastState": {} | |
} | |
], | |
"startTime": "2017-10-19T21:04:34Z", | |
"hostIP": "172.18.18.102", | |
"phase": "Pending", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Initialized", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
}, | |
{ | |
"status": "False", | |
"lastTransitionTime": "2017-10-19T21:04:34Z", | |
"reason": "ContainersNotReady", | |
"lastProbeTime": null, | |
"message": "containers with unready status: [nginx]", | |
"type": "Ready" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
} | |
] | |
}, | |
"kind": "Pod", | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "default", | |
"schedulerName": "default-scheduler", | |
"serviceAccount": "default", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "default-token-38j41" | |
}, | |
"name": "default-token-38j41" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "nginx", | |
"image": "nginx", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "default-token-38j41" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"imagePullPolicy": "Always", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.102" | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"name": "nginx-4217019353-cndwl", | |
"labels": { | |
"pod-template-hash": "4217019353", | |
"run": "nginx" | |
}, | |
"namespace": "policy-demo", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "nginx-4217019353", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "389", | |
"generateName": "nginx-4217019353-", | |
"creationTimestamp": "2017-10-19T21:04:34Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl", | |
"uid": "1be49648-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:34,579 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:34,579 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:34,579 5 DEBUG Updating pod: policy-demo.nginx-4217019353-cndwl | |
2017-10-19 21:04:34,579 5 DEBUG Compare labels on policy-demo.nginx-4217019353-cndwl. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'} | |
2017-10-19 21:04:34,579 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-cndwl with no label change | |
2017-10-19 21:04:34,579 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-cndwl') | |
2017-10-19 21:04:34,579 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:34,579 5 DEBUG Reading from event queue | |
2017-10-19 21:04:34,580 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-6ps02","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02","uid":"1bea5ba6-b511-11e7-912d-0800275f1e48","resourceVersion":"390","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.103","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Pending","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z","reason":"ContainersNotReady","message":"containers with unready status: [nginx]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"hostIP":"172.18.18.103","startTime":"2017-10-19T21:04:34Z","containerStatuses":[{"name":"nginx","state":{"waiting":{"reason":"ContainerCreating"}},"lastState":{},"ready":false,"restartCount":0,"image":"nginx","imageID":""}],"qosClass":"BestEffort"}}} | |
2017-10-19 21:04:34,581 5 DEBUG MODIFIED Pod: nginx-4217019353-6ps02 to queue (0) (1508447074.58) | |
2017-10-19 21:04:34,581 5 DEBUG Update resourceVersion, was: 389, now: 390 | |
2017-10-19 21:04:34,581 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"qosClass": "BestEffort", | |
"containerStatuses": [ | |
{ | |
"restartCount": 0, | |
"name": "nginx", | |
"image": "nginx", | |
"imageID": "", | |
"state": { | |
"waiting": { | |
"reason": "ContainerCreating" | |
} | |
}, | |
"ready": false, | |
"lastState": {} | |
} | |
], | |
"startTime": "2017-10-19T21:04:34Z", | |
"hostIP": "172.18.18.103", | |
"phase": "Pending", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Initialized", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
}, | |
{ | |
"status": "False", | |
"lastTransitionTime": "2017-10-19T21:04:34Z", | |
"reason": "ContainersNotReady", | |
"lastProbeTime": null, | |
"message": "containers with unready status: [nginx]", | |
"type": "Ready" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
} | |
] | |
}, | |
"kind": "Pod", | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "default", | |
"schedulerName": "default-scheduler", | |
"serviceAccount": "default", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "default-token-38j41" | |
}, | |
"name": "default-token-38j41" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "nginx", | |
"image": "nginx", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "default-token-38j41" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"imagePullPolicy": "Always", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.103" | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"name": "nginx-4217019353-6ps02", | |
"labels": { | |
"pod-template-hash": "4217019353", | |
"run": "nginx" | |
}, | |
"namespace": "policy-demo", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "nginx-4217019353", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "390", | |
"generateName": "nginx-4217019353-", | |
"creationTimestamp": "2017-10-19T21:04:34Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02", | |
"uid": "1bea5ba6-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:34,581 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:34,581 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:34,581 5 DEBUG Updating pod: policy-demo.nginx-4217019353-6ps02 | |
2017-10-19 21:04:34,581 5 DEBUG Compare labels on policy-demo.nginx-4217019353-6ps02. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'} | |
2017-10-19 21:04:34,581 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-6ps02 with no label change | |
2017-10-19 21:04:34,581 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-6ps02') | |
2017-10-19 21:04:34,581 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:34,581 5 DEBUG Reading from event queue | |
2017-10-19 21:04:35,296 5 DEBUG Read from API: {"type":"ADDED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:04:35,296 5 DEBUG ADDED NetworkPolicy: default-deny to queue (0) (1508447075.3) | |
2017-10-19 21:04:35,296 5 DEBUG Update resourceVersion, was: 327, now: 398 | |
2017-10-19 21:04:35,296 5 DEBUG Read event: ADDED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:35,296 5 DEBUG Processing 'ADDED' for kind 'NetworkPolicy' | |
2017-10-19 21:04:35,297 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'ADDED') | |
2017-10-19 21:04:35,297 5 DEBUG Adding new network policy: policy-demo.default-deny | |
2017-10-19 21:04:35,297 5 DEBUG Calculating pod selector | |
2017-10-19 21:04:35,297 5 DEBUG Selector with 1 filters | |
2017-10-19 21:04:35,297 5 DEBUG Calculating inbound rules | |
2017-10-19 21:04:35,297 5 DEBUG Calculated total set of rules: [] | |
2017-10-19 21:04:35,305 5 DEBUG Updated policy 'policy-demo.default-deny' for NetworkPolicy | |
2017-10-19 21:04:35,305 5 INFO Handled ADDED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:04:35,305 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:35,305 5 DEBUG Reading from event queue | |
2017-10-19 21:04:41,562 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-cndwl","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl","uid":"1be49648-b511-11e7-912d-0800275f1e48","resourceVersion":"412","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.102","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Running","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:41Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"hostIP":"172.18.18.102","podIP":"192.168.154.193","startTime":"2017-10-19T21:04:34Z","containerStatuses":[{"name":"nginx","state":{"running":{"startedAt":"2017-10-19T21:04:41Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"nginx:latest","imageID":"docker-pullable://nginx@sha256:004ac1d5e791e705f12a17c80d7bb1e8f7f01aa7dca7deee6e65a03465392072","containerID":"docker://4da8f606fa6e100f09b02d65bbe6504cdb9bc2d78e395f68c4e5baad273f2808"}],"qosClass":"BestEffort"}}} | |
2017-10-19 21:04:41,562 5 DEBUG MODIFIED Pod: nginx-4217019353-cndwl to queue (0) (1508447081.56) | |
2017-10-19 21:04:41,562 5 DEBUG Update resourceVersion, was: 390, now: 412 | |
2017-10-19 21:04:41,563 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"qosClass": "BestEffort", | |
"containerStatuses": [ | |
{ | |
"restartCount": 0, | |
"name": "nginx", | |
"image": "nginx:latest", | |
"imageID": "docker-pullable://nginx@sha256:004ac1d5e791e705f12a17c80d7bb1e8f7f01aa7dca7deee6e65a03465392072", | |
"state": { | |
"running": { | |
"startedAt": "2017-10-19T21:04:41Z" | |
} | |
}, | |
"ready": true, | |
"lastState": {}, | |
"containerID": "docker://4da8f606fa6e100f09b02d65bbe6504cdb9bc2d78e395f68c4e5baad273f2808" | |
} | |
], | |
"podIP": "192.168.154.193", | |
"startTime": "2017-10-19T21:04:34Z", | |
"hostIP": "172.18.18.102", | |
"phase": "Running", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Initialized", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Ready", | |
"lastTransitionTime": "2017-10-19T21:04:41Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
} | |
] | |
}, | |
"kind": "Pod", | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "default", | |
"schedulerName": "default-scheduler", | |
"serviceAccount": "default", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "default-token-38j41" | |
}, | |
"name": "default-token-38j41" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "nginx", | |
"image": "nginx", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "default-token-38j41" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"imagePullPolicy": "Always", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.102" | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"name": "nginx-4217019353-cndwl", | |
"labels": { | |
"pod-template-hash": "4217019353", | |
"run": "nginx" | |
}, | |
"namespace": "policy-demo", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "nginx-4217019353", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "412", | |
"generateName": "nginx-4217019353-", | |
"creationTimestamp": "2017-10-19T21:04:34Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-cndwl", | |
"uid": "1be49648-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:41,563 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:41,563 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:41,563 5 DEBUG Updating pod: policy-demo.nginx-4217019353-cndwl | |
2017-10-19 21:04:41,563 5 DEBUG Compare labels on policy-demo.nginx-4217019353-cndwl. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'} | |
2017-10-19 21:04:41,563 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-cndwl with no label change | |
2017-10-19 21:04:41,563 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-cndwl') | |
2017-10-19 21:04:41,563 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:41,563 5 DEBUG Reading from event queue | |
2017-10-19 21:04:43,306 5 DEBUG Read from API: {"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"nginx-4217019353-6ps02","generateName":"nginx-4217019353-","namespace":"policy-demo","selfLink":"/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02","uid":"1bea5ba6-b511-11e7-912d-0800275f1e48","resourceVersion":"420","creationTimestamp":"2017-10-19T21:04:34Z","labels":{"pod-template-hash":"4217019353","run":"nginx"},"annotations":{"kubernetes.io/created-by":"{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n"},"ownerReferences":[{"apiVersion":"extensions/v1beta1","kind":"ReplicaSet","name":"nginx-4217019353","uid":"1bdb7ac6-b511-11e7-912d-0800275f1e48","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-token-38j41","secret":{"secretName":"default-token-38j41","defaultMode":420}}],"containers":[{"name":"nginx","image":"nginx","resources":{},"volumeMounts":[{"name":"default-token-38j41","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"Always"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"default","serviceAccount":"default","nodeName":"172.18.18.103","securityContext":{},"schedulerName":"default-scheduler"},"status":{"phase":"Running","conditions":[{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2017-10-19T21:04:34Z"}],"hostIP":"172.18.18.103","podIP":"192.168.44.193","startTime":"2017-10-19T21:04:34Z","containerStatuses":[{"name":"nginx","state":{"running":{"startedAt":"2017-10-19T21:04:43Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"nginx:latest","imageID":"docker-pullable://nginx@sha256:004ac1d5e791e705f12a17c80d7bb1e8f7f01aa7dca7deee6e65a03465392072","containerID":"docker://e489a98391f9886e05a686018e31670d7d503ea2f0959a2d8283789050bd1367"}],"qosClass":"BestEffort"}}} | |
2017-10-19 21:04:43,306 5 DEBUG MODIFIED Pod: nginx-4217019353-6ps02 to queue (0) (1508447083.31) | |
2017-10-19 21:04:43,306 5 DEBUG Update resourceVersion, was: 412, now: 420 | |
2017-10-19 21:04:43,307 5 DEBUG Read event: MODIFIED, Pod, { | |
"status": { | |
"qosClass": "BestEffort", | |
"containerStatuses": [ | |
{ | |
"restartCount": 0, | |
"name": "nginx", | |
"image": "nginx:latest", | |
"imageID": "docker-pullable://nginx@sha256:004ac1d5e791e705f12a17c80d7bb1e8f7f01aa7dca7deee6e65a03465392072", | |
"state": { | |
"running": { | |
"startedAt": "2017-10-19T21:04:43Z" | |
} | |
}, | |
"ready": true, | |
"lastState": {}, | |
"containerID": "docker://e489a98391f9886e05a686018e31670d7d503ea2f0959a2d8283789050bd1367" | |
} | |
], | |
"podIP": "192.168.44.193", | |
"startTime": "2017-10-19T21:04:34Z", | |
"hostIP": "172.18.18.103", | |
"phase": "Running", | |
"conditions": [ | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Initialized", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "Ready", | |
"lastTransitionTime": "2017-10-19T21:04:43Z" | |
}, | |
{ | |
"status": "True", | |
"lastProbeTime": null, | |
"type": "PodScheduled", | |
"lastTransitionTime": "2017-10-19T21:04:34Z" | |
} | |
] | |
}, | |
"kind": "Pod", | |
"spec": { | |
"dnsPolicy": "ClusterFirst", | |
"securityContext": {}, | |
"serviceAccountName": "default", | |
"schedulerName": "default-scheduler", | |
"serviceAccount": "default", | |
"terminationGracePeriodSeconds": 30, | |
"restartPolicy": "Always", | |
"volumes": [ | |
{ | |
"secret": { | |
"defaultMode": 420, | |
"secretName": "default-token-38j41" | |
}, | |
"name": "default-token-38j41" | |
} | |
], | |
"containers": [ | |
{ | |
"terminationMessagePath": "/dev/termination-log", | |
"name": "nginx", | |
"image": "nginx", | |
"volumeMounts": [ | |
{ | |
"readOnly": true, | |
"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", | |
"name": "default-token-38j41" | |
} | |
], | |
"terminationMessagePolicy": "File", | |
"imagePullPolicy": "Always", | |
"resources": {} | |
} | |
], | |
"nodeName": "172.18.18.103" | |
}, | |
"apiVersion": "v1", | |
"metadata": { | |
"name": "nginx-4217019353-6ps02", | |
"labels": { | |
"pod-template-hash": "4217019353", | |
"run": "nginx" | |
}, | |
"namespace": "policy-demo", | |
"ownerReferences": [ | |
{ | |
"kind": "ReplicaSet", | |
"name": "nginx-4217019353", | |
"apiVersion": "extensions/v1beta1", | |
"controller": true, | |
"blockOwnerDeletion": true, | |
"uid": "1bdb7ac6-b511-11e7-912d-0800275f1e48" | |
} | |
], | |
"resourceVersion": "420", | |
"generateName": "nginx-4217019353-", | |
"creationTimestamp": "2017-10-19T21:04:34Z", | |
"annotations": { | |
"kubernetes.io/created-by": "{\"kind\":\"SerializedReference\",\"apiVersion\":\"v1\",\"reference\":{\"kind\":\"ReplicaSet\",\"namespace\":\"policy-demo\",\"name\":\"nginx-4217019353\",\"uid\":\"1bdb7ac6-b511-11e7-912d-0800275f1e48\",\"apiVersion\":\"extensions\",\"resourceVersion\":\"374\"}}\n" | |
}, | |
"selfLink": "/api/v1/namespaces/policy-demo/pods/nginx-4217019353-6ps02", | |
"uid": "1bea5ba6-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:43,307 5 DEBUG Processing 'MODIFIED' for kind 'Pod' | |
2017-10-19 21:04:43,307 5 DEBUG Looking up handler for event: ('Pod', 'MODIFIED') | |
2017-10-19 21:04:43,307 5 DEBUG Updating pod: policy-demo.nginx-4217019353-6ps02 | |
2017-10-19 21:04:43,307 5 DEBUG Compare labels on policy-demo.nginx-4217019353-6ps02. cached: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'}, new: {'pod-template-hash': '4217019353', 'calico/k8s_ns': 'policy-demo', 'run': 'nginx'} | |
2017-10-19 21:04:43,307 5 DEBUG Ignoring updated for policy-demo.nginx-4217019353-6ps02 with no label change | |
2017-10-19 21:04:43,307 5 INFO Handled MODIFIED for Pod: ('policy-demo', 'nginx-4217019353-6ps02') | |
2017-10-19 21:04:43,307 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:43,307 5 DEBUG Reading from event queue | |
2017-10-19 21:04:44,286 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:04:44,288 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:04:44,288 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:04:44,289 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:04:44,317 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:04:45,307 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:04:45,308 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:04:45,309 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:04:45,310 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:04:45,343 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:04:49,214 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:04:49,214 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447089.21) | |
2017-10-19 21:04:49,214 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:49,214 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:04:49,214 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:04:49,214 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:04:49,215 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:04:49,219 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:04:49,221 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:49,221 5 DEBUG Reading from event queue | |
2017-10-19 21:04:53,316 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:04:53,316 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:04:53,316 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:04:53,316 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:04:53,331 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:04:54,326 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:04:54,327 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:04:54,327 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:04:54,327 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:04:54,353 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:04:59,219 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:04:59,220 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:04:59,220 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:04:59,220 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:04:59,249 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:04:59,251 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:04:59,251 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447099.25) | |
2017-10-19 21:04:59,252 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:04:59,252 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:04:59,252 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:04:59,252 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:04:59,255 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:04:59,258 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:04:59,259 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:04:59,259 5 DEBUG Emptied the event queue | |
2017-10-19 21:04:59,259 5 DEBUG Reading from event queue | |
2017-10-19 21:05:03,336 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:05:03,337 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:05:03,337 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:05:03,338 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:05:03,365 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:05:04,357 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:05:04,358 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:05:04,359 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:05:04,359 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:05:04,387 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:05:09,266 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:05:09,266 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:05:09,266 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:05:09,266 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:05:09,275 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:05:09,275 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:05:09,275 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447109.28) | |
2017-10-19 21:05:09,275 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:05:09,275 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:05:09,275 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:05:09,275 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:05:09,275 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:05:09,278 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:05:09,278 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:05:09,278 5 DEBUG Emptied the event queue | |
2017-10-19 21:05:09,278 5 DEBUG Reading from event queue | |
2017-10-19 21:05:13,380 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:05:13,380 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:05:13,380 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:05:13,380 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:05:13,399 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:05:14,396 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:05:14,398 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:05:14,398 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:05:14,399 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:05:14,435 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:05:19,284 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:05:19,286 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:05:19,287 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:05:19,288 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:05:19,316 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:05:19,317 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:05:19,317 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447119.32) | |
2017-10-19 21:05:19,317 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:05:19,317 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:05:19,317 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:05:19,317 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:05:19,318 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:05:19,320 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:05:19,320 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:05:19,320 5 DEBUG Emptied the event queue | |
2017-10-19 21:05:19,320 5 DEBUG Reading from event queue | |
2017-10-19 21:05:23,406 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:05:23,407 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:05:23,410 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:05:23,410 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:05:23,444 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:05:24,436 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:05:24,437 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:05:24,437 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:05:24,439 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:05:24,467 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:05:29,326 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:05:29,327 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:05:29,327 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:05:29,327 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:05:29,356 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:05:29,360 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:05:29,361 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447129.36) | |
2017-10-19 21:05:29,361 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:05:29,362 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:05:29,362 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:05:29,362 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:05:29,361 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:05:29,366 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:05:29,366 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:05:29,366 5 DEBUG Emptied the event queue | |
2017-10-19 21:05:29,367 5 DEBUG Reading from event queue | |
2017-10-19 21:05:33,451 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:05:33,451 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:05:33,452 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:05:33,452 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:05:33,480 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:05:34,476 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:05:34,478 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:05:34,478 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:05:34,478 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:05:34,508 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:05:39,367 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:05:39,368 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:05:39,369 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:05:39,369 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:05:39,397 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:05:39,397 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:05:39,398 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447139.4) | |
2017-10-19 21:05:39,398 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:05:39,398 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:05:39,398 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:05:39,398 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:05:39,398 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:05:39,402 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:05:39,403 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:05:39,403 5 DEBUG Emptied the event queue | |
2017-10-19 21:05:39,403 5 DEBUG Reading from event queue | |
2017-10-19 21:05:43,486 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:05:43,487 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:05:43,487 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:05:43,487 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:05:43,513 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:05:44,515 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:05:44,515 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:05:44,517 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:05:44,517 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:05:44,546 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:05:49,406 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:05:49,406 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:05:49,406 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:05:49,406 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:05:49,417 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:05:49,417 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:05:49,417 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447149.42) | |
2017-10-19 21:05:49,418 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:05:49,418 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:05:49,418 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:05:49,418 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:05:49,418 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:05:49,419 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:05:49,419 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:05:49,419 5 DEBUG Emptied the event queue | |
2017-10-19 21:05:49,419 5 DEBUG Reading from event queue | |
2017-10-19 21:05:53,517 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:05:53,519 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:05:53,519 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:05:53,519 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:05:53,547 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:05:54,556 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:05:54,557 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:05:54,557 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:05:54,559 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:05:54,572 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:05:59,426 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:05:59,427 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:05:59,429 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:05:59,431 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:05:59,456 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:05:59,457 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:05:59,457 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447159.46) | |
2017-10-19 21:05:59,457 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:05:59,458 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:05:59,458 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:05:59,458 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:05:59,459 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:05:59,461 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:05:59,461 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:05:59,461 5 DEBUG Emptied the event queue | |
2017-10-19 21:05:59,461 5 DEBUG Reading from event queue | |
2017-10-19 21:06:03,550 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:06:03,550 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:06:03,551 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:06:03,551 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:06:03,568 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:06:04,580 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:06:04,580 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:06:04,580 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:06:04,580 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:06:04,591 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:06:09,466 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:06:09,468 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:06:09,468 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:06:09,469 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:06:09,495 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:06:09,496 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:06:09,496 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447169.5) | |
2017-10-19 21:06:09,497 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:06:09,497 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:06:09,498 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:06:09,498 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:06:09,500 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:06:09,503 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:06:09,504 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:06:09,504 5 DEBUG Emptied the event queue | |
2017-10-19 21:06:09,504 5 DEBUG Reading from event queue | |
2017-10-19 21:06:13,580 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:06:13,580 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:06:13,581 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:06:13,581 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:06:13,612 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:06:14,597 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:06:14,598 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:06:14,599 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:06:14,599 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:06:14,628 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:06:19,506 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:06:19,506 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:06:19,506 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:06:19,506 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:06:19,538 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:06:19,539 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:06:19,540 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447179.54) | |
2017-10-19 21:06:19,540 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:06:19,540 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:06:19,541 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:06:19,541 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:06:19,543 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:06:19,546 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:06:19,547 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:06:19,547 5 DEBUG Emptied the event queue | |
2017-10-19 21:06:19,547 5 DEBUG Reading from event queue | |
2017-10-19 21:06:23,616 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:06:23,617 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:06:23,617 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:06:23,617 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:06:23,645 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:06:24,633 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:06:24,635 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:06:24,635 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:06:24,636 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:06:24,661 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:06:29,546 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:06:29,546 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:06:29,546 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:06:29,547 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:06:29,556 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:06:29,556 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:06:29,556 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447189.56) | |
2017-10-19 21:06:29,556 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:06:29,556 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:06:29,557 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:06:29,557 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:06:29,556 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:06:29,559 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:06:29,559 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:06:29,559 5 DEBUG Emptied the event queue | |
2017-10-19 21:06:29,559 5 DEBUG Reading from event queue | |
2017-10-19 21:06:33,657 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:06:33,658 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:06:33,659 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:06:33,660 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:06:33,687 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:06:34,666 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:06:34,667 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:06:34,667 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:06:34,669 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:06:34,698 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:06:39,567 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:06:39,567 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:06:39,567 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:06:39,569 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:06:39,597 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:06:39,598 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:06:39,598 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447199.6) | |
2017-10-19 21:06:39,599 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:06:39,600 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:06:39,600 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:06:39,600 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:06:39,602 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:06:39,607 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:06:39,607 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:06:39,607 5 DEBUG Emptied the event queue | |
2017-10-19 21:06:39,607 5 DEBUG Reading from event queue | |
2017-10-19 21:06:43,696 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:06:43,697 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:06:43,697 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:06:43,697 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:06:43,711 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:06:44,706 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:06:44,707 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:06:44,707 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:06:44,707 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:06:44,715 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:06:49,606 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:06:49,607 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:06:49,607 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:06:49,608 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:06:49,635 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:06:49,637 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:06:49,638 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447209.64) | |
2017-10-19 21:06:49,640 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:06:49,640 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:06:49,640 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:06:49,640 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:06:49,643 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:06:49,646 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:06:49,647 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:06:49,647 5 DEBUG Emptied the event queue | |
2017-10-19 21:06:49,647 5 DEBUG Reading from event queue | |
2017-10-19 21:06:53,716 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:06:53,717 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:06:53,717 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:06:53,717 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:06:53,745 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:06:54,716 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:06:54,717 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:06:54,717 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:06:54,717 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:06:54,746 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:06:59,646 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:06:59,647 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:06:59,647 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:06:59,647 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:06:59,675 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:06:59,675 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:06:59,676 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447219.68) | |
2017-10-19 21:06:59,676 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:06:59,676 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:06:59,676 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:06:59,677 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:06:59,677 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:06:59,679 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:06:59,679 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:06:59,679 5 DEBUG Emptied the event queue | |
2017-10-19 21:06:59,680 5 DEBUG Reading from event queue | |
2017-10-19 21:07:03,745 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:07:03,746 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:07:03,746 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:07:03,746 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:07:03,754 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:07:04,756 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:07:04,757 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:07:04,757 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:07:04,757 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:07:04,791 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:07:09,686 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:07:09,687 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:07:09,687 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:07:09,687 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:07:09,714 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:07:09,716 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:07:09,716 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447229.72) | |
2017-10-19 21:07:09,717 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:07:09,717 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:07:09,717 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:07:09,717 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:07:09,720 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:07:09,723 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:07:09,724 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:07:09,724 5 DEBUG Emptied the event queue | |
2017-10-19 21:07:09,724 5 DEBUG Reading from event queue | |
2017-10-19 21:07:13,755 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:07:13,756 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:07:13,757 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:07:13,758 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:07:13,784 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:07:14,797 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:07:14,797 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:07:14,797 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:07:14,798 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:07:14,824 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:07:19,729 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:07:19,731 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:07:19,731 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:07:19,731 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:07:19,759 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:07:19,760 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:07:19,760 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447239.76) | |
2017-10-19 21:07:19,761 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:07:19,761 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:07:19,761 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:07:19,761 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:07:19,760 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:07:19,767 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:07:19,768 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:07:19,768 5 DEBUG Emptied the event queue | |
2017-10-19 21:07:19,768 5 DEBUG Reading from event queue | |
2017-10-19 21:07:23,786 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:07:23,787 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:07:23,787 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:07:23,787 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:07:23,819 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:07:24,834 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:07:24,835 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:07:24,835 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:07:24,836 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:07:24,862 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:07:29,767 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:07:29,767 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:07:29,769 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:07:29,769 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:07:29,796 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:07:29,796 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:07:29,797 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447249.8) | |
2017-10-19 21:07:29,797 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:07:29,797 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:07:29,797 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:07:29,797 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:07:29,797 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:07:29,801 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:07:29,801 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:07:29,801 5 DEBUG Emptied the event queue | |
2017-10-19 21:07:29,801 5 DEBUG Reading from event queue | |
2017-10-19 21:07:33,826 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:07:33,827 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:07:33,827 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:07:33,828 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:07:33,854 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:07:34,871 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:07:34,871 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:07:34,873 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:07:34,873 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:07:34,898 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:07:39,805 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:07:39,806 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:07:39,806 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:07:39,806 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:07:39,828 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:07:39,828 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:07:39,829 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447259.83) | |
2017-10-19 21:07:39,829 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:07:39,829 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:07:39,829 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:07:39,829 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:07:39,830 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:07:39,831 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:07:39,831 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:07:39,831 5 DEBUG Emptied the event queue | |
2017-10-19 21:07:39,831 5 DEBUG Reading from event queue | |
2017-10-19 21:07:43,856 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:07:43,857 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:07:43,857 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:07:43,859 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:07:43,884 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:07:44,906 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:07:44,907 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:07:44,907 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:07:44,907 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:07:44,938 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:07:49,836 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:07:49,836 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:07:49,836 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:07:49,837 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:07:49,865 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:07:49,867 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:07:49,867 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447269.87) | |
2017-10-19 21:07:49,868 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:07:49,868 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:07:49,868 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:07:49,868 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:07:49,870 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:07:49,873 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:07:49,874 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:07:49,874 5 DEBUG Emptied the event queue | |
2017-10-19 21:07:49,874 5 DEBUG Reading from event queue | |
2017-10-19 21:07:53,886 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:07:53,887 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:07:53,887 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:07:53,887 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:07:53,916 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:07:54,946 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:07:54,947 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:07:54,947 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:07:54,948 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:07:54,975 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:07:59,882 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:07:59,882 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:07:59,882 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:07:59,882 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:07:59,912 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:07:59,913 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:07:59,913 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447279.91) | |
2017-10-19 21:07:59,914 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:07:59,914 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:07:59,914 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:07:59,915 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:07:59,917 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:07:59,919 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:07:59,920 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:07:59,920 5 DEBUG Emptied the event queue | |
2017-10-19 21:07:59,920 5 DEBUG Reading from event queue | |
2017-10-19 21:08:03,926 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:08:03,927 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:08:03,927 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:08:03,928 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:08:03,955 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:08:04,986 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:08:04,987 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:08:04,989 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:08:04,990 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:08:05,019 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:08:09,927 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:08:09,927 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:08:09,927 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:08:09,928 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:08:09,958 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:08:09,960 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:08:09,960 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447289.96) | |
2017-10-19 21:08:09,961 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:08:09,961 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:08:09,961 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:08:09,961 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:08:09,964 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:08:09,967 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:08:09,967 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:08:09,967 5 DEBUG Emptied the event queue | |
2017-10-19 21:08:09,968 5 DEBUG Reading from event queue | |
2017-10-19 21:08:13,966 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:08:13,967 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:08:13,969 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:08:13,969 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:08:13,996 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:08:15,027 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:08:15,029 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:08:15,029 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:08:15,029 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:08:15,056 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:08:19,969 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:08:19,970 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:08:19,970 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:08:19,970 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:08:19,999 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:08:20,000 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:08:20,001 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447300.0) | |
2017-10-19 21:08:20,005 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:08:20,005 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:08:20,005 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:08:20,005 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:08:20,001 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:08:20,010 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:08:20,011 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:08:20,011 5 DEBUG Emptied the event queue | |
2017-10-19 21:08:20,011 5 DEBUG Reading from event queue | |
2017-10-19 21:08:24,007 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:08:24,008 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:08:24,009 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:08:24,009 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:08:24,036 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:08:25,066 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:08:25,067 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:08:25,067 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:08:25,067 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:08:25,092 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:08:30,016 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:08:30,017 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:08:30,018 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:08:30,019 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:08:30,031 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:08:30,032 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:08:30,032 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447310.03) | |
2017-10-19 21:08:30,032 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:08:30,032 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:08:30,032 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:08:30,032 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:08:30,032 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:08:30,035 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:08:30,035 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:08:30,035 5 DEBUG Emptied the event queue | |
2017-10-19 21:08:30,035 5 DEBUG Reading from event queue | |
2017-10-19 21:08:34,046 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:08:34,048 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:08:34,049 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:08:34,049 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:08:34,078 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:08:35,099 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:08:35,099 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:08:35,099 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:08:35,099 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:08:35,108 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:08:40,036 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:08:40,037 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:08:40,037 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:08:40,038 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:08:40,066 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:08:40,066 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:08:40,067 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447320.07) | |
2017-10-19 21:08:40,067 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:08:40,067 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:08:40,067 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:08:40,067 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:08:40,068 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:08:40,070 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:08:40,070 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:08:40,070 5 DEBUG Emptied the event queue | |
2017-10-19 21:08:40,070 5 DEBUG Reading from event queue | |
2017-10-19 21:08:44,094 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:08:44,095 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:08:44,095 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:08:44,095 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:08:44,124 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:08:45,116 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:08:45,117 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:08:45,118 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:08:45,119 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:08:45,146 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:08:50,127 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:08:50,128 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:08:50,128 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:08:50,128 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:08:50,136 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:08:50,136 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:08:50,136 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447330.14) | |
2017-10-19 21:08:50,137 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:08:50,137 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:08:50,137 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:08:50,137 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:08:50,138 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:08:50,139 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:08:50,139 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:08:50,139 5 DEBUG Emptied the event queue | |
2017-10-19 21:08:50,139 5 DEBUG Reading from event queue | |
2017-10-19 21:08:54,128 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:08:54,129 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:08:54,129 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:08:54,129 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:08:54,159 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:08:55,156 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:08:55,157 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:08:55,157 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:08:55,157 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:08:55,185 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:09:00,146 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:09:00,147 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:09:00,147 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:09:00,147 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:09:00,175 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:09:00,175 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:09:00,176 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447340.18) | |
2017-10-19 21:09:00,176 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:09:00,176 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:09:00,176 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:09:00,176 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:09:00,177 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:09:00,180 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:09:00,180 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:09:00,180 5 DEBUG Emptied the event queue | |
2017-10-19 21:09:00,180 5 DEBUG Reading from event queue | |
2017-10-19 21:09:04,166 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:09:04,167 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:09:04,167 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:09:04,168 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:09:04,195 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:09:05,187 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:09:05,187 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:09:05,187 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:09:05,188 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:09:05,219 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:09:10,186 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:09:10,187 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:09:10,187 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:09:10,187 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:09:10,214 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:09:10,216 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:09:10,217 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447350.22) | |
2017-10-19 21:09:10,217 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:09:10,217 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:09:10,218 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:09:10,218 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:09:10,217 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:09:10,223 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:09:10,224 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:09:10,224 5 DEBUG Emptied the event queue | |
2017-10-19 21:09:10,224 5 DEBUG Reading from event queue | |
2017-10-19 21:09:14,196 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:09:14,197 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:09:14,197 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:09:14,198 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:09:14,224 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:09:15,226 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:09:15,227 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:09:15,227 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:09:15,227 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:09:15,254 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:09:20,226 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:09:20,226 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:09:20,226 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:09:20,226 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:09:20,241 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:09:20,242 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:09:20,243 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447360.24) | |
2017-10-19 21:09:20,243 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:09:20,243 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:09:20,243 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:09:20,243 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:09:20,243 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:09:20,246 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:09:20,246 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:09:20,247 5 DEBUG Emptied the event queue | |
2017-10-19 21:09:20,247 5 DEBUG Reading from event queue | |
2017-10-19 21:09:24,237 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:09:24,237 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:09:24,238 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:09:24,238 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:09:24,266 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:09:25,261 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:09:25,262 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:09:25,262 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:09:25,262 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:09:25,301 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:09:30,246 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:09:30,246 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:09:30,246 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:09:30,246 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:09:30,258 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:09:30,259 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:09:30,259 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447370.26) | |
2017-10-19 21:09:30,259 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:09:30,259 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:09:30,260 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:09:30,260 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:09:30,261 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:09:30,263 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:09:30,263 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:09:30,263 5 DEBUG Emptied the event queue | |
2017-10-19 21:09:30,264 5 DEBUG Reading from event queue | |
2017-10-19 21:09:34,276 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:09:34,278 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:09:34,278 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:09:34,278 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:09:34,306 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:09:35,306 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:09:35,307 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:09:35,307 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:09:35,307 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:09:35,334 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:09:40,267 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:09:40,268 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:09:40,268 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:09:40,268 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:09:40,297 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:09:40,298 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:09:40,299 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447380.3) | |
2017-10-19 21:09:40,299 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:09:40,299 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:09:40,300 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:09:40,300 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:09:40,301 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:09:40,305 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:09:40,305 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:09:40,307 5 DEBUG Emptied the event queue | |
2017-10-19 21:09:40,307 5 DEBUG Reading from event queue | |
2017-10-19 21:09:44,316 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:09:44,317 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:09:44,317 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:09:44,317 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:09:44,349 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:09:45,336 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:09:45,337 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:09:45,337 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:09:45,337 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:09:45,365 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:09:50,306 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:09:50,307 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:09:50,307 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:09:50,307 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:09:50,336 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:09:50,337 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:09:50,338 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447390.34) | |
2017-10-19 21:09:50,339 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:09:50,341 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:09:50,341 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:09:50,341 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:09:50,343 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:09:50,347 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:09:50,348 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:09:50,349 5 DEBUG Emptied the event queue | |
2017-10-19 21:09:50,349 5 DEBUG Reading from event queue | |
2017-10-19 21:09:54,356 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:09:54,357 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:09:54,357 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:09:54,357 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:09:54,387 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:09:55,370 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:09:55,371 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:09:55,371 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:09:55,371 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:09:55,382 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:10:00,353 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:10:00,353 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:10:00,353 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:10:00,353 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:10:00,361 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:10:00,361 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:10:00,361 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447400.36) | |
2017-10-19 21:10:00,362 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:10:00,362 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:10:00,362 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:10:00,362 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:10:00,362 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:10:00,364 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:10:00,364 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:10:00,364 5 DEBUG Emptied the event queue | |
2017-10-19 21:10:00,364 5 DEBUG Reading from event queue | |
2017-10-19 21:10:04,395 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:10:04,396 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:10:04,396 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:10:04,396 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:10:04,404 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:10:05,386 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:10:05,387 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:10:05,387 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:10:05,387 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:10:05,414 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:10:10,365 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:10:10,366 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:10:10,366 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:10:10,366 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:10:10,374 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:10:10,374 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:10:10,374 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447410.37) | |
2017-10-19 21:10:10,374 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:10:10,374 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:10:10,374 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:10:10,374 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:10:10,374 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:10:10,376 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:10:10,376 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:10:10,376 5 DEBUG Emptied the event queue | |
2017-10-19 21:10:10,376 5 DEBUG Reading from event queue | |
2017-10-19 21:10:14,406 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:10:14,406 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:10:14,407 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:10:14,407 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:10:14,414 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:10:15,415 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:10:15,416 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:10:15,416 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:10:15,416 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:10:15,424 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:10:20,381 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:10:20,381 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:10:20,381 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:10:20,381 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:10:20,389 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:10:20,389 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:10:20,389 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447420.39) | |
2017-10-19 21:10:20,389 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:10:20,389 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:10:20,389 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:10:20,389 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:10:20,389 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:10:20,392 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:10:20,392 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:10:20,392 5 DEBUG Emptied the event queue | |
2017-10-19 21:10:20,392 5 DEBUG Reading from event queue | |
2017-10-19 21:10:24,415 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:10:24,416 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:10:24,416 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:10:24,416 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:10:24,424 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:10:25,426 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:10:25,426 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:10:25,426 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:10:25,426 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:10:25,435 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:10:30,395 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:10:30,396 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:10:30,396 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:10:30,396 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:10:30,404 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:10:30,404 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:10:30,404 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447430.4) | |
2017-10-19 21:10:30,405 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:10:30,405 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:10:30,405 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:10:30,405 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:10:30,405 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:10:30,406 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:10:30,407 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:10:30,407 5 DEBUG Emptied the event queue | |
2017-10-19 21:10:30,407 5 DEBUG Reading from event queue | |
2017-10-19 21:10:34,426 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:10:34,426 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:10:34,426 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:10:34,427 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:10:34,434 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:10:35,445 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:10:35,446 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:10:35,446 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:10:35,446 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:10:35,455 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:10:40,406 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:10:40,407 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:10:40,407 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:10:40,407 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:10:40,433 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:10:40,434 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:10:40,434 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447440.43) | |
2017-10-19 21:10:40,435 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:10:40,435 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:10:40,435 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:10:40,436 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:10:40,438 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:10:40,442 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:10:40,442 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:10:40,442 5 DEBUG Emptied the event queue | |
2017-10-19 21:10:40,442 5 DEBUG Reading from event queue | |
2017-10-19 21:10:44,439 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:10:44,439 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:10:44,440 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:10:44,440 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:10:44,467 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:10:45,463 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:10:45,464 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:10:45,464 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:10:45,464 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:10:45,497 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:10:50,450 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:10:50,450 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:10:50,450 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:10:50,451 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:10:50,479 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:10:50,483 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:10:50,483 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447450.48) | |
2017-10-19 21:10:50,484 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:10:50,484 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:10:50,485 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:10:50,485 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:10:50,487 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:10:50,491 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:10:50,491 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:10:50,491 5 DEBUG Emptied the event queue | |
2017-10-19 21:10:50,492 5 DEBUG Reading from event queue | |
2017-10-19 21:10:54,479 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:10:54,479 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:10:54,480 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:10:54,480 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:10:54,510 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:10:55,500 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:10:55,501 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:10:55,501 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:10:55,501 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:10:55,531 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:11:00,499 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:11:00,499 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:11:00,499 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:11:00,499 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:11:00,511 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:11:00,511 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:11:00,511 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447460.51) | |
2017-10-19 21:11:00,512 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:11:00,512 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:11:00,512 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:11:00,512 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:11:00,512 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:11:00,514 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:11:00,514 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:11:00,514 5 DEBUG Emptied the event queue | |
2017-10-19 21:11:00,514 5 DEBUG Reading from event queue | |
2017-10-19 21:11:04,521 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:11:04,521 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:11:04,522 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:11:04,522 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:11:04,630 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:11:05,542 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:11:05,542 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:11:05,542 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:11:05,542 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:11:05,552 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:11:10,524 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:11:10,524 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:11:10,524 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:11:10,524 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:11:10,537 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:11:10,538 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:11:10,538 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447470.54) | |
2017-10-19 21:11:10,538 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:11:10,539 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:11:10,539 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:11:10,539 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:11:10,538 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:11:10,541 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:11:10,541 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:11:10,541 5 DEBUG Emptied the event queue | |
2017-10-19 21:11:10,541 5 DEBUG Reading from event queue | |
2017-10-19 21:11:14,640 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:11:14,640 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:11:14,640 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:11:14,640 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:11:14,651 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:11:15,564 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:11:15,564 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:11:15,564 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:11:15,564 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:11:15,580 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:11:20,554 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:11:20,554 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:11:20,554 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:11:20,554 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:11:20,563 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:11:20,563 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:11:20,563 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447480.56) | |
2017-10-19 21:11:20,574 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:11:20,574 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:11:20,574 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:11:20,574 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:11:20,574 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:11:20,586 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:11:20,586 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:11:20,586 5 DEBUG Emptied the event queue | |
2017-10-19 21:11:20,586 5 DEBUG Reading from event queue | |
2017-10-19 21:11:24,662 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:11:24,662 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:11:24,662 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:11:24,662 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:11:24,673 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:11:25,586 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:11:25,586 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:11:25,586 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:11:25,586 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:11:25,594 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> | |
2017-10-19 21:11:30,581 5 DEBUG Normal read time out for NetworkPolicy | |
2017-10-19 21:11:30,581 5 DEBUG Restarting watch on resource: NetworkPolicy | |
2017-10-19 21:11:30,581 5 DEBUG Starting watch on: https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies | |
2017-10-19 21:11:30,581 5 DEBUG Getting API resources 'https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies' at version '398'. stream=True | |
2017-10-19 21:11:30,589 5 DEBUG Watch response for https://kubernetes.default:443/apis/extensions/v1beta1/watch/networkpolicies: <Response [200]> | |
2017-10-19 21:11:30,589 5 DEBUG Read from API: {"type":"DELETED","object":{"kind":"NetworkPolicy","apiVersion":"extensions/v1beta1","metadata":{"name":"default-deny","namespace":"policy-demo","selfLink":"/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny","uid":"1c5bc843-b511-11e7-912d-0800275f1e48","resourceVersion":"398","generation":1,"creationTimestamp":"2017-10-19T21:04:35Z"},"spec":{"podSelector":{}}}} | |
2017-10-19 21:11:30,590 5 DEBUG DELETED NetworkPolicy: default-deny to queue (0) (1508447490.59) | |
2017-10-19 21:11:30,590 5 DEBUG Update resourceVersion, was: 398, now: 398 | |
2017-10-19 21:11:30,590 5 DEBUG Read event: DELETED, NetworkPolicy, { | |
"kind": "NetworkPolicy", | |
"spec": { | |
"podSelector": {} | |
}, | |
"apiVersion": "extensions/v1beta1", | |
"metadata": { | |
"name": "default-deny", | |
"generation": 1, | |
"namespace": "policy-demo", | |
"resourceVersion": "398", | |
"creationTimestamp": "2017-10-19T21:04:35Z", | |
"selfLink": "/apis/extensions/v1beta1/namespaces/policy-demo/networkpolicies/default-deny", | |
"uid": "1c5bc843-b511-11e7-912d-0800275f1e48" | |
} | |
} | |
2017-10-19 21:11:30,590 5 DEBUG Processing 'DELETED' for kind 'NetworkPolicy' | |
2017-10-19 21:11:30,590 5 DEBUG Looking up handler for event: ('NetworkPolicy', 'DELETED') | |
2017-10-19 21:11:30,590 5 DEBUG Deleting network policy: policy-demo.default-deny | |
2017-10-19 21:11:30,592 5 INFO Unable to find policy 'policy-demo.default-deny' - already deleted | |
2017-10-19 21:11:30,592 5 INFO Handled DELETED for NetworkPolicy: ('policy-demo', 'default-deny') | |
2017-10-19 21:11:30,592 5 DEBUG Emptied the event queue | |
2017-10-19 21:11:30,592 5 DEBUG Reading from event queue | |
2017-10-19 21:11:34,682 5 DEBUG Normal read time out for Pod | |
2017-10-19 21:11:34,682 5 DEBUG Restarting watch on resource: Pod | |
2017-10-19 21:11:34,682 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/pods | |
2017-10-19 21:11:34,683 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/pods' at version '420'. stream=True | |
2017-10-19 21:11:34,716 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/pods: <Response [200]> | |
2017-10-19 21:11:35,605 5 DEBUG Normal read time out for Namespace | |
2017-10-19 21:11:35,605 5 DEBUG Restarting watch on resource: Namespace | |
2017-10-19 21:11:35,605 5 DEBUG Starting watch on: https://kubernetes.default:443/api/v1/watch/namespaces | |
2017-10-19 21:11:35,605 5 DEBUG Getting API resources 'https://kubernetes.default:443/api/v1/watch/namespaces' at version '369'. stream=True | |
2017-10-19 21:11:35,613 5 DEBUG Watch response for https://kubernetes.default:443/api/v1/watch/namespaces: <Response [200]> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment