Created
November 27, 2019 13:48
-
-
Save irizzant/bd9b6d896052a99e1b9bdb530bbc8416 to your computer and use it in GitHub Desktop.
Output of ansible
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Using /home/kubespray/kubespray/ansible.cfg as config file | |
/home/kubespray/kubespray/inventory/prod/hosts.yaml did not meet host_list requirements, check plugin documentation if this is unexpected | |
/home/kubespray/kubespray/inventory/prod/hosts.yaml did not meet script requirements, check plugin documentation if this is unexpected | |
PLAY [localhost] **************************************************************************************************************************************************************************** | |
[WARNING]: Could not match supplied host pattern, ignoring: bastion | |
PLAY [bastion[0]] *************************************************************************************************************************************************************************** | |
skipping: no hosts matched | |
PLAY [k8s-cluster:etcd] ********************************************************************************************************************************************************************* | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:49 +0000 (0:00:00.155) 0:00:00.155 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
PLAY [k8s-cluster:etcd] ********************************************************************************************************************************************************************* | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:49 +0000 (0:00:00.362) 0:00:00.518 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes/preinstall : Create kubernetes directories] ******************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:50 +0000 (0:00:00.311) 0:00:00.830 **** | |
ok: [sdbfi-k8s-worker1] => (item=/usr/local/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin", "mode": "0755", "owner": "kube", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master1] => (item=/usr/local/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin", "mode": "0755", "owner": "kube", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker2] => (item=/usr/local/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin", "mode": "0755", "owner": "kube", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master2] => (item=/usr/local/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin", "mode": "0755", "owner": "kube", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master3] => (item=/usr/local/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin", "mode": "0755", "owner": "kube", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker2] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker1] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master2] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master3] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master1] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker2] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master2] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master1] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master3] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker1] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker1] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master2] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker2] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master1] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master3] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker1] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master1] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master3] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker2] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master2] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker1] => (item=/usr/libexec/kubernetes/kubelet-plugins/volume/exec) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "mode": "0755", "owner": "kube", "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker2] => (item=/usr/libexec/kubernetes/kubelet-plugins/volume/exec) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "mode": "0755", "owner": "kube", "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master1] => (item=/usr/libexec/kubernetes/kubelet-plugins/volume/exec) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "mode": "0755", "owner": "kube", "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master3] => (item=/usr/libexec/kubernetes/kubelet-plugins/volume/exec) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "mode": "0755", "owner": "kube", "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-master2] => (item=/usr/libexec/kubernetes/kubelet-plugins/volume/exec) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "mode": "0755", "owner": "kube", "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker3] => (item=/usr/local/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin", "mode": "0755", "owner": "kube", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker3] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker3] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker3] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker3] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
ok: [sdbfi-k8s-worker3] => (item=/usr/libexec/kubernetes/kubelet-plugins/volume/exec) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "mode": "0755", "owner": "kube", "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "size": 4096, "state": "directory", "uid": 999} | |
[WARNING]: flush_handlers task does not support when conditional | |
PLAY [etcd] ********************************************************************************************************************************************************************************* | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:54 +0000 (0:00:04.035) 0:00:04.865 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
PLAY [k8s-cluster] ************************************************************************************************************************************************************************** | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:54 +0000 (0:00:00.309) 0:00:05.174 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
PLAY [k8s-cluster] ************************************************************************************************************************************************************************** | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:54 +0000 (0:00:00.399) 0:00:05.574 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
PLAY [kube-master] ************************************************************************************************************************************************************************** | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:55 +0000 (0:00:00.464) 0:00:06.039 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
PLAY [k8s-cluster] ************************************************************************************************************************************************************************** | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:55 +0000 (0:00:00.279) 0:00:06.319 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
PLAY [calico-rr] **************************************************************************************************************************************************************************** | |
skipping: no hosts matched | |
PLAY [kube-master[0]] *********************************************************************************************************************************************************************** | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:56 +0000 (0:00:00.676) 0:00:06.995 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
PLAY [kube-master] ************************************************************************************************************************************************************************** | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:28:56 +0000 (0:00:00.203) 0:00:07.199 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Create addon dir] *************************************************************************************** | |
Wednesday 27 November 2019 13:28:56 +0000 (0:00:00.176) 0:00:07.376 **** | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Templates list] ***************************************************************************************** | |
Wednesday 27 November 2019 13:28:56 +0000 (0:00:00.144) 0:00:07.520 **** | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Append extra templates to NGINX Ingress Templates list for PodSecurityPolicy] *************************** | |
Wednesday 27 November 2019 13:28:56 +0000 (0:00:00.182) 0:00:07.703 **** | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Create manifests] *************************************************************************************** | |
Wednesday 27 November 2019 13:28:57 +0000 (0:00:00.198) 0:00:07.902 **** | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Apply manifests] **************************************************************************************** | |
Wednesday 27 November 2019 13:28:57 +0000 (0:00:00.204) 0:00:08.106 **** | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Remove legacy addon dir and manifests] ******************************************************************************* | |
Wednesday 27 November 2019 13:28:57 +0000 (0:00:00.230) 0:00:08.337 **** | |
changed: [sdbfi-k8s-master2] => {"changed": true, "path": "/etc/kubernetes/addons/cert_manager", "state": "absent"} | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Remove legacy namespace] ********************************************************************************************* | |
Wednesday 27 November 2019 13:28:57 +0000 (0:00:00.395) 0:00:08.733 **** | |
changed: [sdbfi-k8s-master2] => {"changed": true, "cmd": "/usr/local/bin/kubectl delete namespace cert-manager", "delta": "0:00:11.535217", "end": "2019-11-27 13:29:09.962026", "rc": 0, "start": "2019-11-27 13:28:58.426809", "stderr": "", "stderr_lines": [], "stdout": "namespace \"cert-manager\" deleted", "stdout_lines": ["namespace \"cert-manager\" deleted"]} | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Create addon dir] **************************************************************************************************** | |
Wednesday 27 November 2019 13:29:10 +0000 (0:00:12.068) 0:00:20.801 **** | |
changed: [sdbfi-k8s-master2] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/cert_manager", "size": 4096, "state": "directory", "uid": 0} | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Create manifests] **************************************************************************************************** | |
Wednesday 27 November 2019 13:29:10 +0000 (0:00:00.388) 0:00:21.190 **** | |
changed: [sdbfi-k8s-master2] => (item={'name': '00-namespace', 'file': '00-namespace.yml', 'type': 'ns'}) => {"changed": true, "checksum": "d4a91f027b4906a4c93f6d77d034f032ad5d16c3", "dest": "/etc/kubernetes/addons/cert_manager/00-namespace.yml", "gid": 0, "group": "root", "item": {"file": "00-namespace.yml", "name": "00-namespace", "type": "ns"}, "md5sum": "c9de0392e875335280b44ce64c031619", "mode": "0644", "owner": "root", "size": 149, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861350.5567663-22317132250024/source", "state": "file", "uid": 0} | |
changed: [sdbfi-k8s-master2] => (item={'name': 'sa-cert-manager', 'file': 'sa-cert-manager.yml', 'type': 'sa'}) => {"changed": true, "checksum": "96da2978146acbb377c9561c1cbf3171e75eea6e", "dest": "/etc/kubernetes/addons/cert_manager/sa-cert-manager.yml", "gid": 0, "group": "root", "item": {"file": "sa-cert-manager.yml", "name": "sa-cert-manager", "type": "sa"}, "md5sum": "0470f6672e6e839b6a500f0222411872", "mode": "0644", "owner": "root", "size": 207, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861351.621263-243686374670055/source", "state": "file", "uid": 0} | |
changed: [sdbfi-k8s-master2] => (item={'name': 'crd-certificate', 'file': 'crd-certificate.yml', 'type': 'crd'}) => {"changed": true, "checksum": "e63635a84e51136d3d0500db3f4d5dd8b7a98037", "dest": "/etc/kubernetes/addons/cert_manager/crd-certificate.yml", "gid": 0, "group": "root", "item": {"file": "crd-certificate.yml", "name": "crd-certificate", "type": "crd"}, "md5sum": "9cec39e0fede11698cf9671c375880da", "mode": "0644", "owner": "root", "size": 463, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.2312174-40119587312324/source", "state": "file", "uid": 0} | |
changed: [sdbfi-k8s-master2] => (item={'name': 'crd-clusterissuer', 'file': 'crd-clusterissuer.yml', 'type': 'crd'}) => {"changed": true, "checksum": "05f8f1a27b2b6d127f3f0f6f8fdcec83f560f140", "dest": "/etc/kubernetes/addons/cert_manager/crd-clusterissuer.yml", "gid": 0, "group": "root", "item": {"file": "crd-clusterissuer.yml", "name": "crd-clusterissuer", "type": "crd"}, "md5sum": "ed0143d0929e4a7f412ccb6f586d8d0f", "mode": "0644", "owner": "root", "size": 416, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.8661227-175154895931562/source", "state": "file", "uid": 0} | |
changed: [sdbfi-k8s-master2] => (item={'name': 'crd-issuer', 'file': 'crd-issuer.yml', 'type': 'crd'}) => {"changed": true, "checksum": "60029b73b2408c7be249f12f7c10763fe835647d", "dest": "/etc/kubernetes/addons/cert_manager/crd-issuer.yml", "gid": 0, "group": "root", "item": {"file": "crd-issuer.yml", "name": "crd-issuer", "type": "crd"}, "md5sum": "3b92d10c98164ed26acca1d62ac5fb2d", "mode": "0644", "owner": "root", "size": 398, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861353.4683769-85923231133746/source", "state": "file", "uid": 0} | |
changed: [sdbfi-k8s-master2] => (item={'name': 'clusterrole-cert-manager', 'file': 'clusterrole-cert-manager.yml', 'type': 'clusterrole'}) => {"changed": true, "checksum": "7dc86ee88cc4b86bbab215581fcbbe19f18469f3", "dest": "/etc/kubernetes/addons/cert_manager/clusterrole-cert-manager.yml", "gid": 0, "group": "root", "item": {"file": "clusterrole-cert-manager.yml", "name": "clusterrole-cert-manager", "type": "clusterrole"}, "md5sum": "65b5140a6aec6792e08d3a2c8d5ecf38", "mode": "0644", "owner": "root", "size": 516, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.0554416-1592650890997/source", "state": "file", "uid": 0} | |
changed: [sdbfi-k8s-master2] => (item={'name': 'clusterrolebinding-cert-manager', 'file': 'clusterrolebinding-cert-manager.yml', 'type': 'clusterrolebinding'}) => {"changed": true, "checksum": "381bef1965756345e3a548c754a38ca06df4b025", "dest": "/etc/kubernetes/addons/cert_manager/clusterrolebinding-cert-manager.yml", "gid": 0, "group": "root", "item": {"file": "clusterrolebinding-cert-manager.yml", "name": "clusterrolebinding-cert-manager", "type": "clusterrolebinding"}, "md5sum": "2794c336bf0a8760063d5874def93ebb", "mode": "0644", "owner": "root", "size": 390, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.6747873-238264501955501/source", "state": "file", "uid": 0} | |
changed: [sdbfi-k8s-master2] => (item={'name': 'deploy-cert-manager', 'file': 'deploy-cert-manager.yml', 'type': 'deploy'}) => {"changed": true, "checksum": "3a8776477a5888f34795e97a498d88fe22374df7", "dest": "/etc/kubernetes/addons/cert_manager/deploy-cert-manager.yml", "gid": 0, "group": "root", "item": {"file": "deploy-cert-manager.yml", "name": "deploy-cert-manager", "type": "deploy"}, "md5sum": "7d993e1d35b0004a220f8bf5d1031e12", "mode": "0644", "owner": "root", "size": 1103, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861355.28003-228886594252413/source", "state": "file", "uid": 0} | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Apply manifests] ***************************************************************************************************** | |
Wednesday 27 November 2019 13:29:15 +0000 (0:00:05.476) 0:00:26.666 **** | |
ok: [sdbfi-k8s-master2] => (item={'diff': [], 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861350.5567663-22317132250024/source', 'changed': True, 'group': 'root', 'uid': 0, 'dest': '/etc/kubernetes/addons/cert_manager/00-namespace.yml', 'checksum': 'd4a91f027b4906a4c93f6d77d034f032ad5d16c3', 'md5sum': 'c9de0392e875335280b44ce64c031619', 'owner': 'root', 'state': 'file', 'gid': 0, 'mode': '0644', 'invocation': {'module_args': {'directory_mode': None, 'force': True, 'remote_src': None, '_original_basename': '00-namespace.yml.j2', 'owner': None, 'follow': False, 'local_follow': None, 'group': None, 'unsafe_writes': None, 'setype': None, 'content': None, 'serole': None, 'dest': '/etc/kubernetes/addons/cert_manager/00-namespace.yml', 'selevel': None, 'regexp': None, 'validate': None, 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861350.5567663-22317132250024/source', 'checksum': 'd4a91f027b4906a4c93f6d77d034f032ad5d16c3', 'seuser': None, 'delimiter': None, 'mode': None, 'attributes': None, 'backup': False}}, 'size': 149, '_ansible_parsed': True, '_ansible_no_log': False, 'failed': False, 'item': {'name': '00-namespace', 'file': '00-namespace.yml', 'type': 'ns'}, '_ansible_item_result': True, '_ansible_ignore_errors': None, '_ansible_item_label': {'name': '00-namespace', 'file': '00-namespace.yml', 'type': 'ns'}}) => {"changed": false, "item": {"changed": true, "checksum": "d4a91f027b4906a4c93f6d77d034f032ad5d16c3", "dest": "/etc/kubernetes/addons/cert_manager/00-namespace.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "00-namespace.yml.j2", "attributes": null, "backup": false, "checksum": "d4a91f027b4906a4c93f6d77d034f032ad5d16c3", "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/cert_manager/00-namespace.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861350.5567663-22317132250024/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "00-namespace.yml", "name": "00-namespace", "type": "ns"}, "md5sum": "c9de0392e875335280b44ce64c031619", "mode": "0644", "owner": "root", "size": 149, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861350.5567663-22317132250024/source", "state": "file", "uid": 0}, "msg": "success: namespace/cert-manager created"} | |
ok: [sdbfi-k8s-master2] => (item={'diff': [], 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861351.621263-243686374670055/source', 'changed': True, 'group': 'root', 'uid': 0, 'dest': '/etc/kubernetes/addons/cert_manager/sa-cert-manager.yml', 'checksum': '96da2978146acbb377c9561c1cbf3171e75eea6e', 'md5sum': '0470f6672e6e839b6a500f0222411872', 'owner': 'root', 'state': 'file', 'gid': 0, 'mode': '0644', 'invocation': {'module_args': {'directory_mode': None, 'force': True, 'remote_src': None, '_original_basename': 'sa-cert-manager.yml.j2', 'owner': None, 'follow': False, 'local_follow': None, 'group': None, 'unsafe_writes': None, 'setype': None, 'content': None, 'serole': None, 'dest': '/etc/kubernetes/addons/cert_manager/sa-cert-manager.yml', 'selevel': None, 'regexp': None, 'validate': None, 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861351.621263-243686374670055/source', 'checksum': '96da2978146acbb377c9561c1cbf3171e75eea6e', 'seuser': None, 'delimiter': None, 'mode': None, 'attributes': None, 'backup': False}}, 'size': 207, '_ansible_parsed': True, '_ansible_no_log': False, 'failed': False, 'item': {'name': 'sa-cert-manager', 'file': 'sa-cert-manager.yml', 'type': 'sa'}, '_ansible_item_result': True, '_ansible_ignore_errors': None, '_ansible_item_label': {'name': 'sa-cert-manager', 'file': 'sa-cert-manager.yml', 'type': 'sa'}}) => {"changed": false, "item": {"changed": true, "checksum": "96da2978146acbb377c9561c1cbf3171e75eea6e", "dest": "/etc/kubernetes/addons/cert_manager/sa-cert-manager.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "sa-cert-manager.yml.j2", "attributes": null, "backup": false, "checksum": "96da2978146acbb377c9561c1cbf3171e75eea6e", "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/cert_manager/sa-cert-manager.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861351.621263-243686374670055/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "sa-cert-manager.yml", "name": "sa-cert-manager", "type": "sa"}, "md5sum": "0470f6672e6e839b6a500f0222411872", "mode": "0644", "owner": "root", "size": 207, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861351.621263-243686374670055/source", "state": "file", "uid": 0}, "msg": "success: serviceaccount/cert-manager created"} | |
ok: [sdbfi-k8s-master2] => (item={'diff': [], 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.2312174-40119587312324/source', 'changed': True, 'group': 'root', 'uid': 0, 'dest': '/etc/kubernetes/addons/cert_manager/crd-certificate.yml', 'checksum': 'e63635a84e51136d3d0500db3f4d5dd8b7a98037', 'md5sum': '9cec39e0fede11698cf9671c375880da', 'owner': 'root', 'state': 'file', 'gid': 0, 'mode': '0644', 'invocation': {'module_args': {'directory_mode': None, 'force': True, 'remote_src': None, '_original_basename': 'crd-certificate.yml.j2', 'owner': None, 'follow': False, 'local_follow': None, 'group': None, 'unsafe_writes': None, 'setype': None, 'content': None, 'serole': None, 'dest': '/etc/kubernetes/addons/cert_manager/crd-certificate.yml', 'selevel': None, 'regexp': None, 'validate': None, 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.2312174-40119587312324/source', 'checksum': 'e63635a84e51136d3d0500db3f4d5dd8b7a98037', 'seuser': None, 'delimiter': None, 'mode': None, 'attributes': None, 'backup': False}}, 'size': 463, '_ansible_parsed': True, '_ansible_no_log': False, 'failed': False, 'item': {'name': 'crd-certificate', 'file': 'crd-certificate.yml', 'type': 'crd'}, '_ansible_item_result': True, '_ansible_ignore_errors': None, '_ansible_item_label': {'name': 'crd-certificate', 'file': 'crd-certificate.yml', 'type': 'crd'}}) => {"changed": false, "item": {"changed": true, "checksum": "e63635a84e51136d3d0500db3f4d5dd8b7a98037", "dest": "/etc/kubernetes/addons/cert_manager/crd-certificate.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "crd-certificate.yml.j2", "attributes": null, "backup": false, "checksum": "e63635a84e51136d3d0500db3f4d5dd8b7a98037", "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/cert_manager/crd-certificate.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.2312174-40119587312324/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "crd-certificate.yml", "name": "crd-certificate", "type": "crd"}, "md5sum": "9cec39e0fede11698cf9671c375880da", "mode": "0644", "owner": "root", "size": 463, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.2312174-40119587312324/source", "state": "file", "uid": 0}, "msg": "success: customresourcedefinition.apiextensions.k8s.io/certificates.certmanager.k8s.io unchanged"} | |
ok: [sdbfi-k8s-master2] => (item={'diff': [], 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.8661227-175154895931562/source', 'changed': True, 'group': 'root', 'uid': 0, 'dest': '/etc/kubernetes/addons/cert_manager/crd-clusterissuer.yml', 'checksum': '05f8f1a27b2b6d127f3f0f6f8fdcec83f560f140', 'md5sum': 'ed0143d0929e4a7f412ccb6f586d8d0f', 'owner': 'root', 'state': 'file', 'gid': 0, 'mode': '0644', 'invocation': {'module_args': {'directory_mode': None, 'force': True, 'remote_src': None, '_original_basename': 'crd-clusterissuer.yml.j2', 'owner': None, 'follow': False, 'local_follow': None, 'group': None, 'unsafe_writes': None, 'setype': None, 'content': None, 'serole': None, 'dest': '/etc/kubernetes/addons/cert_manager/crd-clusterissuer.yml', 'selevel': None, 'regexp': None, 'validate': None, 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.8661227-175154895931562/source', 'checksum': '05f8f1a27b2b6d127f3f0f6f8fdcec83f560f140', 'seuser': None, 'delimiter': None, 'mode': None, 'attributes': None, 'backup': False}}, 'size': 416, '_ansible_parsed': True, '_ansible_no_log': False, 'failed': False, 'item': {'name': 'crd-clusterissuer', 'file': 'crd-clusterissuer.yml', 'type': 'crd'}, '_ansible_item_result': True, '_ansible_ignore_errors': None, '_ansible_item_label': {'name': 'crd-clusterissuer', 'file': 'crd-clusterissuer.yml', 'type': 'crd'}}) => {"changed": false, "item": {"changed": true, "checksum": "05f8f1a27b2b6d127f3f0f6f8fdcec83f560f140", "dest": "/etc/kubernetes/addons/cert_manager/crd-clusterissuer.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "crd-clusterissuer.yml.j2", "attributes": null, "backup": false, "checksum": "05f8f1a27b2b6d127f3f0f6f8fdcec83f560f140", "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/cert_manager/crd-clusterissuer.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.8661227-175154895931562/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "crd-clusterissuer.yml", "name": "crd-clusterissuer", "type": "crd"}, "md5sum": "ed0143d0929e4a7f412ccb6f586d8d0f", "mode": "0644", "owner": "root", "size": 416, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861352.8661227-175154895931562/source", "state": "file", "uid": 0}, "msg": "success: customresourcedefinition.apiextensions.k8s.io/clusterissuers.certmanager.k8s.io unchanged"} | |
ok: [sdbfi-k8s-master2] => (item={'diff': [], 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861353.4683769-85923231133746/source', 'changed': True, 'group': 'root', 'uid': 0, 'dest': '/etc/kubernetes/addons/cert_manager/crd-issuer.yml', 'checksum': '60029b73b2408c7be249f12f7c10763fe835647d', 'md5sum': '3b92d10c98164ed26acca1d62ac5fb2d', 'owner': 'root', 'state': 'file', 'gid': 0, 'mode': '0644', 'invocation': {'module_args': {'directory_mode': None, 'force': True, 'remote_src': None, '_original_basename': 'crd-issuer.yml.j2', 'owner': None, 'follow': False, 'local_follow': None, 'group': None, 'unsafe_writes': None, 'setype': None, 'content': None, 'serole': None, 'dest': '/etc/kubernetes/addons/cert_manager/crd-issuer.yml', 'selevel': None, 'regexp': None, 'validate': None, 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861353.4683769-85923231133746/source', 'checksum': '60029b73b2408c7be249f12f7c10763fe835647d', 'seuser': None, 'delimiter': None, 'mode': None, 'attributes': None, 'backup': False}}, 'size': 398, '_ansible_parsed': True, '_ansible_no_log': False, 'failed': False, 'item': {'name': 'crd-issuer', 'file': 'crd-issuer.yml', 'type': 'crd'}, '_ansible_item_result': True, '_ansible_ignore_errors': None, '_ansible_item_label': {'name': 'crd-issuer', 'file': 'crd-issuer.yml', 'type': 'crd'}}) => {"changed": false, "item": {"changed": true, "checksum": "60029b73b2408c7be249f12f7c10763fe835647d", "dest": "/etc/kubernetes/addons/cert_manager/crd-issuer.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "crd-issuer.yml.j2", "attributes": null, "backup": false, "checksum": "60029b73b2408c7be249f12f7c10763fe835647d", "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/cert_manager/crd-issuer.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861353.4683769-85923231133746/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "crd-issuer.yml", "name": "crd-issuer", "type": "crd"}, "md5sum": "3b92d10c98164ed26acca1d62ac5fb2d", "mode": "0644", "owner": "root", "size": 398, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861353.4683769-85923231133746/source", "state": "file", "uid": 0}, "msg": "success: customresourcedefinition.apiextensions.k8s.io/issuers.certmanager.k8s.io unchanged"} | |
ok: [sdbfi-k8s-master2] => (item={'diff': [], 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.0554416-1592650890997/source', 'changed': True, 'group': 'root', 'uid': 0, 'dest': '/etc/kubernetes/addons/cert_manager/clusterrole-cert-manager.yml', 'checksum': '7dc86ee88cc4b86bbab215581fcbbe19f18469f3', 'md5sum': '65b5140a6aec6792e08d3a2c8d5ecf38', 'owner': 'root', 'state': 'file', 'gid': 0, 'mode': '0644', 'invocation': {'module_args': {'directory_mode': None, 'force': True, 'remote_src': None, '_original_basename': 'clusterrole-cert-manager.yml.j2', 'owner': None, 'follow': False, 'local_follow': None, 'group': None, 'unsafe_writes': None, 'setype': None, 'content': None, 'serole': None, 'dest': '/etc/kubernetes/addons/cert_manager/clusterrole-cert-manager.yml', 'selevel': None, 'regexp': None, 'validate': None, 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.0554416-1592650890997/source', 'checksum': '7dc86ee88cc4b86bbab215581fcbbe19f18469f3', 'seuser': None, 'delimiter': None, 'mode': None, 'attributes': None, 'backup': False}}, 'size': 516, '_ansible_parsed': True, '_ansible_no_log': False, 'failed': False, 'item': {'name': 'clusterrole-cert-manager', 'file': 'clusterrole-cert-manager.yml', 'type': 'clusterrole'}, '_ansible_item_result': True, '_ansible_ignore_errors': None, '_ansible_item_label': {'name': 'clusterrole-cert-manager', 'file': 'clusterrole-cert-manager.yml', 'type': 'clusterrole'}}) => {"changed": false, "item": {"changed": true, "checksum": "7dc86ee88cc4b86bbab215581fcbbe19f18469f3", "dest": "/etc/kubernetes/addons/cert_manager/clusterrole-cert-manager.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "clusterrole-cert-manager.yml.j2", "attributes": null, "backup": false, "checksum": "7dc86ee88cc4b86bbab215581fcbbe19f18469f3", "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/cert_manager/clusterrole-cert-manager.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.0554416-1592650890997/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "clusterrole-cert-manager.yml", "name": "clusterrole-cert-manager", "type": "clusterrole"}, "md5sum": "65b5140a6aec6792e08d3a2c8d5ecf38", "mode": "0644", "owner": "root", "size": 516, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.0554416-1592650890997/source", "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/cert-manager unchanged"} | |
ok: [sdbfi-k8s-master2] => (item={'diff': [], 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.6747873-238264501955501/source', 'changed': True, 'group': 'root', 'uid': 0, 'dest': '/etc/kubernetes/addons/cert_manager/clusterrolebinding-cert-manager.yml', 'checksum': '381bef1965756345e3a548c754a38ca06df4b025', 'md5sum': '2794c336bf0a8760063d5874def93ebb', 'owner': 'root', 'state': 'file', 'gid': 0, 'mode': '0644', 'invocation': {'module_args': {'directory_mode': None, 'force': True, 'remote_src': None, '_original_basename': 'clusterrolebinding-cert-manager.yml.j2', 'owner': None, 'follow': False, 'local_follow': None, 'group': None, 'unsafe_writes': None, 'setype': None, 'content': None, 'serole': None, 'dest': '/etc/kubernetes/addons/cert_manager/clusterrolebinding-cert-manager.yml', 'selevel': None, 'regexp': None, 'validate': None, 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.6747873-238264501955501/source', 'checksum': '381bef1965756345e3a548c754a38ca06df4b025', 'seuser': None, 'delimiter': None, 'mode': None, 'attributes': None, 'backup': False}}, 'size': 390, '_ansible_parsed': True, '_ansible_no_log': False, 'failed': False, 'item': {'name': 'clusterrolebinding-cert-manager', 'file': 'clusterrolebinding-cert-manager.yml', 'type': 'clusterrolebinding'}, '_ansible_item_result': True, '_ansible_ignore_errors': None, '_ansible_item_label': {'name': 'clusterrolebinding-cert-manager', 'file': 'clusterrolebinding-cert-manager.yml', 'type': 'clusterrolebinding'}}) => {"changed": false, "item": {"changed": true, "checksum": "381bef1965756345e3a548c754a38ca06df4b025", "dest": "/etc/kubernetes/addons/cert_manager/clusterrolebinding-cert-manager.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "clusterrolebinding-cert-manager.yml.j2", "attributes": null, "backup": false, "checksum": "381bef1965756345e3a548c754a38ca06df4b025", "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/cert_manager/clusterrolebinding-cert-manager.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.6747873-238264501955501/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "clusterrolebinding-cert-manager.yml", "name": "clusterrolebinding-cert-manager", "type": "clusterrolebinding"}, "md5sum": "2794c336bf0a8760063d5874def93ebb", "mode": "0644", "owner": "root", "size": 390, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861354.6747873-238264501955501/source", "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/cert-manager unchanged"} | |
ok: [sdbfi-k8s-master2] => (item={'diff': [], 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861355.28003-228886594252413/source', 'changed': True, 'group': 'root', 'uid': 0, 'dest': '/etc/kubernetes/addons/cert_manager/deploy-cert-manager.yml', 'checksum': '3a8776477a5888f34795e97a498d88fe22374df7', 'md5sum': '7d993e1d35b0004a220f8bf5d1031e12', 'owner': 'root', 'state': 'file', 'gid': 0, 'mode': '0644', 'invocation': {'module_args': {'directory_mode': None, 'force': True, 'remote_src': None, '_original_basename': 'deploy-cert-manager.yml.j2', 'owner': None, 'follow': False, 'local_follow': None, 'group': None, 'unsafe_writes': None, 'setype': None, 'content': None, 'serole': None, 'dest': '/etc/kubernetes/addons/cert_manager/deploy-cert-manager.yml', 'selevel': None, 'regexp': None, 'validate': None, 'src': '/home/kubespray/.ansible/tmp/ansible-tmp-1574861355.28003-228886594252413/source', 'checksum': '3a8776477a5888f34795e97a498d88fe22374df7', 'seuser': None, 'delimiter': None, 'mode': None, 'attributes': None, 'backup': False}}, 'size': 1103, '_ansible_parsed': True, '_ansible_no_log': False, 'failed': False, 'item': {'name': 'deploy-cert-manager', 'file': 'deploy-cert-manager.yml', 'type': 'deploy'}, '_ansible_item_result': True, '_ansible_ignore_errors': None, '_ansible_item_label': {'name': 'deploy-cert-manager', 'file': 'deploy-cert-manager.yml', 'type': 'deploy'}}) => {"changed": false, "item": {"changed": true, "checksum": "3a8776477a5888f34795e97a498d88fe22374df7", "dest": "/etc/kubernetes/addons/cert_manager/deploy-cert-manager.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "deploy-cert-manager.yml.j2", "attributes": null, "backup": false, "checksum": "3a8776477a5888f34795e97a498d88fe22374df7", "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/cert_manager/deploy-cert-manager.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861355.28003-228886594252413/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "deploy-cert-manager.yml", "name": "deploy-cert-manager", "type": "deploy"}, "md5sum": "7d993e1d35b0004a220f8bf5d1031e12", "mode": "0644", "owner": "root", "size": 1103, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861355.28003-228886594252413/source", "state": "file", "uid": 0}, "msg": "success: deployment.apps/cert-manager created"} | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Ensure base dir is created on all hosts] *************************************************** | |
Wednesday 27 November 2019 13:29:22 +0000 (0:00:06.640) 0:00:33.306 **** | |
ok: [sdbfi-k8s-master2 -> 10.101.1.173] => (item=['sdbfi-k8s-master2', 'local-storage']) => {"changed": false, "gid": 0, "group": "root", "item": ["sdbfi-k8s-master2", "local-storage"], "mode": "0700", "owner": "root", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 0} | |
ok: [sdbfi-k8s-master2 -> 10.101.1.174] => (item=['sdbfi-k8s-master3', 'local-storage']) => {"changed": false, "gid": 0, "group": "root", "item": ["sdbfi-k8s-master3", "local-storage"], "mode": "0700", "owner": "root", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 0} | |
ok: [sdbfi-k8s-master2 -> 10.101.1.172] => (item=['sdbfi-k8s-master1', 'local-storage']) => {"changed": false, "gid": 0, "group": "root", "item": ["sdbfi-k8s-master1", "local-storage"], "mode": "0700", "owner": "root", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 0} | |
ok: [sdbfi-k8s-master2 -> 10.101.1.175] => (item=['sdbfi-k8s-worker1', 'local-storage']) => {"changed": false, "gid": 0, "group": "root", "item": ["sdbfi-k8s-worker1", "local-storage"], "mode": "0700", "owner": "root", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 0} | |
ok: [sdbfi-k8s-master2 -> 10.101.1.176] => (item=['sdbfi-k8s-worker2', 'local-storage']) => {"changed": false, "gid": 0, "group": "root", "item": ["sdbfi-k8s-worker2", "local-storage"], "mode": "0700", "owner": "root", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 0} | |
ok: [sdbfi-k8s-master2 -> 10.101.1.177] => (item=['sdbfi-k8s-worker3', 'local-storage']) => {"changed": false, "gid": 0, "group": "root", "item": ["sdbfi-k8s-worker3", "local-storage"], "mode": "0700", "owner": "root", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 0} | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create addon dir] ************************************************************************** | |
Wednesday 27 November 2019 13:29:24 +0000 (0:00:01.803) 0:00:35.110 **** | |
ok: [sdbfi-k8s-master2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner", "size": 4096, "state": "directory", "uid": 0} | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Templates list] **************************************************************************** | |
Wednesday 27 November 2019 13:29:24 +0000 (0:00:00.511) 0:00:35.622 **** | |
ok: [sdbfi-k8s-master2] => {"ansible_facts": {"local_volume_provisioner_templates": [{"file": "local-volume-provisioner-ns.yml", "name": "local-volume-provisioner-ns", "type": "ns"}, {"file": "local-volume-provisioner-sa.yml", "name": "local-volume-provisioner-sa", "type": "sa"}, {"file": "local-volume-provisioner-clusterrole.yml", "name": "local-volume-provisioner-clusterrole", "type": "clusterrole"}, {"file": "local-volume-provisioner-clusterrolebinding.yml", "name": "local-volume-provisioner-clusterrolebinding", "type": "clusterrolebinding"}, {"file": "local-volume-provisioner-cm.yml", "name": "local-volume-provisioner-cm", "type": "cm"}, {"file": "local-volume-provisioner-ds.yml", "name": "local-volume-provisioner-ds", "type": "ds"}, {"file": "local-volume-provisioner-sc.yml", "name": "local-volume-provisioner-sc", "type": "sc"}], "local_volume_provisioner_templates_for_psp_not_system_ns": [{"file": "local-volume-provisioner-psp.yml", "name": "local-volume-provisioner-psp", "type": "psp"}, {"file": "local-volume-provisioner-psp-role.yml", "name": "local-volume-provisioner-psp-role", "type": "role"}, {"file": "local-volume-provisioner-psp-rb.yml", "name": "local-volume-provisioner-psp-rb", "type": "rolebinding"}]}, "changed": false} | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Insert extra templates to Local Volume Provisioner templates list for PodSecurityPolicy] *** | |
Wednesday 27 November 2019 13:29:25 +0000 (0:00:00.292) 0:00:35.914 **** | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create manifests] ************************************************************************** | |
Wednesday 27 November 2019 13:29:25 +0000 (0:00:00.257) 0:00:36.171 **** | |
ok: [sdbfi-k8s-master2] => (item={'name': 'local-volume-provisioner-ns', 'file': 'local-volume-provisioner-ns.yml', 'type': 'ns'}) => {"changed": false, "checksum": "0cf18004fa0c8572f859c01123fb060f24d9548e", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ns.yml", "gid": 0, "group": "root", "item": {"file": "local-volume-provisioner-ns.yml", "name": "local-volume-provisioner-ns", "type": "ns"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ns.yml", "size": 97, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'local-volume-provisioner-sa', 'file': 'local-volume-provisioner-sa.yml', 'type': 'sa'}) => {"changed": false, "checksum": "deb72f075175b4f848e1e016302f131e40a3d2fe", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sa.yml", "gid": 0, "group": "root", "item": {"file": "local-volume-provisioner-sa.yml", "name": "local-volume-provisioner-sa", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sa.yml", "size": 108, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'local-volume-provisioner-clusterrole', 'file': 'local-volume-provisioner-clusterrole.yml', 'type': 'clusterrole'}) => {"changed": false, "checksum": "3d6a0af43b7a3a3a91c25afc741f85d59ad6dad3", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrole.yml", "gid": 0, "group": "root", "item": {"file": "local-volume-provisioner-clusterrole.yml", "name": "local-volume-provisioner-clusterrole", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrole.yml", "size": 213, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'local-volume-provisioner-clusterrolebinding', 'file': 'local-volume-provisioner-clusterrolebinding.yml', 'type': 'clusterrolebinding'}) => {"changed": false, "checksum": "32fc4e626597d2d215f0219d3ab2170f8fffffef", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrolebinding.yml", "gid": 0, "group": "root", "item": {"file": "local-volume-provisioner-clusterrolebinding.yml", "name": "local-volume-provisioner-clusterrolebinding", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrolebinding.yml", "size": 736, "state": "file", "uid": 0} | |
changed: [sdbfi-k8s-master2] => (item={'name': 'local-volume-provisioner-cm', 'file': 'local-volume-provisioner-cm.yml', 'type': 'cm'}) => {"changed": true, "checksum": "b4c2368a37eddfc4c6d9aab37445727cef4c330e", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-cm.yml", "gid": 0, "group": "root", "item": {"file": "local-volume-provisioner-cm.yml", "name": "local-volume-provisioner-cm", "type": "cm"}, "md5sum": "0ad29d810ab47ecbdff714220358bf02", "mode": "0644", "owner": "root", "size": 355, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861367.9866054-145436094079116/source", "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'local-volume-provisioner-ds', 'file': 'local-volume-provisioner-ds.yml', 'type': 'ds'}) => {"changed": false, "checksum": "5e6e6ebfe89a50fae8330af42708c5c759eef6a5", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ds.yml", "gid": 0, "group": "root", "item": {"file": "local-volume-provisioner-ds.yml", "name": "local-volume-provisioner-ds", "type": "ds"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ds.yml", "size": 1569, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'local-volume-provisioner-sc', 'file': 'local-volume-provisioner-sc.yml', 'type': 'sc'}) => {"changed": false, "checksum": "8685a6085191acc8f9627222f8550afcb1d3c7c4", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sc.yml", "gid": 0, "group": "root", "item": {"file": "local-volume-provisioner-sc.yml", "name": "local-volume-provisioner-sc", "type": "sc"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sc.yml", "size": 167, "state": "file", "uid": 0} | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Apply manifests] *************************************************************************** | |
Wednesday 27 November 2019 13:29:29 +0000 (0:00:04.470) 0:00:40.642 **** | |
ok: [sdbfi-k8s-master2] => (item=local-volume-provisioner-ns.yml) => {"changed": false, "item": {"changed": false, "checksum": "0cf18004fa0c8572f859c01123fb060f24d9548e", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ns.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ns.yml"}, "before": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ns.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "local-volume-provisioner-ns.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ns.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ns.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "local-volume-provisioner-ns.yml", "name": "local-volume-provisioner-ns", "type": "ns"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ns.yml", "size": 97, "state": "file", "uid": 0}, "msg": "success: namespace/kube-system unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=local-volume-provisioner-sa.yml) => {"changed": false, "item": {"changed": false, "checksum": "deb72f075175b4f848e1e016302f131e40a3d2fe", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sa.yml"}, "before": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "local-volume-provisioner-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "local-volume-provisioner-sa.yml", "name": "local-volume-provisioner-sa", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sa.yml", "size": 108, "state": "file", "uid": 0}, "msg": "success: serviceaccount/local-volume-provisioner unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=local-volume-provisioner-clusterrole.yml) => {"changed": false, "item": {"changed": false, "checksum": "3d6a0af43b7a3a3a91c25afc741f85d59ad6dad3", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrole.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrole.yml"}, "before": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrole.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "local-volume-provisioner-clusterrole.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrole.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrole.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "local-volume-provisioner-clusterrole.yml", "name": "local-volume-provisioner-clusterrole", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrole.yml", "size": 213, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/local-volume-provisioner-node-clusterrole unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=local-volume-provisioner-clusterrolebinding.yml) => {"changed": false, "item": {"changed": false, "checksum": "32fc4e626597d2d215f0219d3ab2170f8fffffef", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrolebinding.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrolebinding.yml"}, "before": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrolebinding.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "local-volume-provisioner-clusterrolebinding.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrolebinding.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrolebinding.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "local-volume-provisioner-clusterrolebinding.yml", "name": "local-volume-provisioner-clusterrolebinding", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-clusterrolebinding.yml", "size": 736, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/local-volume-provisioner-system-persistent-volume-provisioner unchanged clusterrolebinding.rbac.authorization.k8s.io/local-volume-provisioner-system-node unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=local-volume-provisioner-cm.yml) => {"changed": false, "item": {"changed": true, "checksum": "b4c2368a37eddfc4c6d9aab37445727cef4c330e", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-cm.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "local-volume-provisioner-cm.yml.j2", "attributes": null, "backup": false, "checksum": "b4c2368a37eddfc4c6d9aab37445727cef4c330e", "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-cm.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861367.9866054-145436094079116/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "local-volume-provisioner-cm.yml", "name": "local-volume-provisioner-cm", "type": "cm"}, "md5sum": "0ad29d810ab47ecbdff714220358bf02", "mode": "0644", "owner": "root", "size": 355, "src": "/home/kubespray/.ansible/tmp/ansible-tmp-1574861367.9866054-145436094079116/source", "state": "file", "uid": 0}, "msg": "success: configmap/local-volume-provisioner configured"} | |
ok: [sdbfi-k8s-master2] => (item=local-volume-provisioner-ds.yml) => {"changed": false, "item": {"changed": false, "checksum": "5e6e6ebfe89a50fae8330af42708c5c759eef6a5", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ds.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ds.yml"}, "before": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ds.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "local-volume-provisioner-ds.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ds.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ds.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "local-volume-provisioner-ds.yml", "name": "local-volume-provisioner-ds", "type": "ds"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-ds.yml", "size": 1569, "state": "file", "uid": 0}, "msg": "success: daemonset.apps/local-volume-provisioner created"} | |
ok: [sdbfi-k8s-master2] => (item=local-volume-provisioner-sc.yml) => {"changed": false, "item": {"changed": false, "checksum": "8685a6085191acc8f9627222f8550afcb1d3c7c4", "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sc.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sc.yml"}, "before": {"path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sc.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "local-volume-provisioner-sc.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sc.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sc.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "local-volume-provisioner-sc.yml", "name": "local-volume-provisioner-sc", "type": "sc"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/addons/local_volume_provisioner/local-volume-provisioner-sc.yml", "size": 167, "state": "file", "uid": 0}, "msg": "success: storageclass.storage.k8s.io/local-storage created"} | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy addon dir and manifests] ***************************************************************** | |
Wednesday 27 November 2019 13:29:35 +0000 (0:00:05.750) 0:00:46.393 **** | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy namespace] ******************************************************************************* | |
Wednesday 27 November 2019 13:29:35 +0000 (0:00:00.229) 0:00:46.622 **** | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy storageclass] **************************************************************************** | |
Wednesday 27 November 2019 13:29:36 +0000 (0:00:00.154) 0:00:46.777 **** | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Create addon dir] ************************************************************************************** | |
Wednesday 27 November 2019 13:29:36 +0000 (0:00:00.185) 0:00:46.963 **** | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Templates list] **************************************************************************************** | |
Wednesday 27 November 2019 13:29:36 +0000 (0:00:00.229) 0:00:47.193 **** | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Append extra templates to CephFS Provisioner Templates list for PodSecurityPolicy] ********************* | |
Wednesday 27 November 2019 13:29:36 +0000 (0:00:00.205) 0:00:47.398 **** | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Create manifests] ************************************************************************************** | |
Wednesday 27 November 2019 13:29:36 +0000 (0:00:00.155) 0:00:47.553 **** | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Apply manifests] *************************************************************************************** | |
Wednesday 27 November 2019 13:29:37 +0000 (0:00:00.230) 0:00:47.783 **** | |
TASK [kubernetes-apps/external_provisioner/rbd_provisioner : RBD Provisioner | Remove legacy addon dir and manifests] *********************************************************************** | |
Wednesday 27 November 2019 13:29:37 +0000 (0:00:00.252) 0:00:48.035 **** | |
TASK [kubernetes-apps/external_provisioner/rbd_provisioner : RBD Provisioner | Remove legacy namespace] ************************************************************************************* | |
Wednesday 27 November 2019 13:29:37 +0000 (0:00:00.265) 0:00:48.301 **** | |
TASK [kubernetes-apps/external_provisioner/rbd_provisioner : RBD Provisioner | Remove legacy storageclass] ********************************************************************************** | |
Wednesday 27 November 2019 13:29:37 +0000 (0:00:00.251) 0:00:48.553 **** | |
TASK [kubernetes-apps/external_provisioner/rbd_provisioner : RBD Provisioner | Create addon dir] ******************************************************************************************** | |
Wednesday 27 November 2019 13:29:38 +0000 (0:00:00.255) 0:00:48.808 **** | |
TASK [kubernetes-apps/external_provisioner/rbd_provisioner : RBD Provisioner | Templates list] ********************************************************************************************** | |
Wednesday 27 November 2019 13:29:38 +0000 (0:00:00.205) 0:00:49.014 **** | |
TASK [kubernetes-apps/external_provisioner/rbd_provisioner : RBD Provisioner | Append extra templates to RBD Provisioner Templates list for PodSecurityPolicy] ****************************** | |
Wednesday 27 November 2019 13:29:38 +0000 (0:00:00.182) 0:00:49.197 **** | |
TASK [kubernetes-apps/external_provisioner/rbd_provisioner : RBD Provisioner | Create manifests] ******************************************************************************************** | |
Wednesday 27 November 2019 13:29:38 +0000 (0:00:00.199) 0:00:49.396 **** | |
TASK [kubernetes-apps/external_provisioner/rbd_provisioner : RBD Provisioner | Apply manifests] ********************************************************************************************* | |
Wednesday 27 November 2019 13:29:38 +0000 (0:00:00.155) 0:00:49.551 **** | |
TASK [kubernetes-apps/external_provisioner/local_path_provisioner : Local Path Provisioner | Create addon dir] ****************************************************************************** | |
Wednesday 27 November 2019 13:29:39 +0000 (0:00:00.237) 0:00:49.788 **** | |
TASK [kubernetes-apps/external_provisioner/local_path_provisioner : Local Path Provisioner | Create claim root dir] ************************************************************************* | |
Wednesday 27 November 2019 13:29:39 +0000 (0:00:00.275) 0:00:50.064 **** | |
TASK [kubernetes-apps/external_provisioner/local_path_provisioner : Local Path Provisioner | Render Template] ******************************************************************************* | |
Wednesday 27 November 2019 13:29:39 +0000 (0:00:00.240) 0:00:50.305 **** | |
TASK [kubernetes-apps/external_provisioner/local_path_provisioner : Local Path Provisioner | Insert extra templates to Local Path Provisioner templates list for PodSecurityPolicy] ********* | |
Wednesday 27 November 2019 13:29:39 +0000 (0:00:00.210) 0:00:50.516 **** | |
TASK [kubernetes-apps/external_provisioner/local_path_provisioner : Local Path Provisioner | Create manifests] ****************************************************************************** | |
Wednesday 27 November 2019 13:29:39 +0000 (0:00:00.154) 0:00:50.670 **** | |
TASK [kubernetes-apps/external_provisioner/local_path_provisioner : Local Path Provisioner | Apply manifests] ******************************************************************************* | |
Wednesday 27 November 2019 13:29:40 +0000 (0:00:00.226) 0:00:50.897 **** | |
PLAY [kube-master] ************************************************************************************************************************************************************************** | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:29:40 +0000 (0:00:00.311) 0:00:51.208 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Wait for kube-apiserver] ****************************************************************************************************************** | |
Wednesday 27 November 2019 13:29:40 +0000 (0:00:00.246) 0:00:51.455 **** | |
ok: [sdbfi-k8s-master2] => {"attempts": 1, "cache_control": "no-cache, private", "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Wed, 27 Nov 2019 13:29:41 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "https://127.0.0.1:6443/healthz", "x_content_type_options": "nosniff"} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm CoreDNS] ******************************************************************************************************************* | |
Wednesday 27 November 2019 13:29:41 +0000 (0:00:01.179) 0:00:52.635 **** | |
ok: [sdbfi-k8s-master2] => {"changed": false, "msg": "success: deployment.apps \"coredns\" deleted"} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm Kube-DNS service] ********************************************************************************************************** | |
Wednesday 27 November 2019 13:29:42 +0000 (0:00:01.035) 0:00:53.670 **** | |
ok: [sdbfi-k8s-master2] => {"changed": false, "msg": "success: "} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down CoreDNS Template] **************************************************************************************************************** | |
Wednesday 27 November 2019 13:29:43 +0000 (0:00:00.930) 0:00:54.601 **** | |
ok: [sdbfi-k8s-master2] => (item={'name': 'coredns', 'module': 'template', 'file': 'coredns-config.yml', 'type': 'configmap'}) => {"changed": false, "checksum": "edcb58bcd9fb8ef401d141b2da7811101ed41c3c", "dest": "/etc/kubernetes/coredns-config.yml", "gid": 0, "group": "root", "item": {"file": "coredns-config.yml", "module": "template", "name": "coredns", "type": "configmap"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-config.yml", "size": 558, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'coredns', 'module': 'copy', 'file': 'coredns-sa.yml', 'type': 'sa'}) => {"changed": false, "checksum": "120a7b2f1f1e14e639ff7b5daa4ed21a980d80f7", "dest": "/etc/kubernetes/coredns-sa.yml", "gid": 0, "group": "root", "item": {"file": "coredns-sa.yml", "module": "copy", "name": "coredns", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-sa.yml", "size": 190, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'coredns', 'module': 'template', 'file': 'coredns-deployment.yml', 'type': 'deployment'}) => {"changed": false, "checksum": "d3f38955a4c8a5977c6319e2a7a1b89d4257e229", "dest": "/etc/kubernetes/coredns-deployment.yml", "gid": 0, "group": "root", "item": {"file": "coredns-deployment.yml", "module": "template", "name": "coredns", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-deployment.yml", "size": 3154, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'coredns', 'module': 'template', 'file': 'coredns-svc.yml', 'type': 'svc'}) => {"changed": false, "checksum": "8aa1dc035a9c73b1b50ef4f3227632df34917793", "dest": "/etc/kubernetes/coredns-svc.yml", "gid": 0, "group": "root", "item": {"file": "coredns-svc.yml", "module": "template", "name": "coredns", "type": "svc"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-svc.yml", "size": 554, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'coredns', 'module': 'copy', 'file': 'coredns-clusterrole.yml', 'type': 'clusterrole'}) => {"changed": false, "checksum": "423ea49425b12e5470028a9813d9996523a656b0", "dest": "/etc/kubernetes/coredns-clusterrole.yml", "gid": 0, "group": "root", "item": {"file": "coredns-clusterrole.yml", "module": "copy", "name": "coredns", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrole.yml", "size": 431, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'coredns', 'module': 'copy', 'file': 'coredns-clusterrolebinding.yml', 'type': 'clusterrolebinding'}) => {"changed": false, "checksum": "27b881209cb41225b20ab14bc9bdca6e45c45750", "dest": "/etc/kubernetes/coredns-clusterrolebinding.yml", "gid": 0, "group": "root", "item": {"file": "coredns-clusterrolebinding.yml", "module": "copy", "name": "coredns", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrolebinding.yml", "size": 451, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'dns-autoscaler', 'module': 'copy', 'file': 'dns-autoscaler-sa.yml', 'type': 'sa'}) => {"changed": false, "checksum": "9d96dcf2256bb4968a45d09e9232666384e83f2e", "dest": "/etc/kubernetes/dns-autoscaler-sa.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler-sa.yml", "module": "copy", "name": "dns-autoscaler", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-sa.yml", "size": 763, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'dns-autoscaler', 'module': 'copy', 'file': 'dns-autoscaler-clusterrole.yml', 'type': 'clusterrole'}) => {"changed": false, "checksum": "f5047c80df26d815fbc5873fc47b9d7c31a0aa0f", "dest": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler-clusterrole.yml", "module": "copy", "name": "dns-autoscaler", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "size": 1150, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'dns-autoscaler', 'module': 'copy', 'file': 'dns-autoscaler-clusterrolebinding.yml', 'type': 'clusterrolebinding'}) => {"changed": false, "checksum": "5c5b302e4cd73c2ec5ceb5262b2bd608173faccc", "dest": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler-clusterrolebinding.yml", "module": "copy", "name": "dns-autoscaler", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "size": 959, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'dns-autoscaler', 'module': 'template', 'file': 'dns-autoscaler.yml', 'type': 'deployment'}) => {"changed": false, "checksum": "774b8dc44e10c8e50e9cadf1784d87841a916906", "dest": "/etc/kubernetes/dns-autoscaler.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler.yml", "module": "template", "name": "dns-autoscaler", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler.yml", "size": 2604, "state": "file", "uid": 0} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down Secondary CoreDNS Template] ****************************************************************************************************** | |
Wednesday 27 November 2019 13:29:50 +0000 (0:00:06.300) 0:01:00.902 **** | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | set up necessary nodelocaldns parameters] ************************************************************************************************* | |
Wednesday 27 November 2019 13:29:50 +0000 (0:00:00.237) 0:01:01.140 **** | |
ok: [sdbfi-k8s-master2] => {"ansible_facts": {"clusterIP": "10.233.0.3", "secondaryclusterIP": "10.233.0.4"}, "changed": false} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down nodelocaldns Template] *********************************************************************************************************** | |
Wednesday 27 November 2019 13:29:50 +0000 (0:00:00.204) 0:01:01.344 **** | |
ok: [sdbfi-k8s-master2] => (item={'name': 'nodelocaldns', 'file': 'nodelocaldns-config.yml', 'type': 'configmap'}) => {"changed": false, "checksum": "7f596d25085a985b19f569ce893494e4c25a6fdd", "dest": "/etc/kubernetes/nodelocaldns-config.yml", "gid": 0, "group": "root", "item": {"file": "nodelocaldns-config.yml", "name": "nodelocaldns", "type": "configmap"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/nodelocaldns-config.yml", "size": 1035, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'nodelocaldns', 'file': 'nodelocaldns-sa.yml', 'type': 'sa'}) => {"changed": false, "checksum": "f07d79d01f736ef0b03b521aed3fd6ecc00bf715", "dest": "/etc/kubernetes/nodelocaldns-sa.yml", "gid": 0, "group": "root", "item": {"file": "nodelocaldns-sa.yml", "name": "nodelocaldns", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/nodelocaldns-sa.yml", "size": 191, "state": "file", "uid": 0} | |
ok: [sdbfi-k8s-master2] => (item={'name': 'nodelocaldns', 'file': 'nodelocaldns-daemonset.yml', 'type': 'daemonset'}) => {"changed": false, "checksum": "28b4e6aca829c71b004101c037d5fd680a8ab6f6", "dest": "/etc/kubernetes/nodelocaldns-daemonset.yml", "gid": 0, "group": "root", "item": {"file": "nodelocaldns-daemonset.yml", "name": "nodelocaldns", "type": "daemonset"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/nodelocaldns-daemonset.yml", "size": 2646, "state": "file", "uid": 0} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Start Resources] ************************************************************************************************************************** | |
Wednesday 27 November 2019 13:29:52 +0000 (0:00:02.130) 0:01:03.475 **** | |
ok: [sdbfi-k8s-master2] => (item=coredns-config.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "edcb58bcd9fb8ef401d141b2da7811101ed41c3c", "dest": "/etc/kubernetes/coredns-config.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-config.yml"}, "before": {"path": "/etc/kubernetes/coredns-config.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-config.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-config.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-config.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-config.yml", "module": "template", "name": "coredns", "type": "configmap"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-config.yml", "size": 558, "state": "file", "uid": 0}, "msg": "success: configmap/coredns unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=coredns-sa.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "120a7b2f1f1e14e639ff7b5daa4ed21a980d80f7", "dest": "/etc/kubernetes/coredns-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-sa.yml"}, "before": {"path": "/etc/kubernetes/coredns-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-sa.yml", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-sa.yml", "directory_mode": null, "follow": true, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-sa.yml", "module": "copy", "name": "coredns", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-sa.yml", "size": 190, "state": "file", "uid": 0}, "msg": "success: serviceaccount/coredns unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=coredns-deployment.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "d3f38955a4c8a5977c6319e2a7a1b89d4257e229", "dest": "/etc/kubernetes/coredns-deployment.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-deployment.yml"}, "before": {"path": "/etc/kubernetes/coredns-deployment.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-deployment.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-deployment.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-deployment.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-deployment.yml", "module": "template", "name": "coredns", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-deployment.yml", "size": 3154, "state": "file", "uid": 0}, "msg": "success: deployment.apps/coredns created"} | |
ok: [sdbfi-k8s-master2] => (item=coredns-svc.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "8aa1dc035a9c73b1b50ef4f3227632df34917793", "dest": "/etc/kubernetes/coredns-svc.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-svc.yml"}, "before": {"path": "/etc/kubernetes/coredns-svc.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-svc.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-svc.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-svc.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-svc.yml", "module": "template", "name": "coredns", "type": "svc"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-svc.yml", "size": 554, "state": "file", "uid": 0}, "msg": "success: service/coredns unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=coredns-clusterrole.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "423ea49425b12e5470028a9813d9996523a656b0", "dest": "/etc/kubernetes/coredns-clusterrole.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-clusterrole.yml"}, "before": {"path": "/etc/kubernetes/coredns-clusterrole.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-clusterrole.yml", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-clusterrole.yml", "directory_mode": null, "follow": true, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-clusterrole.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-clusterrole.yml", "module": "copy", "name": "coredns", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrole.yml", "size": 431, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/system:coredns unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=coredns-clusterrolebinding.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "27b881209cb41225b20ab14bc9bdca6e45c45750", "dest": "/etc/kubernetes/coredns-clusterrolebinding.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-clusterrolebinding.yml"}, "before": {"path": "/etc/kubernetes/coredns-clusterrolebinding.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-clusterrolebinding.yml", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-clusterrolebinding.yml", "directory_mode": null, "follow": true, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-clusterrolebinding.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-clusterrolebinding.yml", "module": "copy", "name": "coredns", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrolebinding.yml", "size": 451, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/system:coredns unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=dns-autoscaler-sa.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "9d96dcf2256bb4968a45d09e9232666384e83f2e", "dest": "/etc/kubernetes/dns-autoscaler-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler-sa.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler-sa.yml", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler-sa.yml", "directory_mode": null, "follow": true, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler-sa.yml", "module": "copy", "name": "dns-autoscaler", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-sa.yml", "size": 763, "state": "file", "uid": 0}, "msg": "success: serviceaccount/dns-autoscaler unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=dns-autoscaler-clusterrole.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "f5047c80df26d815fbc5873fc47b9d7c31a0aa0f", "dest": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler-clusterrole.yml", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "directory_mode": null, "follow": true, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler-clusterrole.yml", "module": "copy", "name": "dns-autoscaler", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "size": 1150, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/system:dns-autoscaler unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=dns-autoscaler-clusterrolebinding.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "5c5b302e4cd73c2ec5ceb5262b2bd608173faccc", "dest": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler-clusterrolebinding.yml", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "directory_mode": null, "follow": true, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler-clusterrolebinding.yml", "module": "copy", "name": "dns-autoscaler", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "size": 959, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/system:dns-autoscaler unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=dns-autoscaler.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "774b8dc44e10c8e50e9cadf1784d87841a916906", "dest": "/etc/kubernetes/dns-autoscaler.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler.yml", "module": "template", "name": "dns-autoscaler", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler.yml", "size": 2604, "state": "file", "uid": 0}, "msg": "success: deployment.apps/dns-autoscaler unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=nodelocaldns-config.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "7f596d25085a985b19f569ce893494e4c25a6fdd", "dest": "/etc/kubernetes/nodelocaldns-config.yml", "diff": {"after": {"path": "/etc/kubernetes/nodelocaldns-config.yml"}, "before": {"path": "/etc/kubernetes/nodelocaldns-config.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "nodelocaldns-config.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/nodelocaldns-config.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/nodelocaldns-config.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "nodelocaldns-config.yml", "name": "nodelocaldns", "type": "configmap"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/nodelocaldns-config.yml", "size": 1035, "state": "file", "uid": 0}, "msg": "success: configmap/nodelocaldns unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=nodelocaldns-sa.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "f07d79d01f736ef0b03b521aed3fd6ecc00bf715", "dest": "/etc/kubernetes/nodelocaldns-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/nodelocaldns-sa.yml"}, "before": {"path": "/etc/kubernetes/nodelocaldns-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "nodelocaldns-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/nodelocaldns-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/nodelocaldns-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "nodelocaldns-sa.yml", "name": "nodelocaldns", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/nodelocaldns-sa.yml", "size": 191, "state": "file", "uid": 0}, "msg": "success: serviceaccount/nodelocaldns unchanged"} | |
ok: [sdbfi-k8s-master2] => (item=nodelocaldns-daemonset.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "28b4e6aca829c71b004101c037d5fd680a8ab6f6", "dest": "/etc/kubernetes/nodelocaldns-daemonset.yml", "diff": {"after": {"path": "/etc/kubernetes/nodelocaldns-daemonset.yml"}, "before": {"path": "/etc/kubernetes/nodelocaldns-daemonset.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "nodelocaldns-daemonset.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/nodelocaldns-daemonset.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/nodelocaldns-daemonset.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "nodelocaldns-daemonset.yml", "name": "nodelocaldns", "type": "daemonset"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/nodelocaldns-daemonset.yml", "size": 2646, "state": "file", "uid": 0}, "msg": "success: daemonset.apps/nodelocaldns unchanged"} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Netchecker Templates list] **************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:03 +0000 (0:00:10.830) 0:01:14.306 **** | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Append extra templates to Netchecker Templates list for PodSecurityPolicy] **************************************************************** | |
Wednesday 27 November 2019 13:30:03 +0000 (0:00:00.263) 0:01:14.569 **** | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down Netchecker Template] ************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:04 +0000 (0:00:00.198) 0:01:14.767 **** | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Start Netchecker Resources] *************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:04 +0000 (0:00:00.199) 0:01:14.967 **** | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay down dashboard template] ************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:04 +0000 (0:00:00.192) 0:01:15.159 **** | |
ok: [sdbfi-k8s-master2] => (item={'file': 'dashboard.yml', 'type': 'deploy', 'name': 'kubernetes-dashboard'}) => {"changed": false, "checksum": "5dcf0101b6acb6134d39830c8b229a07adaa037b", "dest": "/etc/kubernetes/dashboard.yml", "gid": 0, "group": "root", "item": {"file": "dashboard.yml", "name": "kubernetes-dashboard", "type": "deploy"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dashboard.yml", "size": 6164, "state": "file", "uid": 0} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Start dashboard] ************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:05 +0000 (0:00:00.941) 0:01:16.101 **** | |
ok: [sdbfi-k8s-master2] => (item={'diff': {'after': {'path': '/etc/kubernetes/dashboard.yml'}, 'before': {'path': '/etc/kubernetes/dashboard.yml'}}, 'group': 'root', 'uid': 0, 'changed': False, 'owner': 'root', 'state': 'file', 'gid': 0, 'mode': '0644', 'path': '/etc/kubernetes/dashboard.yml', 'invocation': {'module_args': {'directory_mode': None, 'force': False, 'remote_src': None, '_original_basename': 'dashboard.yml.j2', 'path': '/etc/kubernetes/dashboard.yml', 'owner': None, 'follow': False, 'group': None, 'unsafe_writes': None, 'setype': None, 'content': None, 'serole': None, 'selevel': None, 'state': 'file', 'dest': '/etc/kubernetes/dashboard.yml', 'access_time': None, 'access_time_format': '%Y%m%d%H%M.%S', 'modification_time': None, 'regexp': None, 'src': None, 'seuser': None, 'recurse': False, '_diff_peek': None, 'delimiter': None, 'mode': None, 'modification_time_format': '%Y%m%d%H%M.%S', 'attributes': None, 'backup': None}}, 'size': 6164, '_ansible_parsed': True, 'checksum': '5dcf0101b6acb6134d39830c8b229a07adaa037b', 'dest': '/etc/kubernetes/dashboard.yml', '_ansible_no_log': False, 'failed': False, 'item': {'file': 'dashboard.yml', 'type': 'deploy', 'name': 'kubernetes-dashboard'}, '_ansible_item_result': True, '_ansible_ignore_errors': None, '_ansible_item_label': {'file': 'dashboard.yml', 'type': 'deploy', 'name': 'kubernetes-dashboard'}}) => {"changed": false, "item": {"changed": false, "checksum": "5dcf0101b6acb6134d39830c8b229a07adaa037b", "dest": "/etc/kubernetes/dashboard.yml", "diff": {"after": {"path": "/etc/kubernetes/dashboard.yml"}, "before": {"path": "/etc/kubernetes/dashboard.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dashboard.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dashboard.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dashboard.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dashboard.yml", "name": "kubernetes-dashboard", "type": "deploy"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dashboard.yml", "size": 6164, "state": "file", "uid": 0}, "msg": "success: secret/kubernetes-dashboard-certs unchanged secret/kubernetes-dashboard-csrf unchanged secret/kubernetes-dashboard-key-holder unchanged configmap/kubernetes-dashboard-settings unchanged serviceaccount/kubernetes-dashboard unchanged role.rbac.authorization.k8s.io/kubernetes-dashboard-minimal unchanged rolebinding.rbac.authorization.k8s.io/kubernetes-dashboard-minimal unchanged clusterrole.rbac.authorization.k8s.io/kubernetes-dashboard-anonymous unchanged clusterrolebinding.rbac.authorization.k8s.io/kubernetes-dashboard-anonymous configured deployment.apps/kubernetes-dashboard unchanged service/kubernetes-dashboard unchanged"} | |
TASK [kubernetes-apps/helm : Helm | Make sure HELM_HOME directory exists] ******************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:06 +0000 (0:00:01.051) 0:01:17.153 **** | |
TASK [kubernetes-apps/helm : Helm | Set up helm launcher] *********************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:06 +0000 (0:00:00.252) 0:01:17.406 **** | |
TASK [kubernetes-apps/helm : Helm | Lay Down Helm Manifests (RBAC)] ************************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:06 +0000 (0:00:00.237) 0:01:17.644 **** | |
TASK [kubernetes-apps/helm : Helm | Apply Helm Manifests (RBAC)] **************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:07 +0000 (0:00:00.266) 0:01:17.910 **** | |
TASK [kubernetes-apps/helm : Helm | Set up TLS] ********************************************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:07 +0000 (0:00:00.232) 0:01:18.142 **** | |
TASK [kubernetes-apps/helm : Helm | Install client on all masters] ************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:07 +0000 (0:00:00.153) 0:01:18.296 **** | |
TASK [kubernetes-apps/helm : Helm | Install/upgrade helm] *********************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:07 +0000 (0:00:00.196) 0:01:18.492 **** | |
TASK [kubernetes-apps/helm : Helm | Force apply tiller overrides if necessary] ************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:07 +0000 (0:00:00.165) 0:01:18.658 **** | |
TASK [kubernetes-apps/helm : Make sure bash_completion.d folder exists] ********************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:08 +0000 (0:00:00.183) 0:01:18.842 **** | |
TASK [kubernetes-apps/helm : Helm | Set up bash completion] ********************************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:08 +0000 (0:00:00.253) 0:01:19.096 **** | |
TASK [kubernetes-apps/registry : Registry | Create addon dir] ******************************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:08 +0000 (0:00:00.159) 0:01:19.255 **** | |
TASK [kubernetes-apps/registry : Registry | Templates list] ********************************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:08 +0000 (0:00:00.148) 0:01:19.404 **** | |
TASK [kubernetes-apps/registry : Registry | Append extra templates to Registry Templates list for PodSecurityPolicy] ************************************************************************ | |
Wednesday 27 November 2019 13:30:08 +0000 (0:00:00.177) 0:01:19.582 **** | |
TASK [kubernetes-apps/registry : Registry | Create manifests] ******************************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:09 +0000 (0:00:00.230) 0:01:19.812 **** | |
TASK [kubernetes-apps/registry : Registry | Apply manifests] ******************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:09 +0000 (0:00:00.207) 0:01:20.019 **** | |
TASK [kubernetes-apps/registry : Registry | Create PVC manifests] *************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:09 +0000 (0:00:00.168) 0:01:20.188 **** | |
TASK [kubernetes-apps/registry : Registry | Apply PVC manifests] **************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:09 +0000 (0:00:00.212) 0:01:20.401 **** | |
TASK [kubernetes-apps/metrics_server : Check all masters are node or not] ******************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:09 +0000 (0:00:00.218) 0:01:20.619 **** | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Delete addon dir] ******************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:10 +0000 (0:00:00.130) 0:01:20.750 **** | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Create addon dir] ******************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:10 +0000 (0:00:00.139) 0:01:20.890 **** | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Templates list] ********************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:10 +0000 (0:00:00.156) 0:01:21.047 **** | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Create manifests] ******************************************************************************************************************* | |
Wednesday 27 November 2019 13:30:10 +0000 (0:00:00.203) 0:01:21.250 **** | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Apply manifests] ******************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:10 +0000 (0:00:00.172) 0:01:21.423 **** | |
TASK [kubernetes-apps/persistent_volumes/openstack : Kubernetes Persistent Volumes | Lay down OpenStack Cinder Storage Class template] ****************************************************** | |
Wednesday 27 November 2019 13:30:10 +0000 (0:00:00.194) 0:01:21.617 **** | |
TASK [kubernetes-apps/persistent_volumes/openstack : Kubernetes Persistent Volumes | Add OpenStack Cinder Storage Class] ******************************************************************** | |
Wednesday 27 November 2019 13:30:11 +0000 (0:00:00.177) 0:01:21.794 **** | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU| gather os specific variables] ***************************************************** | |
Wednesday 27 November 2019 13:30:11 +0000 (0:00:00.168) 0:01:21.963 **** | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Set fact of download url Tesla] ************************************************** | |
Wednesday 27 November 2019 13:30:11 +0000 (0:00:00.186) 0:01:22.149 **** | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Set fact of download url GTX] **************************************************** | |
Wednesday 27 November 2019 13:30:11 +0000 (0:00:00.141) 0:01:22.291 **** | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Create addon dir] **************************************************************** | |
Wednesday 27 November 2019 13:30:11 +0000 (0:00:00.158) 0:01:22.450 **** | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Create manifests for nvidia accelerators] **************************************** | |
Wednesday 27 November 2019 13:30:11 +0000 (0:00:00.169) 0:01:22.619 **** | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Apply manifests for nvidia accelerators] ***************************************** | |
Wednesday 27 November 2019 13:30:12 +0000 (0:00:00.207) 0:01:22.827 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_private_key] ************************************************************************************ | |
Wednesday 27 November 2019 13:30:12 +0000 (0:00:00.208) 0:01:23.036 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_region_id] ************************************************************************************** | |
Wednesday 27 November 2019 13:30:12 +0000 (0:00:00.188) 0:01:23.224 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_tenancy_id] ************************************************************************************* | |
Wednesday 27 November 2019 13:30:12 +0000 (0:00:00.241) 0:01:23.466 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_user_id] **************************************************************************************** | |
Wednesday 27 November 2019 13:30:12 +0000 (0:00:00.193) 0:01:23.660 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_user_fingerprint] ******************************************************************************* | |
Wednesday 27 November 2019 13:30:13 +0000 (0:00:00.174) 0:01:23.835 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_compartment_id] ********************************************************************************* | |
Wednesday 27 November 2019 13:30:13 +0000 (0:00:00.177) 0:01:24.013 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_vnc_id] ***************************************************************************************** | |
Wednesday 27 November 2019 13:30:13 +0000 (0:00:00.176) 0:01:24.189 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_subnet1_id] ************************************************************************************* | |
Wednesday 27 November 2019 13:30:13 +0000 (0:00:00.213) 0:01:24.402 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_subnet2_id] ************************************************************************************* | |
Wednesday 27 November 2019 13:30:13 +0000 (0:00:00.242) 0:01:24.645 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_security_list_management] *********************************************************************** | |
Wednesday 27 November 2019 13:30:14 +0000 (0:00:00.167) 0:01:24.813 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Generate Cloud Provider Configuration] ********************************************************************************** | |
Wednesday 27 November 2019 13:30:14 +0000 (0:00:00.213) 0:01:25.026 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Slurp Configuration] **************************************************************************************************** | |
Wednesday 27 November 2019 13:30:14 +0000 (0:00:00.250) 0:01:25.277 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Encode Configuration] *************************************************************************************************** | |
Wednesday 27 November 2019 13:30:14 +0000 (0:00:00.249) 0:01:25.526 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Generate Manifests] ***************************************************************************************************** | |
Wednesday 27 November 2019 13:30:15 +0000 (0:00:00.253) 0:01:25.780 **** | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Apply Manifests] ******************************************************************************************************** | |
Wednesday 27 November 2019 13:30:15 +0000 (0:00:00.261) 0:01:26.041 **** | |
PLAY [k8s-cluster] ************************************************************************************************************************************************************************** | |
TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:15 +0000 (0:00:00.338) 0:01:26.380 **** | |
ok: [sdbfi-k8s-master2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-master1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [sdbfi-k8s-worker3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes/preinstall : Create kubernetes directories] ******************************************************************************************************************************** | |
Wednesday 27 November 2019 13:30:16 +0000 (0:00:00.384) 0:01:26.765 **** | |
PLAY [kube-master[0]] *********************************************************************************************************************************************************************** | |
PLAY RECAP ********************************************************************************************************************************************************************************** | |
sdbfi-k8s-master1 : ok=11 changed=0 unreachable=0 failed=0 | |
sdbfi-k8s-master2 : ok=31 changed=5 unreachable=0 failed=0 | |
sdbfi-k8s-master3 : ok=11 changed=0 unreachable=0 failed=0 | |
sdbfi-k8s-worker1 : ok=7 changed=0 unreachable=0 failed=0 | |
sdbfi-k8s-worker2 : ok=7 changed=0 unreachable=0 failed=0 | |
sdbfi-k8s-worker3 : ok=7 changed=0 unreachable=0 failed=0 | |
Wednesday 27 November 2019 13:30:16 +0000 (0:00:00.481) 0:01:27.246 **** | |
=============================================================================== | |
kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Remove legacy namespace -------------------------------------------------------------------------------------------- 12.07s | |
kubernetes-apps/ansible : Kubernetes Apps | Start Resources ------------------------------------------------------------------------------------------------------------------------- 10.83s | |
kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Apply manifests ----------------------------------------------------------------------------------------------------- 6.64s | |
kubernetes-apps/ansible : Kubernetes Apps | Lay Down CoreDNS Template ---------------------------------------------------------------------------------------------------------------- 6.30s | |
kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Apply manifests --------------------------------------------------------------------------- 5.75s | |
kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Create manifests ---------------------------------------------------------------------------------------------------- 5.48s | |
kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create manifests -------------------------------------------------------------------------- 4.47s | |
kubernetes/preinstall : Create kubernetes directories -------------------------------------------------------------------------------------------------------------------------------- 4.04s | |
kubernetes-apps/ansible : Kubernetes Apps | Lay Down nodelocaldns Template ----------------------------------------------------------------------------------------------------------- 2.13s | |
kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Ensure base dir is created on all hosts --------------------------------------------------- 1.80s | |
kubernetes-apps/ansible : Kubernetes Apps | Wait for kube-apiserver ------------------------------------------------------------------------------------------------------------------ 1.18s | |
kubernetes-apps/ansible : Kubernetes Apps | Start dashboard -------------------------------------------------------------------------------------------------------------------------- 1.05s | |
kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm CoreDNS ------------------------------------------------------------------------------------------------------------------- 1.04s | |
kubernetes-apps/ansible : Kubernetes Apps | Lay down dashboard template -------------------------------------------------------------------------------------------------------------- 0.94s | |
kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm Kube-DNS service ---------------------------------------------------------------------------------------------------------- 0.93s | |
kubespray-defaults : Configure defaults ---------------------------------------------------------------------------------------------------------------------------------------------- 0.68s | |
kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create addon dir -------------------------------------------------------------------------- 0.51s | |
kubernetes/preinstall : Create kubernetes directories -------------------------------------------------------------------------------------------------------------------------------- 0.48s | |
kubespray-defaults : Configure defaults ---------------------------------------------------------------------------------------------------------------------------------------------- 0.46s | |
kubespray-defaults : Configure defaults ---------------------------------------------------------------------------------------------------------------------------------------------- 0.40s |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment