Created
November 19, 2018 09:10
-
-
Save karthik101/d3f015eeb1f1c6f2e9a5cb8a0b9e75ee to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| [root@node1 kubespray-2.6.0]# ansible-playbook -v -i inventory/mycluster/hosts.ini cluster.yml --flush-cache | |
| Using /root/kubespray-2.6.0/ansible.cfg as config file | |
| /root/kubespray-2.6.0/inventory/mycluster/hosts.ini did not meet host_list requirements, check plugin documentation if this is unexpected | |
| /root/kubespray-2.6.0/inventory/mycluster/hosts.ini did not meet script requirements, check plugin documentation if this is unexpected | |
| /root/kubespray-2.6.0/inventory/mycluster/hosts.ini did not meet yaml requirements, check plugin documentation if this is unexpected | |
| PLAY [localhost] *************************************************************************************************************************************** | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.389) 0:00:00.389 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.042) 0:00:00.431 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.204) 0:00:00.636 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.213) 0:00:00.849 ******* | |
| ok: [localhost] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [bastion-ssh-config : set_fact] ******************************************************************************************************************* | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.088) 0:00:00.938 ******* | |
| ok: [localhost] => {"ansible_facts": {"has_bastion": false}, "changed": false} | |
| TASK [bastion-ssh-config : set_fact] ******************************************************************************************************************* | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.091) 0:00:01.029 ******* | |
| TASK [bastion-ssh-config : set_fact] ******************************************************************************************************************* | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.041) 0:00:01.071 ******* | |
| TASK [bastion-ssh-config : create ssh bastion conf] **************************************************************************************************** | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.033) 0:00:01.104 ******* | |
| PLAY [k8s-cluster:etcd:calico-rr] ********************************************************************************************************************** | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.144) 0:00:01.249 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:13:24 -0500 (0:00:00.053) 0:00:01.303 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:13:25 -0500 (0:00:00.241) 0:00:01.544 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:13:25 -0500 (0:00:00.237) 0:00:01.782 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| ok: [node2] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] ***************************************************************************************** | |
| Friday 16 November 2018 05:13:25 -0500 (0:00:00.296) 0:00:02.078 ******* | |
| TASK [bootstrap-os : Bootstrap | Install python 2.x and pip] ******************************************************************************************* | |
| Friday 16 November 2018 05:13:25 -0500 (0:00:00.142) 0:00:02.221 ******* | |
| TASK [bootstrap-os : set_fact] ************************************************************************************************************************* | |
| Friday 16 November 2018 05:13:25 -0500 (0:00:00.061) 0:00:02.282 ******* | |
| TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] ***************************************************************************************** | |
| Friday 16 November 2018 05:13:25 -0500 (0:00:00.063) 0:00:02.346 ******* | |
| TASK [bootstrap-os : Bootstrap | Install python 2.x, pip, and dbus] ************************************************************************************ | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.126) 0:00:02.472 ******* | |
| TASK [bootstrap-os : set_fact] ************************************************************************************************************************* | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.050) 0:00:02.523 ******* | |
| TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] ***************************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.053) 0:00:02.577 ******* | |
| TASK [bootstrap-os : Force binaries directory for Container Linux by CoreOS] *************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.062) 0:00:02.639 ******* | |
| TASK [bootstrap-os : Bootstrap | Run bootstrap.sh] ***************************************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.062) 0:00:02.702 ******* | |
| TASK [bootstrap-os : set_fact] ************************************************************************************************************************* | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.060) 0:00:02.762 ******* | |
| TASK [bootstrap-os : Bootstrap | Check if we need to install pip] ************************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.057) 0:00:02.820 ******* | |
| TASK [bootstrap-os : Bootstrap | Copy get-pip.py] ****************************************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.054) 0:00:02.874 ******* | |
| TASK [bootstrap-os : Bootstrap | Install pip] ********************************************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.058) 0:00:02.933 ******* | |
| TASK [bootstrap-os : Bootstrap | Remove get-pip.py] **************************************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.055) 0:00:02.988 ******* | |
| TASK [bootstrap-os : Bootstrap | Install pip launcher] ************************************************************************************************* | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.056) 0:00:03.045 ******* | |
| TASK [bootstrap-os : Install required python modules] ************************************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.068) 0:00:03.113 ******* | |
| TASK [bootstrap-os : Check presence of fastestmirror.conf] ********************************************************************************************* | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.102) 0:00:03.216 ******* | |
| TASK [bootstrap-os : Disable fastestmirror plugin] ***************************************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.053) 0:00:03.270 ******* | |
| TASK [bootstrap-os : Install packages requirements for bootstrap] ************************************************************************************** | |
| Friday 16 November 2018 05:13:26 -0500 (0:00:00.057) 0:00:03.328 ******* | |
| TASK [bootstrap-os : Install required packages (SUSE)] ************************************************************************************************* | |
| Friday 16 November 2018 05:13:27 -0500 (0:00:00.057) 0:00:03.385 ******* | |
| TASK [bootstrap-os : Remove require tty] *************************************************************************************************************** | |
| Friday 16 November 2018 05:13:27 -0500 (0:00:00.077) 0:00:03.463 ******* | |
| ok: [node1] => {"backup": "", "changed": false, "found": 0, "msg": ""} | |
| ok: [node2] => {"backup": "", "changed": false, "found": 0, "msg": ""} | |
| TASK [bootstrap-os : check if atomic host] ************************************************************************************************************* | |
| Friday 16 November 2018 05:13:28 -0500 (0:00:01.059) 0:00:04.522 ******* | |
| ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
| ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
| TASK [bootstrap-os : set_fact] ************************************************************************************************************************* | |
| Friday 16 November 2018 05:13:29 -0500 (0:00:01.062) 0:00:05.585 ******* | |
| ok: [node1] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
| TASK [bootstrap-os : Gather nodes hostnames] *********************************************************************************************************** | |
| Friday 16 November 2018 05:13:29 -0500 (0:00:00.334) 0:00:05.920 ******* | |
| ok: [node1] | |
| ok: [node2] | |
| TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (non-CoreOS and Tumbleweed)] ****************************************************** | |
| Friday 16 November 2018 05:13:31 -0500 (0:00:01.702) 0:00:07.622 ******* | |
| ok: [node2] => {"ansible_facts": {"ansible_domain": "", "ansible_fqdn": "node2", "ansible_hostname": "node2", "ansible_nodename": "node2"}, "changed": false, "name": "node2"} | |
| ok: [node1] => {"ansible_facts": {"ansible_domain": "", "ansible_fqdn": "node1", "ansible_hostname": "node1", "ansible_nodename": "node1"}, "changed": false, "name": "node1"} | |
| TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (CoreOS and Tumbleweed only)] ***************************************************** | |
| Friday 16 November 2018 05:13:32 -0500 (0:00:01.721) 0:00:09.344 ******* | |
| TASK [bootstrap-os : Update hostname fact (CoreOS and Tumbleweed only)] ******************************************************************************** | |
| Friday 16 November 2018 05:13:33 -0500 (0:00:00.077) 0:00:09.422 ******* | |
| PLAY [k8s-cluster:etcd:calico-rr] ********************************************************************************************************************** | |
| TASK [Gathering Facts] ********************************************************************************************************************************* | |
| Friday 16 November 2018 05:13:33 -0500 (0:00:00.090) 0:00:09.512 ******* | |
| ok: [node1] | |
| ok: [node2] | |
| TASK [gather facts from all instances] ***************************************************************************************************************** | |
| Friday 16 November 2018 05:13:34 -0500 (0:00:01.435) 0:00:10.947 ******* | |
| ok: [node1 -> 10.10.10.105] => (item=node1) | |
| ok: [node2 -> 10.10.10.105] => (item=node1) | |
| ok: [node1 -> 10.10.10.101] => (item=node2) | |
| ok: [node2 -> 10.10.10.101] => (item=node2) | |
| ok: [node1 -> 10.10.10.105] => (item=node1) | |
| ok: [node2 -> 10.10.10.105] => (item=node1) | |
| PLAY [k8s-cluster:etcd:calico-rr] ********************************************************************************************************************** | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:13:37 -0500 (0:00:02.632) 0:00:13.580 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:13:37 -0500 (0:00:00.259) 0:00:13.840 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:13:38 -0500 (0:00:01.440) 0:00:15.280 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:13:40 -0500 (0:00:01.555) 0:00:16.836 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| ok: [node2] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [adduser : User | Create User Group] ************************************************************************************************************** | |
| Friday 16 November 2018 05:13:40 -0500 (0:00:00.439) 0:00:17.275 ******* | |
| ok: [node1] => {"changed": false, "gid": 992, "name": "kube-cert", "state": "present", "system": true} | |
| ok: [node2] => {"changed": false, "gid": 992, "name": "kube-cert", "state": "present", "system": true} | |
| TASK [adduser : User | Create User] ******************************************************************************************************************** | |
| Friday 16 November 2018 05:13:41 -0500 (0:00:00.948) 0:00:18.224 ******* | |
| ok: [node2] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 992, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 996} | |
| ok: [node1] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 992, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 996} | |
| TASK [kubernetes/preinstall : Remove swapfile from /etc/fstab] ***************************************************************************************** | |
| Friday 16 November 2018 05:13:43 -0500 (0:00:01.176) 0:00:19.400 ******* | |
| ok: [node2] => {"changed": false, "dump": "0", "fstab": "/etc/fstab", "fstype": "swap", "name": "swap", "opts": "defaults", "passno": "0"} | |
| ok: [node1] => {"changed": false, "dump": "0", "fstab": "/etc/fstab", "fstype": "swap", "name": "swap", "opts": "defaults", "passno": "0"} | |
| TASK [kubernetes/preinstall : Disable swap] ************************************************************************************************************ | |
| Friday 16 November 2018 05:13:43 -0500 (0:00:00.882) 0:00:20.283 ******* | |
| TASK [kubernetes/preinstall : Stop if ansible version is too low] ************************************************************************************** | |
| Friday 16 November 2018 05:13:44 -0500 (0:00:00.152) 0:00:20.436 ******* | |
| ok: [node1] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Stop if non systemd OS type] ********************************************************************************************* | |
| Friday 16 November 2018 05:13:44 -0500 (0:00:00.345) 0:00:20.782 ******* | |
| ok: [node1] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node2] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Stop if unknown OS] ****************************************************************************************************** | |
| Friday 16 November 2018 05:13:44 -0500 (0:00:00.421) 0:00:21.204 ******* | |
| ok: [node1] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node2] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Stop if unknown network plugin] ****************************************************************************************** | |
| Friday 16 November 2018 05:13:45 -0500 (0:00:00.441) 0:00:21.645 ******* | |
| ok: [node1] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node2] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Stop if incompatible network plugin and cloudprovider] ******************************************************************* | |
| Friday 16 November 2018 05:13:45 -0500 (0:00:00.469) 0:00:22.115 ******* | |
| TASK [kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }")] ********************************* | |
| Friday 16 November 2018 05:13:45 -0500 (0:00:00.156) 0:00:22.271 ******* | |
| ok: [node1] => (item={u'name': u'kubeadm_enabled', u'value': False}) => { | |
| "changed": false, | |
| "item": { | |
| "name": "kubeadm_enabled", | |
| "value": false | |
| }, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node1] => (item={u'name': u'download_run_once', u'value': False}) => { | |
| "changed": false, | |
| "item": { | |
| "name": "download_run_once", | |
| "value": false | |
| }, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node1] => (item={u'name': u'deploy_netchecker', u'value': False}) => { | |
| "changed": false, | |
| "item": { | |
| "name": "deploy_netchecker", | |
| "value": false | |
| }, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node1] => (item={u'name': u'download_always_pull', u'value': False}) => { | |
| "changed": false, | |
| "item": { | |
| "name": "download_always_pull", | |
| "value": false | |
| }, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node1] => (item={u'name': u'efk_enabled', u'value': False}) => { | |
| "changed": false, | |
| "item": { | |
| "name": "efk_enabled", | |
| "value": false | |
| }, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node1] => (item={u'name': u'helm_enabled', u'value': False}) => { | |
| "changed": false, | |
| "item": { | |
| "name": "helm_enabled", | |
| "value": false | |
| }, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node1] => (item={u'name': u'openstack_lbaas_enabled', u'value': False}) => { | |
| "changed": false, | |
| "item": { | |
| "name": "openstack_lbaas_enabled", | |
| "value": false | |
| }, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Stop if even number of etcd hosts] *************************************************************************************** | |
| Friday 16 November 2018 05:13:46 -0500 (0:00:00.883) 0:00:23.155 ******* | |
| ok: [node1] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node2] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Stop if memory is too small for masters] ********************************************************************************* | |
| Friday 16 November 2018 05:13:47 -0500 (0:00:00.485) 0:00:23.641 ******* | |
| ok: [node1] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node2] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Stop if memory is too small for nodes] *********************************************************************************** | |
| Friday 16 November 2018 05:13:47 -0500 (0:00:00.539) 0:00:24.181 ******* | |
| ok: [node1] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node2] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Guarantee that enough network address space is available for all pods] *************************************************** | |
| Friday 16 November 2018 05:13:48 -0500 (0:00:00.564) 0:00:24.745 ******* | |
| fatal: [node1]: FAILED! => {"msg": "The task includes an option with an undefined variable. The error was: 'kubelet_max_pods' is undefined\n\nThe error appears to have been in '/root/kubespray-2.6.0/roles/kubernetes/preinstall/tasks/verify-settings.yml': line 69, column 3, but may\nbe elsewhere in the file depending on the exact syntax problem.\n\nThe offending line appears to be:\n\n# NOTICE: the check blatantly ignores the inet6-case\n- name: Guarantee that enough network address space is available for all pods\n ^ here\n"} | |
| ...ignoring | |
| fatal: [node2]: FAILED! => {"msg": "The task includes an option with an undefined variable. The error was: 'kubelet_max_pods' is undefined\n\nThe error appears to have been in '/root/kubespray-2.6.0/roles/kubernetes/preinstall/tasks/verify-settings.yml': line 69, column 3, but may\nbe elsewhere in the file depending on the exact syntax problem.\n\nThe offending line appears to be:\n\n# NOTICE: the check blatantly ignores the inet6-case\n- name: Guarantee that enough network address space is available for all pods\n ^ here\n"} | |
| ...ignoring | |
| TASK [kubernetes/preinstall : Stop if ip var does not match local ips] ********************************************************************************* | |
| Friday 16 November 2018 05:13:48 -0500 (0:00:00.164) 0:00:24.910 ******* | |
| ok: [node1] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node2] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Stop if access_ip is not pingable] *************************************************************************************** | |
| Friday 16 November 2018 05:13:48 -0500 (0:00:00.460) 0:00:25.371 ******* | |
| TASK [kubernetes/preinstall : Stop if RBAC is not enabled when dashboard is enabled] ******************************************************************* | |
| Friday 16 November 2018 05:13:49 -0500 (0:00:00.171) 0:00:25.542 ******* | |
| ok: [node1] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| ok: [node2] => { | |
| "changed": false, | |
| "msg": "All assertions passed" | |
| } | |
| TASK [kubernetes/preinstall : Stop if RBAC and anonymous-auth are not enabled when insecure port is disabled] ****************************************** | |
| Friday 16 November 2018 05:13:49 -0500 (0:00:00.501) 0:00:26.044 ******* | |
| TASK [kubernetes/preinstall : Stop if kernel version is too low] *************************************************************************************** | |
| Friday 16 November 2018 05:13:49 -0500 (0:00:00.171) 0:00:26.215 ******* | |
| TASK [kubernetes/preinstall : Pre-upgrade | check if old credential dir exists] ************************************************************************ | |
| Friday 16 November 2018 05:13:50 -0500 (0:00:00.178) 0:00:26.394 ******* | |
| ok: [node1 -> localhost] => {"changed": false, "stat": {"exists": false}} | |
| TASK [kubernetes/preinstall : Pre-upgrade | check if new credential dir exists] ************************************************************************ | |
| Friday 16 November 2018 05:13:50 -0500 (0:00:00.403) 0:00:26.798 ******* | |
| TASK [kubernetes/preinstall : Pre-upgrade | move data from old credential dir to new] ****************************************************************** | |
| Friday 16 November 2018 05:13:50 -0500 (0:00:00.115) 0:00:26.914 ******* | |
| TASK [kubernetes/preinstall : Force binaries directory for Container Linux by CoreOS] ****************************************************************** | |
| Friday 16 November 2018 05:13:50 -0500 (0:00:00.109) 0:00:27.023 ******* | |
| TASK [kubernetes/preinstall : check bin dir exists] **************************************************************************************************** | |
| Friday 16 November 2018 05:13:50 -0500 (0:00:00.180) 0:00:27.203 ******* | |
| ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 6, "state": "directory", "uid": 0} | |
| ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 6, "state": "directory", "uid": 0} | |
| TASK [kubernetes/preinstall : check if atomic host] **************************************************************************************************** | |
| Friday 16 November 2018 05:13:51 -0500 (0:00:01.057) 0:00:28.261 ******* | |
| ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
| ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
| TASK [kubernetes/preinstall : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:13:52 -0500 (0:00:00.625) 0:00:28.886 ******* | |
| ok: [node1] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
| TASK [kubernetes/preinstall : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:13:52 -0500 (0:00:00.425) 0:00:29.312 ******* | |
| TASK [kubernetes/preinstall : check resolvconf] ******************************************************************************************************** | |
| Friday 16 November 2018 05:13:53 -0500 (0:00:00.160) 0:00:29.472 ******* | |
| ok: [node1] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.006806", "end": "2018-11-16 05:13:53.931407", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2018-11-16 05:13:53.924601", "stderr": "which: no resolvconf in (/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin)", "stderr_lines": ["which: no resolvconf in (/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin)"], "stdout": "", "stdout_lines": []} | |
| ok: [node2] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.007010", "end": "2018-11-16 05:13:53.699936", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2018-11-16 05:13:53.692926", "stderr": "which: no resolvconf in (/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin)", "stderr_lines": ["which: no resolvconf in (/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin)"], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/preinstall : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:13:54 -0500 (0:00:00.930) 0:00:30.403 ******* | |
| ok: [node1] => {"ansible_facts": {"resolvconf": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"resolvconf": false}, "changed": false} | |
| TASK [kubernetes/preinstall : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:13:54 -0500 (0:00:00.421) 0:00:30.824 ******* | |
| ok: [node1] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "cloud_resolver": []}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "cloud_resolver": []}, "changed": false} | |
| TASK [kubernetes/preinstall : check if kubelet is configured] ****************************************************************************************** | |
| Friday 16 November 2018 05:13:54 -0500 (0:00:00.435) 0:00:31.260 ******* | |
| ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
| ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
| TASK [kubernetes/preinstall : check if early DNS configuration stage] ********************************************************************************** | |
| Friday 16 November 2018 05:13:55 -0500 (0:00:00.624) 0:00:31.885 ******* | |
| ok: [node1] => {"ansible_facts": {"dns_early": true}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"dns_early": true}, "changed": false} | |
| TASK [kubernetes/preinstall : target resolv.conf files] ************************************************************************************************ | |
| Friday 16 November 2018 05:13:55 -0500 (0:00:00.441) 0:00:32.327 ******* | |
| ok: [node1] => {"ansible_facts": {"base": "", "head": "", "resolvconffile": "/etc/resolv.conf"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"base": "", "head": "", "resolvconffile": "/etc/resolv.conf"}, "changed": false} | |
| TASK [kubernetes/preinstall : target temporary resolvconf cloud init file (Container Linux by CoreOS)] ************************************************* | |
| Friday 16 November 2018 05:13:56 -0500 (0:00:00.500) 0:00:32.827 ******* | |
| TASK [kubernetes/preinstall : check if /etc/dhclient.conf exists] ************************************************************************************** | |
| Friday 16 November 2018 05:13:56 -0500 (0:00:00.181) 0:00:33.008 ******* | |
| ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
| ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
| TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhclient.conf] ************************************************************************ | |
| Friday 16 November 2018 05:13:57 -0500 (0:00:00.607) 0:00:33.616 ******* | |
| TASK [kubernetes/preinstall : check if /etc/dhcp/dhclient.conf exists] ********************************************************************************* | |
| Friday 16 November 2018 05:13:57 -0500 (0:00:00.149) 0:00:33.766 ******* | |
| ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
| ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
| TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhcp/dhclient.conf] ******************************************************************* | |
| Friday 16 November 2018 05:13:57 -0500 (0:00:00.616) 0:00:34.382 ******* | |
| TASK [kubernetes/preinstall : target dhclient hook file for Red Hat family] **************************************************************************** | |
| Friday 16 November 2018 05:13:58 -0500 (0:00:00.174) 0:00:34.557 ******* | |
| ok: [node1] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient.d/zdnsupdate.sh"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient.d/zdnsupdate.sh"}, "changed": false} | |
| TASK [kubernetes/preinstall : target dhclient hook file for Debian family] ***************************************************************************** | |
| Friday 16 November 2018 05:13:58 -0500 (0:00:00.469) 0:00:35.026 ******* | |
| TASK [kubernetes/preinstall : generate search domains to resolvconf] *********************************************************************************** | |
| Friday 16 November 2018 05:13:58 -0500 (0:00:00.189) 0:00:35.217 ******* | |
| ok: [node1] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false} | |
| TASK [kubernetes/preinstall : pick dnsmasq cluster IP or default resolver] ***************************************************************************** | |
| Friday 16 November 2018 05:13:59 -0500 (0:00:00.455) 0:00:35.672 ******* | |
| ok: [node1] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false} | |
| TASK [kubernetes/preinstall : generate nameservers to resolvconf] ************************************************************************************** | |
| Friday 16 November 2018 05:13:59 -0500 (0:00:00.465) 0:00:36.137 ******* | |
| ok: [node1] => {"ansible_facts": {"nameserverentries": "nameserver ", "supersede_nameserver": "supersede domain-name-servers ;"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"nameserverentries": "nameserver ", "supersede_nameserver": "supersede domain-name-servers ;"}, "changed": false} | |
| TASK [kubernetes/preinstall : gather os specific variables] ******************************************************************************************** | |
| Friday 16 November 2018 05:14:00 -0500 (0:00:00.461) 0:00:36.599 ******* | |
| ok: [node1] => (item=/root/kubespray-2.6.0/roles/kubernetes/preinstall/vars/../vars/centos.yml) => {"ansible_facts": {"required_pkgs": ["libselinux-python", "device-mapper-libs", "ebtables"]}, "ansible_included_var_files": ["/root/kubespray-2.6.0/roles/kubernetes/preinstall/vars/centos.yml"], "changed": false, "item": "/root/kubespray-2.6.0/roles/kubernetes/preinstall/vars/../vars/centos.yml"} | |
| ok: [node2] => (item=/root/kubespray-2.6.0/roles/kubernetes/preinstall/vars/../vars/centos.yml) => {"ansible_facts": {"required_pkgs": ["libselinux-python", "device-mapper-libs", "ebtables"]}, "ansible_included_var_files": ["/root/kubespray-2.6.0/roles/kubernetes/preinstall/vars/centos.yml"], "changed": false, "item": "/root/kubespray-2.6.0/roles/kubernetes/preinstall/vars/../vars/centos.yml"} | |
| TASK [kubernetes/preinstall : Create kubernetes directories] ******************************************************************************************* | |
| Friday 16 November 2018 05:14:00 -0500 (0:00:00.443) 0:00:37.042 ******* | |
| changed: [node1] => (item=/etc/kubernetes) => {"changed": true, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node2] => (item=/etc/kubernetes) => {"changed": true, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node1] => (item=/etc/kubernetes/ssl) => {"changed": true, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node2] => (item=/etc/kubernetes/ssl) => {"changed": true, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node1] => (item=/etc/kubernetes/manifests) => {"changed": true, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node2] => (item=/etc/kubernetes/manifests) => {"changed": true, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node1] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": true, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node2] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": true, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 6, "state": "directory", "uid": 996} | |
| TASK [kubernetes/preinstall : check cloud_provider value] ********************************************************************************************** | |
| Friday 16 November 2018 05:14:02 -0500 (0:00:01.476) 0:00:38.519 ******* | |
| TASK [kubernetes/preinstall : Create cni directories] ************************************************************************************************** | |
| Friday 16 November 2018 05:14:02 -0500 (0:00:00.146) 0:00:38.665 ******* | |
| changed: [node1] => (item=/etc/cni/net.d) => {"changed": true, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node2] => (item=/etc/cni/net.d) => {"changed": true, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node1] => (item=/opt/cni/bin) => {"changed": true, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node2] => (item=/opt/cni/bin) => {"changed": true, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 6, "state": "directory", "uid": 996} | |
| TASK [kubernetes/preinstall : Create local volume provisioner directories] ***************************************************************************** | |
| Friday 16 November 2018 05:14:03 -0500 (0:00:00.937) 0:00:39.603 ******* | |
| TASK [kubernetes/preinstall : create temporary resolveconf cloud init file] **************************************************************************** | |
| Friday 16 November 2018 05:14:03 -0500 (0:00:00.193) 0:00:39.797 ******* | |
| TASK [kubernetes/preinstall : Add domain/search/nameservers/options to resolv.conf] ******************************************************************** | |
| Friday 16 November 2018 05:14:03 -0500 (0:00:00.177) 0:00:39.974 ******* | |
| TASK [kubernetes/preinstall : Remove search/domain/nameserver options before block] ******************************************************************** | |
| Friday 16 November 2018 05:14:03 -0500 (0:00:00.156) 0:00:40.130 ******* | |
| TASK [kubernetes/preinstall : Remove search/domain/nameserver options after block] ********************************************************************* | |
| Friday 16 November 2018 05:14:04 -0500 (0:00:00.282) 0:00:40.412 ******* | |
| TASK [kubernetes/preinstall : get temporary resolveconf cloud init file content] *********************************************************************** | |
| Friday 16 November 2018 05:14:04 -0500 (0:00:00.283) 0:00:40.696 ******* | |
| TASK [kubernetes/preinstall : persist resolvconf cloud init file] ************************************************************************************** | |
| Friday 16 November 2018 05:14:04 -0500 (0:00:00.170) 0:00:40.867 ******* | |
| TASK [kubernetes/preinstall : Update package management cache (YUM)] *********************************************************************************** | |
| Friday 16 November 2018 05:14:04 -0500 (0:00:00.167) 0:00:41.034 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "msg": "", "rc": 0, "results": ["python36-libs-3.6.6-1.el7.x86_64 providing * is already installed"]} | |
| ok: [node2] => {"attempts": 1, "changed": false, "msg": "", "rc": 0, "results": ["xz-libs-5.2.2-1.el7.i686 providing * is already installed"]} | |
| TASK [kubernetes/preinstall : Expire management cache (YUM) for Updation - Redhat] ********************************************************************* | |
| Friday 16 November 2018 05:14:07 -0500 (0:00:02.881) 0:00:43.916 ******* | |
| TASK [kubernetes/preinstall : Update package management cache (YUM) - Redhat] ************************************************************************** | |
| Friday 16 November 2018 05:14:07 -0500 (0:00:00.156) 0:00:44.072 ******* | |
| TASK [kubernetes/preinstall : Update package management cache (zypper) - SUSE] ************************************************************************* | |
| Friday 16 November 2018 05:14:07 -0500 (0:00:00.154) 0:00:44.227 ******* | |
| TASK [kubernetes/preinstall : Update package management cache (APT)] *********************************************************************************** | |
| Friday 16 November 2018 05:14:07 -0500 (0:00:00.145) 0:00:44.373 ******* | |
| TASK [kubernetes/preinstall : Install python-dnf for latest RedHat versions] *************************************************************************** | |
| Friday 16 November 2018 05:14:08 -0500 (0:00:00.150) 0:00:44.524 ******* | |
| TASK [kubernetes/preinstall : Install epel-release on RedHat/CentOS] *********************************************************************************** | |
| Friday 16 November 2018 05:14:08 -0500 (0:00:00.146) 0:00:44.671 ******* | |
| TASK [kubernetes/preinstall : Install packages requirements] ******************************************************************************************* | |
| Friday 16 November 2018 05:14:08 -0500 (0:00:00.164) 0:00:44.836 ******* | |
| ok: [node2] => (item=[u'libselinux-python', u'device-mapper-libs', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "changed": false, "item": ["libselinux-python", "device-mapper-libs", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"], "msg": "", "rc": 0, "results": ["All packages providing libselinux-python are up to date", "All packages providing device-mapper-libs are up to date", "All packages providing ebtables are up to date", "All packages providing python-httplib2 are up to date", "All packages providing openssl are up to date", "All packages providing curl are up to date", "All packages providing rsync are up to date", "All packages providing bash-completion are up to date", "All packages providing socat are up to date", "All packages providing unzip are up to date", ""]} | |
| ok: [node1] => (item=[u'libselinux-python', u'device-mapper-libs', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "changed": false, "item": ["libselinux-python", "device-mapper-libs", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"], "msg": "", "rc": 0, "results": ["All packages providing libselinux-python are up to date", "All packages providing device-mapper-libs are up to date", "All packages providing ebtables are up to date", "All packages providing python-httplib2 are up to date", "All packages providing openssl are up to date", "All packages providing curl are up to date", "All packages providing rsync are up to date", "All packages providing bash-completion are up to date", "All packages providing socat are up to date", "All packages providing unzip are up to date", ""]} | |
| TASK [kubernetes/preinstall : Confirm selinux deployed] ************************************************************************************************ | |
| Friday 16 November 2018 05:14:10 -0500 (0:00:02.259) 0:00:47.095 ******* | |
| ok: [node1] => {"changed": false, "stat": {"atime": 1542362859.698853, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "ae3198a561b67a502029af265bf4685bded2a897", "ctime": 1542362829.0818532, "dev": 64768, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1492194, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1542362829.080853, "nlink": 1, "path": "/etc/selinux/config", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 546, "uid": 0, "version": "18446744073149762791", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
| ok: [node2] => {"changed": false, "stat": {"atime": 1542362863.3831549, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "ae3198a561b67a502029af265bf4685bded2a897", "ctime": 1542362855.662155, "dev": 64768, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 273222, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1542362855.6611547, "nlink": 1, "path": "/etc/selinux/config", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 546, "uid": 0, "version": "18446744071967868048", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
| TASK [kubernetes/preinstall : Set selinux policy] ****************************************************************************************************** | |
| Friday 16 November 2018 05:14:11 -0500 (0:00:00.665) 0:00:47.761 ******* | |
| [WARNING]: Reboot is required to set SELinux state to permissive | |
| ok: [node2] => {"changed": false, "configfile": "/etc/selinux/config", "msg": "Config SELinux state changed from 'disabled' to 'permissive'", "policy": "targeted", "reboot_required": true, "state": "permissive"} | |
| ok: [node1] => {"changed": false, "configfile": "/etc/selinux/config", "msg": "Config SELinux state changed from 'disabled' to 'permissive'", "policy": "targeted", "reboot_required": true, "state": "permissive"} | |
| TASK [kubernetes/preinstall : Disable IPv6 DNS lookup] ************************************************************************************************* | |
| Friday 16 November 2018 05:14:12 -0500 (0:00:01.554) 0:00:49.316 ******* | |
| TASK [kubernetes/preinstall : Stat sysctl file configuration] ****************************************************************************************** | |
| Friday 16 November 2018 05:14:13 -0500 (0:00:00.153) 0:00:49.469 ******* | |
| ok: [node1] => {"changed": false, "stat": {"atime": 1542306149.283, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1531404935.9001412, "dev": 64768, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 8498301, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1531404935.9001412, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}} | |
| ok: [node2] => {"changed": false, "stat": {"atime": 1542306155.39, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1531404935.9001412, "dev": 64768, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 8498301, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1531404935.9001412, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}} | |
| TASK [kubernetes/preinstall : Change sysctl file path to link source if linked] ************************************************************************ | |
| Friday 16 November 2018 05:14:13 -0500 (0:00:00.652) 0:00:50.122 ******* | |
| ok: [node1] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false} | |
| TASK [kubernetes/preinstall : Enable ip forwarding] **************************************************************************************************** | |
| Friday 16 November 2018 05:14:14 -0500 (0:00:00.444) 0:00:50.566 ******* | |
| ok: [node1] => {"changed": false} | |
| ok: [node2] => {"changed": false} | |
| TASK [kubernetes/preinstall : Hosts | populate inventory into hosts file] ****************************************************************************** | |
| Friday 16 November 2018 05:14:15 -0500 (0:00:00.934) 0:00:51.501 ******* | |
| changed: [node2] => {"changed": true, "msg": "Block inserted"} | |
| changed: [node1] => {"changed": true, "msg": "Block inserted"} | |
| TASK [kubernetes/preinstall : Hosts | populate kubernetes loadbalancer address into hosts file] ******************************************************** | |
| Friday 16 November 2018 05:14:16 -0500 (0:00:01.442) 0:00:52.944 ******* | |
| TASK [kubernetes/preinstall : Hosts | localhost ipv4 in hosts file] ************************************************************************************ | |
| Friday 16 November 2018 05:14:16 -0500 (0:00:00.155) 0:00:53.099 ******* | |
| ok: [node1] => {"backup": "", "changed": false, "msg": ""} | |
| ok: [node2] => {"backup": "", "changed": false, "msg": ""} | |
| TASK [kubernetes/preinstall : Hosts | localhost ipv6 in hosts file] ************************************************************************************ | |
| Friday 16 November 2018 05:14:17 -0500 (0:00:00.629) 0:00:53.729 ******* | |
| ok: [node1] => {"backup": "", "changed": false, "msg": ""} | |
| ok: [node2] => {"backup": "", "changed": false, "msg": ""} | |
| TASK [kubernetes/preinstall : Configure dhclient to supersede search/domain/nameservers] *************************************************************** | |
| Friday 16 November 2018 05:14:17 -0500 (0:00:00.612) 0:00:54.341 ******* | |
| TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (non-RH)] *********************************************************************** | |
| Friday 16 November 2018 05:14:18 -0500 (0:00:00.169) 0:00:54.511 ******* | |
| TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (RH-only)] ********************************************************************** | |
| Friday 16 November 2018 05:14:18 -0500 (0:00:00.166) 0:00:54.678 ******* | |
| TASK [kubernetes/preinstall : Remove kubespray specific config from dhclient config] ******************************************************************* | |
| Friday 16 November 2018 05:14:18 -0500 (0:00:00.173) 0:00:54.851 ******* | |
| TASK [kubernetes/preinstall : Remove kubespray specific dhclient hook] ********************************************************************************* | |
| Friday 16 November 2018 05:14:18 -0500 (0:00:00.186) 0:00:55.037 ******* | |
| ok: [node1] => {"changed": false, "path": "/etc/dhcp/dhclient.d/zdnsupdate.sh", "state": "absent"} | |
| ok: [node2] => {"changed": false, "path": "/etc/dhcp/dhclient.d/zdnsupdate.sh", "state": "absent"} | |
| [WARNING]: flush_handlers task does not support when conditional | |
| TASK [kubernetes/preinstall : Check if we are running inside a Azure VM] ******************************************************************************* | |
| Friday 16 November 2018 05:14:19 -0500 (0:00:00.678) 0:00:55.716 ******* | |
| ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
| ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
| TASK [kubernetes/preinstall : install growpart] ******************************************************************************************************** | |
| Friday 16 November 2018 05:14:19 -0500 (0:00:00.627) 0:00:56.344 ******* | |
| TASK [kubernetes/preinstall : check if growpart needs to be run] *************************************************************************************** | |
| Friday 16 November 2018 05:14:20 -0500 (0:00:00.158) 0:00:56.503 ******* | |
| TASK [kubernetes/preinstall : check fs type] *********************************************************************************************************** | |
| Friday 16 November 2018 05:14:20 -0500 (0:00:00.155) 0:00:56.658 ******* | |
| TASK [kubernetes/preinstall : run growpart] ************************************************************************************************************ | |
| Friday 16 November 2018 05:14:20 -0500 (0:00:00.160) 0:00:56.819 ******* | |
| TASK [kubernetes/preinstall : run xfs_growfs] ********************************************************************************************************** | |
| Friday 16 November 2018 05:14:20 -0500 (0:00:00.160) 0:00:56.979 ******* | |
| TASK [kubernetes/preinstall : Write cacert file] ******************************************************************************************************* | |
| Friday 16 November 2018 05:14:20 -0500 (0:00:00.162) 0:00:57.141 ******* | |
| TASK [kubernetes/preinstall : Write cloud-config] ****************************************************************************************************** | |
| Friday 16 November 2018 05:14:20 -0500 (0:00:00.155) 0:00:57.297 ******* | |
| TASK [docker/docker-storage : docker-storage-setup | install git and make] ***************************************************************************** | |
| Friday 16 November 2018 05:14:21 -0500 (0:00:00.154) 0:00:57.452 ******* | |
| TASK [docker/docker-storage : docker-storage-setup | docker-storage-setup sysconfig template] ********************************************************** | |
| Friday 16 November 2018 05:14:21 -0500 (0:00:00.190) 0:00:57.643 ******* | |
| TASK [docker/docker-storage : docker-storage-override-directory | docker service storage-setup override dir] ******************************************* | |
| Friday 16 November 2018 05:14:21 -0500 (0:00:00.162) 0:00:57.805 ******* | |
| TASK [docker/docker-storage : docker-storage-override | docker service storage-setup override file] **************************************************** | |
| Friday 16 November 2018 05:14:21 -0500 (0:00:00.169) 0:00:57.975 ******* | |
| TASK [docker/docker-storage : docker-storage-setup | install lvm2] ************************************************************************************* | |
| Friday 16 November 2018 05:14:21 -0500 (0:00:00.156) 0:00:58.132 ******* | |
| TASK [docker/docker-storage : docker-storage-setup | install and run container-storage-setup] ********************************************************** | |
| Friday 16 November 2018 05:14:21 -0500 (0:00:00.160) 0:00:58.292 ******* | |
| TASK [docker : gather os specific variables] *********************************************************************************************************** | |
| Friday 16 November 2018 05:14:22 -0500 (0:00:00.184) 0:00:58.477 ******* | |
| ok: [node1] => (item=/root/kubespray-2.6.0/roles/docker/vars/../vars/redhat.yml) => {"ansible_facts": {"docker_kernel_min_version": "0", "docker_package_info": {"pkg_mgr": "yum", "pkgs": [{"name": "{{ docker_selinux_versioned_pkg[docker_selinux_version | string] }}", "yum_conf": "{{ docker_yum_conf }}"}, {"name": "{{ docker_versioned_pkg[docker_version | string] }}", "yum_conf": "{{ docker_yum_conf }}"}]}, "docker_repo_info": {"pkg_repo": "", "repos": []}, "docker_repo_key_info": {"pkg_key": "", "repo_keys": []}, "docker_selinux_versioned_pkg": {"1.11": "docker-engine-selinux-1.11.2-1.el7.centos", "1.12": "docker-engine-selinux-1.12.6-1.el7.centos", "1.13": "docker-engine-selinux-1.13.1-1.el7.centos", "17.03": "docker-ce-selinux-17.03.2.ce-1.el7.centos", "edge": "docker-ce-selinux-17.03.2.ce-1.el7.centos", "latest": "docker-ce-selinux", "stable": "docker-ce-selinux-17.03.2.ce-1.el7.centos"}, "docker_versioned_pkg": {"1.11": "docker-engine-1.11.2-1.el7.centos", "1.12": "docker-engine-1.12.6-1.el7.centos", "1.13": "docker-engine-1.13.1-1.el7.centos", "17.03": "docker-ce-17.03.2.ce-1.el7.centos", "17.09": "docker-ce-17.09.0.ce-1.el7.centos", "edge": "docker-ce-17.12.1.ce-1.el7.centos", "latest": "docker-ce", "stable": "docker-ce-17.03.2.ce-1.el7.centos"}}, "ansible_included_var_files": ["/root/kubespray-2.6.0/roles/docker/vars/redhat.yml"], "changed": false, "item": "/root/kubespray-2.6.0/roles/docker/vars/../vars/redhat.yml"} | |
| ok: [node2] => (item=/root/kubespray-2.6.0/roles/docker/vars/../vars/redhat.yml) => {"ansible_facts": {"docker_kernel_min_version": "0", "docker_package_info": {"pkg_mgr": "yum", "pkgs": [{"name": "{{ docker_selinux_versioned_pkg[docker_selinux_version | string] }}", "yum_conf": "{{ docker_yum_conf }}"}, {"name": "{{ docker_versioned_pkg[docker_version | string] }}", "yum_conf": "{{ docker_yum_conf }}"}]}, "docker_repo_info": {"pkg_repo": "", "repos": []}, "docker_repo_key_info": {"pkg_key": "", "repo_keys": []}, "docker_selinux_versioned_pkg": {"1.11": "docker-engine-selinux-1.11.2-1.el7.centos", "1.12": "docker-engine-selinux-1.12.6-1.el7.centos", "1.13": "docker-engine-selinux-1.13.1-1.el7.centos", "17.03": "docker-ce-selinux-17.03.2.ce-1.el7.centos", "edge": "docker-ce-selinux-17.03.2.ce-1.el7.centos", "latest": "docker-ce-selinux", "stable": "docker-ce-selinux-17.03.2.ce-1.el7.centos"}, "docker_versioned_pkg": {"1.11": "docker-engine-1.11.2-1.el7.centos", "1.12": "docker-engine-1.12.6-1.el7.centos", "1.13": "docker-engine-1.13.1-1.el7.centos", "17.03": "docker-ce-17.03.2.ce-1.el7.centos", "17.09": "docker-ce-17.09.0.ce-1.el7.centos", "edge": "docker-ce-17.12.1.ce-1.el7.centos", "latest": "docker-ce", "stable": "docker-ce-17.03.2.ce-1.el7.centos"}}, "ansible_included_var_files": ["/root/kubespray-2.6.0/roles/docker/vars/redhat.yml"], "changed": false, "item": "/root/kubespray-2.6.0/roles/docker/vars/../vars/redhat.yml"} | |
| TASK [docker : Warn about Docker version on SUSE] ****************************************************************************************************** | |
| Friday 16 November 2018 05:14:22 -0500 (0:00:00.518) 0:00:58.996 ******* | |
| TASK [docker : include_tasks] ************************************************************************************************************************** | |
| Friday 16 November 2018 05:14:22 -0500 (0:00:00.157) 0:00:59.153 ******* | |
| included: /root/kubespray-2.6.0/roles/docker/tasks/set_facts_dns.yml for node1, node2 | |
| TASK [docker : set dns server for docker] ************************************************************************************************************** | |
| Friday 16 November 2018 05:14:23 -0500 (0:00:00.387) 0:00:59.541 ******* | |
| ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
| TASK [docker : set base docker dns facts] ************************************************************************************************************** | |
| Friday 16 November 2018 05:14:23 -0500 (0:00:00.497) 0:01:00.039 ******* | |
| ok: [node1] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
| TASK [docker : add upstream dns servers (only when dnsmasq is not used)] ******************************************************************************* | |
| Friday 16 November 2018 05:14:24 -0500 (0:00:00.513) 0:01:00.553 ******* | |
| ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
| TASK [docker : add global searchdomains] *************************************************************************************************************** | |
| Friday 16 November 2018 05:14:24 -0500 (0:00:00.615) 0:01:01.168 ******* | |
| ok: [node1] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
| TASK [docker : check system nameservers] *************************************************************************************************************** | |
| Friday 16 November 2018 05:14:25 -0500 (0:00:00.428) 0:01:01.597 ******* | |
| ok: [node1] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.009246", "end": "2018-11-16 05:14:25.703525", "rc": 0, "start": "2018-11-16 05:14:25.694279", "stderr": "", "stderr_lines": [], "stdout": "155.35.34.108\n155.35.72.108\n141.202.1.108", "stdout_lines": ["155.35.34.108", "155.35.72.108", "141.202.1.108"]} | |
| ok: [node2] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.005236", "end": "2018-11-16 05:14:25.526901", "rc": 0, "start": "2018-11-16 05:14:25.521665", "stderr": "", "stderr_lines": [], "stdout": "155.35.34.108\n155.35.72.108\n141.202.1.108", "stdout_lines": ["155.35.34.108", "155.35.72.108", "141.202.1.108"]} | |
| TASK [docker : check system search domains] ************************************************************************************************************ | |
| Friday 16 November 2018 05:14:25 -0500 (0:00:00.626) 0:01:02.223 ******* | |
| ok: [node1] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.006622", "end": "2018-11-16 05:14:26.355272", "rc": 0, "start": "2018-11-16 05:14:26.348650", "stderr": "", "stderr_lines": [], "stdout": "ca.com", "stdout_lines": ["ca.com"]} | |
| ok: [node2] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.005443", "end": "2018-11-16 05:14:26.188137", "rc": 0, "start": "2018-11-16 05:14:26.182694", "stderr": "", "stderr_lines": [], "stdout": "ca.com", "stdout_lines": ["ca.com"]} | |
| TASK [docker : add system nameservers to docker options] *********************************************************************************************** | |
| Friday 16 November 2018 05:14:26 -0500 (0:00:00.660) 0:01:02.883 ******* | |
| ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "155.35.34.108", "155.35.72.108", "141.202.1.108"]}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "155.35.34.108", "155.35.72.108", "141.202.1.108"]}, "changed": false} | |
| TASK [docker : add system search domains to docker options] ******************************************************************************************** | |
| Friday 16 November 2018 05:14:27 -0500 (0:00:00.529) 0:01:03.413 ******* | |
| ok: [node2] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "ca.com"]}, "changed": false} | |
| ok: [node1] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "ca.com"]}, "changed": false} | |
| TASK [docker : check number of nameservers] ************************************************************************************************************ | |
| Friday 16 November 2018 05:14:27 -0500 (0:00:00.501) 0:01:03.914 ******* | |
| TASK [docker : rtrim number of nameservers to 3] ******************************************************************************************************* | |
| Friday 16 November 2018 05:14:27 -0500 (0:00:00.159) 0:01:04.074 ******* | |
| ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "155.35.34.108", "155.35.72.108"]}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "155.35.34.108", "155.35.72.108"]}, "changed": false} | |
| TASK [docker : check number of search domains] ********************************************************************************************************* | |
| Friday 16 November 2018 05:14:28 -0500 (0:00:00.451) 0:01:04.526 ******* | |
| TASK [docker : check length of search domains] ********************************************************************************************************* | |
| Friday 16 November 2018 05:14:28 -0500 (0:00:00.161) 0:01:04.688 ******* | |
| TASK [docker : check for minimum kernel version] ******************************************************************************************************* | |
| Friday 16 November 2018 05:14:28 -0500 (0:00:00.159) 0:01:04.847 ******* | |
| TASK [docker : Ensure old versions of Docker are not installed. | Debian] ****************************************************************************** | |
| Friday 16 November 2018 05:14:28 -0500 (0:00:00.162) 0:01:05.009 ******* | |
| TASK [docker : Ensure old versions of Docker are not installed. | RedHat] ****************************************************************************** | |
| Friday 16 November 2018 05:14:28 -0500 (0:00:00.191) 0:01:05.201 ******* | |
| ok: [node2] => (item=docker) => {"changed": false, "item": "docker", "msg": "", "rc": 0, "results": ["docker is not installed"]} | |
| ok: [node1] => (item=docker) => {"changed": false, "item": "docker", "msg": "", "rc": 0, "results": ["docker is not installed"]} | |
| ok: [node2] => (item=docker-common) => {"changed": false, "item": "docker-common", "msg": "", "rc": 0, "results": ["docker-common is not installed"]} | |
| ok: [node1] => (item=docker-common) => {"changed": false, "item": "docker-common", "msg": "", "rc": 0, "results": ["docker-common is not installed"]} | |
| ok: [node2] => (item=docker-engine) => {"changed": false, "item": "docker-engine", "msg": "", "rc": 0, "results": ["docker-engine is not installed"]} | |
| ok: [node1] => (item=docker-engine) => {"changed": false, "item": "docker-engine", "msg": "", "rc": 0, "results": ["docker-engine is not installed"]} | |
| ok: [node2] => (item=docker-selinux) => {"changed": false, "item": "docker-selinux", "msg": "", "rc": 0, "results": ["docker-selinux is not installed"]} | |
| ok: [node1] => (item=docker-selinux) => {"changed": false, "item": "docker-selinux", "msg": "", "rc": 0, "results": ["docker-selinux is not installed"]} | |
| TASK [docker : ensure docker-ce repository public key is installed] ************************************************************************************ | |
| Friday 16 November 2018 05:14:31 -0500 (0:00:03.075) 0:01:08.276 ******* | |
| TASK [docker : ensure docker-ce repository is enabled] ************************************************************************************************* | |
| Friday 16 November 2018 05:14:32 -0500 (0:00:00.148) 0:01:08.425 ******* | |
| TASK [docker : ensure docker-engine repository public key is installed] ******************************************************************************** | |
| Friday 16 November 2018 05:14:32 -0500 (0:00:00.140) 0:01:08.566 ******* | |
| TASK [docker : ensure docker-engine repository is enabled] ********************************************************************************************* | |
| Friday 16 November 2018 05:14:32 -0500 (0:00:00.173) 0:01:08.739 ******* | |
| TASK [docker : Configure docker repository on RedHat/CentOS] ******************************************************************************************* | |
| Friday 16 November 2018 05:14:32 -0500 (0:00:00.185) 0:01:08.925 ******* | |
| ok: [node2] => {"changed": false, "checksum": "0fb0b3352ff17ffbcae059530d1e35eabee76cd5", "dest": "/etc/yum.repos.d/docker.repo", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/yum.repos.d/docker.repo", "size": 345, "state": "file", "uid": 0} | |
| ok: [node1] => {"changed": false, "checksum": "0fb0b3352ff17ffbcae059530d1e35eabee76cd5", "dest": "/etc/yum.repos.d/docker.repo", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/yum.repos.d/docker.repo", "size": 345, "state": "file", "uid": 0} | |
| TASK [docker : Copy yum.conf for editing] ************************************************************************************************************** | |
| Friday 16 November 2018 05:14:33 -0500 (0:00:00.988) 0:01:09.913 ******* | |
| changed: [node1] => {"changed": true, "checksum": "e0637e631f4ab0aaebef1a6b8822a36f031f332e", "dest": "/etc/yum_docker.conf", "gid": 0, "group": "root", "md5sum": "a7dc0d7b8902e9c8c096c93eb431d19e", "mode": "0644", "owner": "root", "size": 970, "src": "/etc/yum.conf", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "e0637e631f4ab0aaebef1a6b8822a36f031f332e", "dest": "/etc/yum_docker.conf", "gid": 0, "group": "root", "md5sum": "a7dc0d7b8902e9c8c096c93eb431d19e", "mode": "0644", "owner": "root", "size": 970, "src": "/etc/yum.conf", "state": "file", "uid": 0} | |
| TASK [docker : Edit copy of yum.conf to set obsoletes=0] *********************************************************************************************** | |
| Friday 16 November 2018 05:14:34 -0500 (0:00:01.018) 0:01:10.932 ******* | |
| changed: [node1] => {"backup": "", "changed": true, "msg": "line replaced"} | |
| changed: [node2] => {"backup": "", "changed": true, "msg": "line replaced"} | |
| TASK [docker : ensure docker packages are installed] *************************************************************************************************** | |
| Friday 16 November 2018 05:14:35 -0500 (0:00:00.724) 0:01:11.657 ******* | |
| ok: [node1] => (item={u'yum_conf': u'/etc/yum_docker.conf', u'name': u'docker-ce-selinux-17.03.2.ce-1.el7.centos'}) => {"attempts": 1, "changed": false, "item": {"name": "docker-ce-selinux-17.03.2.ce-1.el7.centos", "yum_conf": "/etc/yum_docker.conf"}, "msg": "", "rc": 0, "results": ["docker-ce-selinux-17.03.2.ce-1.el7.centos.noarch providing docker-ce-selinux-17.03.2.ce-1.el7.centos is already installed"]} | |
| ok: [node2] => (item={u'yum_conf': u'/etc/yum_docker.conf', u'name': u'docker-ce-selinux-17.03.2.ce-1.el7.centos'}) => {"attempts": 1, "changed": false, "item": {"name": "docker-ce-selinux-17.03.2.ce-1.el7.centos", "yum_conf": "/etc/yum_docker.conf"}, "msg": "", "rc": 0, "results": ["docker-ce-selinux-17.03.2.ce-1.el7.centos.noarch providing docker-ce-selinux-17.03.2.ce-1.el7.centos is already installed"]} | |
| ok: [node2] => (item={u'yum_conf': u'/etc/yum_docker.conf', u'name': u'docker-ce-17.03.2.ce-1.el7.centos'}) => {"attempts": 1, "changed": false, "item": {"name": "docker-ce-17.03.2.ce-1.el7.centos", "yum_conf": "/etc/yum_docker.conf"}, "msg": "", "rc": 0, "results": ["docker-ce-17.03.2.ce-1.el7.centos.x86_64 providing docker-ce-17.03.2.ce-1.el7.centos is already installed"]} | |
| ok: [node1] => (item={u'yum_conf': u'/etc/yum_docker.conf', u'name': u'docker-ce-17.03.2.ce-1.el7.centos'}) => {"attempts": 1, "changed": false, "item": {"name": "docker-ce-17.03.2.ce-1.el7.centos", "yum_conf": "/etc/yum_docker.conf"}, "msg": "", "rc": 0, "results": ["docker-ce-17.03.2.ce-1.el7.centos.x86_64 providing docker-ce-17.03.2.ce-1.el7.centos is already installed"]} | |
| TASK [docker : ensure service is started if docker packages are already present] *********************************************************************** | |
| Friday 16 November 2018 05:14:37 -0500 (0:00:01.808) 0:01:13.466 ******* | |
| ok: [node2] => {"changed": false, "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Fri 2018-11-16 05:08:01 EST", "ActiveEnterTimestampMonotonic": "7350398", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "system.slice docker-storage-setup.service systemd-journald.socket basic.target network.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Fri 2018-11-16 05:07:59 EST", "AssertTimestampMonotonic": "5730676", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Fri 2018-11-16 05:07:59 EST", "ConditionTimestampMonotonic": "5730675", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "Environment": "GOTRACEBACK=crash", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "888", "ExecMainStartTimestamp": "Fri 2018-11-16 05:07:59 EST", "ExecMainStartTimestampMonotonic": "5731230", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Fri 2018-11-16 05:07:59 EST] ; stop_time=[n/a] ; pid=888 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Fri 2018-11-16 05:07:59 EST", "InactiveExitTimestampMonotonic": "5731259", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "1048576", "LimitNPROC": "1048576", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "11315", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "888", "MemoryAccounting": "no", "MemoryCurrent": "63320064", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "on-failure", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitInterval": "60000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "20", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "system.slice docker-storage-setup.service", "WatchdogTimestamp": "Fri 2018-11-16 05:08:01 EST", "WatchdogTimestampMonotonic": "7350364", "WatchdogUSec": "0"}} | |
| ok: [node1] => {"changed": false, "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Fri 2018-11-16 05:07:59 EST", "ActiveEnterTimestampMonotonic": "9707684", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "systemd-journald.socket basic.target network.target docker-storage-setup.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Fri 2018-11-16 05:07:57 EST", "AssertTimestampMonotonic": "8067269", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Fri 2018-11-16 05:07:57 EST", "ConditionTimestampMonotonic": "8067269", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "Environment": "GOTRACEBACK=crash", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "908", "ExecMainStartTimestamp": "Fri 2018-11-16 05:07:57 EST", "ExecMainStartTimestampMonotonic": "8067915", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Fri 2018-11-16 05:07:57 EST] ; stop_time=[n/a] ; pid=908 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Fri 2018-11-16 05:07:57 EST", "InactiveExitTimestampMonotonic": "8067951", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "1048576", "LimitNPROC": "1048576", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "15064", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "908", "MemoryAccounting": "no", "MemoryCurrent": "65540096", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "on-failure", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitInterval": "60000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "21", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "system.slice docker-storage-setup.service", "WatchdogTimestamp": "Fri 2018-11-16 05:07:59 EST", "WatchdogTimestampMonotonic": "9707654", "WatchdogUSec": "0"}} | |
| TASK [docker : set fact for docker_version] ************************************************************************************************************ | |
| Friday 16 November 2018 05:14:38 -0500 (0:00:00.987) 0:01:14.454 ******* | |
| ok: [node1] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.021924", "end": "2018-11-16 05:14:38.667257", "rc": 0, "start": "2018-11-16 05:14:38.645333", "stderr": "", "stderr_lines": [], "stdout": "17.03.2-ce", "stdout_lines": ["17.03.2-ce"]} | |
| ok: [node2] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.020611", "end": "2018-11-16 05:14:38.504627", "rc": 0, "start": "2018-11-16 05:14:38.484016", "stderr": "", "stderr_lines": [], "stdout": "17.03.2-ce", "stdout_lines": ["17.03.2-ce"]} | |
| TASK [docker : check minimum docker version for docker_dns mode. You need at least docker version >= 1.12 for resolvconf_mode=docker_dns] ************** | |
| Friday 16 November 2018 05:14:38 -0500 (0:00:00.746) 0:01:15.200 ******* | |
| TASK [docker : Create docker service systemd directory if it doesn't exist] **************************************************************************** | |
| Friday 16 November 2018 05:14:38 -0500 (0:00:00.165) 0:01:15.366 ******* | |
| ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 6, "state": "directory", "uid": 0} | |
| ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 6, "state": "directory", "uid": 0} | |
| TASK [docker : Write docker proxy drop-in] ************************************************************************************************************* | |
| Friday 16 November 2018 05:14:39 -0500 (0:00:00.723) 0:01:16.090 ******* | |
| TASK [docker : get systemd version] ******************************************************************************************************************** | |
| Friday 16 November 2018 05:14:39 -0500 (0:00:00.174) 0:01:16.265 ******* | |
| ok: [node1] => {"changed": false, "cmd": "systemctl --version | head -n 1 | cut -d \" \" -f 2", "delta": "0:00:00.006831", "end": "2018-11-16 05:14:40.443796", "rc": 0, "start": "2018-11-16 05:14:40.436965", "stderr": "", "stderr_lines": [], "stdout": "219", "stdout_lines": ["219"]} | |
| ok: [node2] => {"changed": false, "cmd": "systemctl --version | head -n 1 | cut -d \" \" -f 2", "delta": "0:00:00.006183", "end": "2018-11-16 05:14:40.306762", "rc": 0, "start": "2018-11-16 05:14:40.300579", "stderr": "", "stderr_lines": [], "stdout": "219", "stdout_lines": ["219"]} | |
| TASK [docker : Write docker.service systemd file] ****************************************************************************************************** | |
| Friday 16 November 2018 05:14:40 -0500 (0:00:00.738) 0:01:17.003 ******* | |
| ok: [node1] => {"changed": false, "checksum": "de22a35577586f4dc94e0e9b8eb978b991996e8e", "dest": "/etc/systemd/system/docker.service", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 714, "state": "file", "uid": 0} | |
| ok: [node2] => {"changed": false, "checksum": "de22a35577586f4dc94e0e9b8eb978b991996e8e", "dest": "/etc/systemd/system/docker.service", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 714, "state": "file", "uid": 0} | |
| TASK [docker : Write docker options systemd drop-in] *************************************************************************************************** | |
| Friday 16 November 2018 05:14:41 -0500 (0:00:01.056) 0:01:18.060 ******* | |
| changed: [node1] => {"changed": true, "checksum": "3befcaa56646b935a42677080ac8c5d96aec5e5d", "dest": "/etc/systemd/system/docker.service.d/docker-options.conf", "gid": 0, "group": "root", "md5sum": "2876f068a4e20e895bde2f19da08cfe1", "mode": "0644", "owner": "root", "size": 168, "src": "/root/.ansible/tmp/ansible-tmp-1542363282.07-89610665986193/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "3befcaa56646b935a42677080ac8c5d96aec5e5d", "dest": "/etc/systemd/system/docker.service.d/docker-options.conf", "gid": 0, "group": "root", "md5sum": "2876f068a4e20e895bde2f19da08cfe1", "mode": "0644", "owner": "root", "size": 168, "src": "/root/.ansible/tmp/ansible-tmp-1542363282.13-189216344829555/source", "state": "file", "uid": 0} | |
| TASK [docker : Write docker dns systemd drop-in] ******************************************************************************************************* | |
| Friday 16 November 2018 05:14:42 -0500 (0:00:01.089) 0:01:19.150 ******* | |
| changed: [node1] => {"changed": true, "checksum": "5e6cc5723471d68e071958306fb79f0142f58dc5", "dest": "/etc/systemd/system/docker.service.d/docker-dns.conf", "gid": 0, "group": "root", "md5sum": "1b0eff814d2d6f90580a06fc3476ebf7", "mode": "0644", "owner": "root", "size": 272, "src": "/root/.ansible/tmp/ansible-tmp-1542363283.2-215598889588478/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "5e6cc5723471d68e071958306fb79f0142f58dc5", "dest": "/etc/systemd/system/docker.service.d/docker-dns.conf", "gid": 0, "group": "root", "md5sum": "1b0eff814d2d6f90580a06fc3476ebf7", "mode": "0644", "owner": "root", "size": 272, "src": "/root/.ansible/tmp/ansible-tmp-1542363283.27-225947219068669/source", "state": "file", "uid": 0} | |
| RUNNING HANDLER [docker : restart docker] ************************************************************************************************************** | |
| Friday 16 November 2018 05:14:43 -0500 (0:00:01.109) 0:01:20.259 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.004025", "end": "2018-11-16 05:14:44.533411", "rc": 0, "start": "2018-11-16 05:14:44.529386", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node2] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.003624", "end": "2018-11-16 05:14:44.375900", "rc": 0, "start": "2018-11-16 05:14:44.372276", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [docker : Docker | reload systemd] ***************************************************************************************************** | |
| Friday 16 November 2018 05:14:45 -0500 (0:00:01.153) 0:01:21.413 ******* | |
| changed: [node1] => {"changed": true, "cmd": "systemctl daemon-reload", "delta": "0:00:00.063072", "end": "2018-11-16 05:14:45.714754", "rc": 0, "start": "2018-11-16 05:14:45.651682", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node2] => {"changed": true, "cmd": "systemctl daemon-reload", "delta": "0:00:00.055051", "end": "2018-11-16 05:14:45.550125", "rc": 0, "start": "2018-11-16 05:14:45.495074", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [docker : Docker | reload docker.socket] *********************************************************************************************** | |
| Friday 16 November 2018 05:14:45 -0500 (0:00:00.774) 0:01:22.188 ******* | |
| RUNNING HANDLER [docker : Docker | reload docker] ****************************************************************************************************** | |
| Friday 16 November 2018 05:14:45 -0500 (0:00:00.167) 0:01:22.355 ******* | |
| changed: [node1] => {"changed": true, "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Fri 2018-11-16 05:07:59 EST", "ActiveEnterTimestampMonotonic": "9707684", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "docker-storage-setup.service network.target system.slice basic.target systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Fri 2018-11-16 05:07:57 EST", "AssertTimestampMonotonic": "8067269", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Fri 2018-11-16 05:07:57 EST", "ConditionTimestampMonotonic": "8067269", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x20155.35.34.108\\x20--dns\\x20155.35.72.108\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20ca.com\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "908", "ExecMainStartTimestamp": "Fri 2018-11-16 05:07:57 EST", "ExecMainStartTimestampMonotonic": "8067915", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Fri 2018-11-16 05:07:57 EST", "InactiveExitTimestampMonotonic": "8067951", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "1048576", "LimitNPROC": "1048576", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "15064", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "908", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "on-failure", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitInterval": "60000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "system.slice docker-storage-setup.service", "WatchdogTimestamp": "Fri 2018-11-16 05:07:59 EST", "WatchdogTimestampMonotonic": "9707654", "WatchdogUSec": "0"}} | |
| changed: [node2] => {"changed": true, "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Fri 2018-11-16 05:08:01 EST", "ActiveEnterTimestampMonotonic": "7350398", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "system.slice network.target basic.target docker-storage-setup.service systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Fri 2018-11-16 05:07:59 EST", "AssertTimestampMonotonic": "5730676", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Fri 2018-11-16 05:07:59 EST", "ConditionTimestampMonotonic": "5730675", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x20155.35.34.108\\x20--dns\\x20155.35.72.108\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20ca.com\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "888", "ExecMainStartTimestamp": "Fri 2018-11-16 05:07:59 EST", "ExecMainStartTimestampMonotonic": "5731230", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Fri 2018-11-16 05:07:59 EST", "InactiveExitTimestampMonotonic": "5731259", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "1048576", "LimitNPROC": "1048576", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "11315", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "888", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "on-failure", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitInterval": "60000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "docker-storage-setup.service system.slice", "WatchdogTimestamp": "Fri 2018-11-16 05:08:01 EST", "WatchdogTimestampMonotonic": "7350364", "WatchdogUSec": "0"}} | |
| RUNNING HANDLER [docker : Docker | pause while Docker restarts] **************************************************************************************** | |
| Friday 16 November 2018 05:14:48 -0500 (0:00:02.961) 0:01:25.316 ******* | |
| Pausing for 10 seconds | |
| (ctrl+C then 'C' = continue early, ctrl+C then 'A' = abort) | |
| [docker : Docker | pause while Docker restarts] | |
| Waiting for docker restart: | |
| ok: [node1] => {"changed": false, "delta": 10, "echo": true, "rc": 0, "start": "2018-11-16 05:14:49.354368", "stderr": "", "stdout": "Paused for 10.27 seconds", "stop": "2018-11-16 05:14:59.623880", "user_input": ""} | |
| RUNNING HANDLER [docker : Docker | wait for docker] **************************************************************************************************** | |
| Friday 16 November 2018 05:14:59 -0500 (0:00:10.705) 0:01:36.021 ******* | |
| changed: [node1] => {"attempts": 1, "changed": true, "cmd": ["/usr/bin/docker", "images"], "delta": "0:00:00.032181", "end": "2018-11-16 05:15:00.295089", "rc": 0, "start": "2018-11-16 05:15:00.262908", "stderr": "", "stderr_lines": [], "stdout": "REPOSITORY TAG IMAGE ID CREATED SIZE\nweaveworks/weave-npc 2.4.0 647ad6d59818 3 months ago 49.1 MB\nweaveworks/weave-kube 2.4.0 86ff1a48ce14 3 months ago 131 MB\ngcr.io/google-containers/hyperkube v1.10.4 3ea2e2baccf4 5 months ago 665 MB\nnginx 1.13 ae513a47849c 6 months ago 109 MB\ngcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64 1.14.10 6816817d9dce 7 months ago 40.4 MB\ngcr.io/google_containers/k8s-dns-kube-dns-amd64 1.14.10 55ffe31ac578 7 months ago 49.5 MB\ngcr.io/google_containers/k8s-dns-sidecar-amd64 1.14.10 8a7739f672b4 7 months ago 41.6 MB\nquay.io/coreos/etcd v3.2.18 e21fb69683f3 7 months ago 37.2 MB\nquay.io/calico/node v2.6.8 e96a297310fd 8 months ago 282 MB\nquay.io/calico/cni v1.11.4 4c4cb67d7a88 9 months ago 70.8 MB\ngcr.io/google_containers/kubernetes-dashboard-amd64 v1.8.3 0c60bcf89900 9 months ago 102 MB\nquay.io/coreos/flannel v0.10.0 f0fad859c909 9 months ago 44.6 MB\nquay.io/calico/ctl v1.6.3 46d3aace8bc6 11 months ago 44.4 MB\nquay.io/coreos/flannel-cni v0.3.0 221392217215 14 months ago 49.8 MB\ngcr.io/google_containers/cluster-proportional-autoscaler-amd64 1.1.2 78cf3f492e6b 17 months ago 50.5 MB\ngcr.io/google_containers/pause-amd64 3.0 99e59f495ffa 2 years ago 747 kB", "stdout_lines": ["REPOSITORY TAG IMAGE ID CREATED SIZE", "weaveworks/weave-npc 2.4.0 647ad6d59818 3 months ago 49.1 MB", "weaveworks/weave-kube 2.4.0 86ff1a48ce14 3 months ago 131 MB", "gcr.io/google-containers/hyperkube v1.10.4 3ea2e2baccf4 5 months ago 665 MB", "nginx 1.13 ae513a47849c 6 months ago 109 MB", "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64 1.14.10 6816817d9dce 7 months ago 40.4 MB", "gcr.io/google_containers/k8s-dns-kube-dns-amd64 1.14.10 55ffe31ac578 7 months ago 49.5 MB", "gcr.io/google_containers/k8s-dns-sidecar-amd64 1.14.10 8a7739f672b4 7 months ago 41.6 MB", "quay.io/coreos/etcd v3.2.18 e21fb69683f3 7 months ago 37.2 MB", "quay.io/calico/node v2.6.8 e96a297310fd 8 months ago 282 MB", "quay.io/calico/cni v1.11.4 4c4cb67d7a88 9 months ago 70.8 MB", "gcr.io/google_containers/kubernetes-dashboard-amd64 v1.8.3 0c60bcf89900 9 months ago 102 MB", "quay.io/coreos/flannel v0.10.0 f0fad859c909 9 months ago 44.6 MB", "quay.io/calico/ctl v1.6.3 46d3aace8bc6 11 months ago 44.4 MB", "quay.io/coreos/flannel-cni v0.3.0 221392217215 14 months ago 49.8 MB", "gcr.io/google_containers/cluster-proportional-autoscaler-amd64 1.1.2 78cf3f492e6b 17 months ago 50.5 MB", "gcr.io/google_containers/pause-amd64 3.0 99e59f495ffa 2 years ago 747 kB"]} | |
| changed: [node2] => {"attempts": 1, "changed": true, "cmd": ["/usr/bin/docker", "images"], "delta": "0:00:00.029795", "end": "2018-11-16 05:15:00.135723", "rc": 0, "start": "2018-11-16 05:15:00.105928", "stderr": "", "stderr_lines": [], "stdout": "REPOSITORY TAG IMAGE ID CREATED SIZE\nweaveworks/weave-npc 2.4.0 647ad6d59818 3 months ago 49.1 MB\nweaveworks/weave-kube 2.4.0 86ff1a48ce14 3 months ago 131 MB\ngcr.io/google-containers/hyperkube v1.10.4 3ea2e2baccf4 5 months ago 665 MB\nnginx 1.13 ae513a47849c 6 months ago 109 MB\ngcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64 1.14.10 6816817d9dce 7 months ago 40.4 MB\ngcr.io/google_containers/k8s-dns-kube-dns-amd64 1.14.10 55ffe31ac578 7 months ago 49.5 MB\ngcr.io/google_containers/k8s-dns-sidecar-amd64 1.14.10 8a7739f672b4 7 months ago 41.6 MB\nquay.io/coreos/etcd v3.2.18 e21fb69683f3 7 months ago 37.2 MB\nquay.io/calico/node v2.6.8 e96a297310fd 8 months ago 282 MB\nquay.io/calico/cni v1.11.4 4c4cb67d7a88 9 months ago 70.8 MB\ngcr.io/google_containers/kubernetes-dashboard-amd64 v1.8.3 0c60bcf89900 9 months ago 102 MB\nquay.io/coreos/flannel v0.10.0 f0fad859c909 9 months ago 44.6 MB\nquay.io/calico/ctl v1.6.3 46d3aace8bc6 11 months ago 44.4 MB\nquay.io/coreos/flannel-cni v0.3.0 221392217215 14 months ago 49.8 MB\ngcr.io/google_containers/cluster-proportional-autoscaler-amd64 1.1.2 78cf3f492e6b 17 months ago 50.5 MB\ngcr.io/google_containers/pause-amd64 3.0 99e59f495ffa 2 years ago 747 kB", "stdout_lines": ["REPOSITORY TAG IMAGE ID CREATED SIZE", "weaveworks/weave-npc 2.4.0 647ad6d59818 3 months ago 49.1 MB", "weaveworks/weave-kube 2.4.0 86ff1a48ce14 3 months ago 131 MB", "gcr.io/google-containers/hyperkube v1.10.4 3ea2e2baccf4 5 months ago 665 MB", "nginx 1.13 ae513a47849c 6 months ago 109 MB", "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64 1.14.10 6816817d9dce 7 months ago 40.4 MB", "gcr.io/google_containers/k8s-dns-kube-dns-amd64 1.14.10 55ffe31ac578 7 months ago 49.5 MB", "gcr.io/google_containers/k8s-dns-sidecar-amd64 1.14.10 8a7739f672b4 7 months ago 41.6 MB", "quay.io/coreos/etcd v3.2.18 e21fb69683f3 7 months ago 37.2 MB", "quay.io/calico/node v2.6.8 e96a297310fd 8 months ago 282 MB", "quay.io/calico/cni v1.11.4 4c4cb67d7a88 9 months ago 70.8 MB", "gcr.io/google_containers/kubernetes-dashboard-amd64 v1.8.3 0c60bcf89900 9 months ago 102 MB", "quay.io/coreos/flannel v0.10.0 f0fad859c909 9 months ago 44.6 MB", "quay.io/calico/ctl v1.6.3 46d3aace8bc6 11 months ago 44.4 MB", "quay.io/coreos/flannel-cni v0.3.0 221392217215 14 months ago 49.8 MB", "gcr.io/google_containers/cluster-proportional-autoscaler-amd64 1.1.2 78cf3f492e6b 17 months ago 50.5 MB", "gcr.io/google_containers/pause-amd64 3.0 99e59f495ffa 2 years ago 747 kB"]} | |
| TASK [docker : ensure docker service is started and enabled] ******************************************************************************************* | |
| Friday 16 November 2018 05:15:00 -0500 (0:00:00.824) 0:01:36.846 ******* | |
| ok: [node1] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Fri 2018-11-16 05:14:48 EST", "ActiveEnterTimestampMonotonic": "418936188", "ActiveExitTimestamp": "Fri 2018-11-16 05:14:46 EST", "ActiveExitTimestampMonotonic": "416739560", "ActiveState": "active", "After": "docker-storage-setup.service network.target system.slice basic.target systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Fri 2018-11-16 05:14:47 EST", "AssertTimestampMonotonic": "417766969", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Fri 2018-11-16 05:14:47 EST", "ConditionTimestampMonotonic": "417766968", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x20155.35.34.108\\x20--dns\\x20155.35.72.108\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20ca.com\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "5432", "ExecMainStartTimestamp": "Fri 2018-11-16 05:14:47 EST", "ExecMainStartTimestampMonotonic": "417769871", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Fri 2018-11-16 05:14:47 EST] ; stop_time=[n/a] ; pid=5432 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Fri 2018-11-16 05:14:47 EST", "InactiveEnterTimestampMonotonic": "417750789", "InactiveExitTimestamp": "Fri 2018-11-16 05:14:47 EST", "InactiveExitTimestampMonotonic": "417769968", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "1048576", "LimitNPROC": "1048576", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "15064", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "5432", "MemoryAccounting": "no", "MemoryCurrent": "22667264", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "on-failure", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitInterval": "60000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "20", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "system.slice docker-storage-setup.service", "WatchdogTimestamp": "Fri 2018-11-16 05:14:48 EST", "WatchdogTimestampMonotonic": "418936155", "WatchdogUSec": "0"}} | |
| ok: [node2] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Fri 2018-11-16 05:14:48 EST", "ActiveEnterTimestampMonotonic": "414769508", "ActiveExitTimestamp": "Fri 2018-11-16 05:14:46 EST", "ActiveExitTimestampMonotonic": "412593818", "ActiveState": "active", "After": "system.slice network.target basic.target docker-storage-setup.service systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Fri 2018-11-16 05:14:47 EST", "AssertTimestampMonotonic": "413621760", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Fri 2018-11-16 05:14:47 EST", "ConditionTimestampMonotonic": "413621760", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x20155.35.34.108\\x20--dns\\x20155.35.72.108\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20ca.com\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "3364", "ExecMainStartTimestamp": "Fri 2018-11-16 05:14:47 EST", "ExecMainStartTimestampMonotonic": "413622698", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Fri 2018-11-16 05:14:47 EST] ; stop_time=[n/a] ; pid=3364 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Fri 2018-11-16 05:14:47 EST", "InactiveEnterTimestampMonotonic": "413611287", "InactiveExitTimestamp": "Fri 2018-11-16 05:14:47 EST", "InactiveExitTimestampMonotonic": "413622752", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "1048576", "LimitNPROC": "1048576", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "11315", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "3364", "MemoryAccounting": "no", "MemoryCurrent": "18677760", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "on-failure", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitInterval": "60000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "17", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "notify", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "WantedBy": "multi-user.target", "Wants": "docker-storage-setup.service system.slice", "WatchdogTimestamp": "Fri 2018-11-16 05:14:48 EST", "WatchdogTimestampMonotonic": "414769479", "WatchdogUSec": "0"}} | |
| TASK [rkt : gather os specific variables for rkt] ****************************************************************************************************** | |
| Friday 16 November 2018 05:15:01 -0500 (0:00:00.785) 0:01:37.632 ******* | |
| TASK [rkt : install rkt pkg on ubuntu] ***************************************************************************************************************** | |
| Friday 16 November 2018 05:15:01 -0500 (0:00:00.214) 0:01:37.847 ******* | |
| TASK [rkt : install rkt pkg on centos] ***************************************************************************************************************** | |
| Friday 16 November 2018 05:15:01 -0500 (0:00:00.163) 0:01:38.010 ******* | |
| TASK [rkt : install rkt pkg on openSUSE] *************************************************************************************************************** | |
| Friday 16 November 2018 05:15:01 -0500 (0:00:00.160) 0:01:38.171 ******* | |
| TASK [rkt : Set up cron job to do garbage cleanup] ***************************************************************************************************** | |
| Friday 16 November 2018 05:15:01 -0500 (0:00:00.185) 0:01:38.357 ******* | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:15:02 -0500 (0:00:00.240) 0:01:38.598 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_prep.yml for node1, node2 | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:02 -0500 (0:00:00.294) 0:01:38.892 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : container_download | Create dest directory for saved/loaded container images] ********************************************************* | |
| Friday 16 November 2018 05:15:03 -0500 (0:00:00.564) 0:01:39.456 ******* | |
| ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 0} | |
| ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 0} | |
| TASK [download : container_download | create local directory for saved/loaded container images] ******************************************************** | |
| Friday 16 November 2018 05:15:03 -0500 (0:00:00.663) 0:01:40.119 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:15:03 -0500 (0:00:00.107) 0:01:40.226 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'calicoctl', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/ctl', u'tag': u'v1.6.3', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'hyperkube', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google-containers/hyperkube', u'tag': u'v1.10.4', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'kubednsautoscaler', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/cluster-proportional-autoscaler-amd64', u'tag': u'1.1.2', u'groups': [u'kube-node'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'calico_node', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/node', u'tag': u'v2.6.8', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'kubedns', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/k8s-dns-kube-dns-amd64', u'tag': u'1.14.10', u'groups': [u'kube-node'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'pod_infra', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/pause-amd64', u'tag': u'3.0', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'etcd', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/coreos/etcd', u'tag': u'v3.2.18', u'groups': [u'etcd'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'dnsmasq_nanny', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64', u'tag': u'1.14.10', u'groups': [u'kube-node'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'nginx', 'value': {u'container': True, u'enabled': True, u'repo': u'nginx', u'tag': 1.13, u'groups': [u'kube-node'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'dnsmasq_sidecar', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/k8s-dns-sidecar-amd64', u'tag': u'1.14.10', u'groups': [u'kube-node'], u'sha256': u''}}) | |
| included: /root/kubespray-2.6.0/roles/download/tasks/download_container.yml for node1, node2 => (item={'key': u'calico_cni', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/cni', u'tag': u'v1.11.4', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:06 -0500 (0:00:03.141) 0:01:43.368 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:07 -0500 (0:00:00.626) 0:01:43.995 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:08 -0500 (0:00:00.469) 0:01:44.464 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.3"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.3"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:08 -0500 (0:00:00.477) 0:01:44.942 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:09 -0500 (0:00:00.603) 0:01:45.545 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:09 -0500 (0:00:00.459) 0:01:46.005 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:09 -0500 (0:00:00.226) 0:01:46.231 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:09 -0500 (0:00:00.101) 0:01:46.333 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:10 -0500 (0:00:00.252) 0:01:46.586 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:10 -0500 (0:00:00.627) 0:01:47.214 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:11 -0500 (0:00:00.513) 0:01:47.727 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "gcr.io/google-containers/hyperkube:v1.10.4"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "gcr.io/google-containers/hyperkube:v1.10.4"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:11 -0500 (0:00:00.482) 0:01:48.210 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:12 -0500 (0:00:00.603) 0:01:48.813 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:12 -0500 (0:00:00.453) 0:01:49.267 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:13 -0500 (0:00:00.274) 0:01:49.541 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:13 -0500 (0:00:00.105) 0:01:49.647 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:13 -0500 (0:00:00.264) 0:01:49.911 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:14 -0500 (0:00:00.600) 0:01:50.511 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:14 -0500 (0:00:00.474) 0:01:50.986 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:15 -0500 (0:00:00.457) 0:01:51.443 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:15 -0500 (0:00:00.599) 0:01:52.043 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:16 -0500 (0:00:00.457) 0:01:52.501 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:16 -0500 (0:00:00.221) 0:01:52.722 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:16 -0500 (0:00:00.109) 0:01:52.831 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:16 -0500 (0:00:00.252) 0:01:53.084 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:17 -0500 (0:00:00.602) 0:01:53.686 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:17 -0500 (0:00:00.469) 0:01:54.156 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.8"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.8"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:18 -0500 (0:00:00.573) 0:01:54.729 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:18 -0500 (0:00:00.636) 0:01:55.365 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:19 -0500 (0:00:00.460) 0:01:55.826 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:19 -0500 (0:00:00.231) 0:01:56.057 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:19 -0500 (0:00:00.100) 0:01:56.158 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:20 -0500 (0:00:00.248) 0:01:56.406 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:20 -0500 (0:00:00.584) 0:01:56.991 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:21 -0500 (0:00:00.451) 0:01:57.443 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.10"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.10"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:21 -0500 (0:00:00.553) 0:01:57.996 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:22 -0500 (0:00:00.687) 0:01:58.684 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:22 -0500 (0:00:00.541) 0:01:59.225 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:23 -0500 (0:00:00.234) 0:01:59.460 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:23 -0500 (0:00:00.097) 0:01:59.558 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:23 -0500 (0:00:00.293) 0:01:59.851 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:24 -0500 (0:00:00.592) 0:02:00.444 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:24 -0500 (0:00:00.595) 0:02:01.039 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:25 -0500 (0:00:00.583) 0:02:01.623 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:25 -0500 (0:00:00.692) 0:02:02.315 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:26 -0500 (0:00:00.553) 0:02:02.868 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:26 -0500 (0:00:00.238) 0:02:03.107 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:26 -0500 (0:00:00.101) 0:02:03.208 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:27 -0500 (0:00:00.262) 0:02:03.470 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:27 -0500 (0:00:00.595) 0:02:04.066 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:28 -0500 (0:00:00.550) 0:02:04.616 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.18"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.18"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:28 -0500 (0:00:00.553) 0:02:05.170 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:29 -0500 (0:00:00.693) 0:02:05.863 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:29 -0500 (0:00:00.453) 0:02:06.317 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:30 -0500 (0:00:00.228) 0:02:06.545 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:30 -0500 (0:00:00.104) 0:02:06.650 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:30 -0500 (0:00:00.243) 0:02:06.893 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:31 -0500 (0:00:00.628) 0:02:07.521 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:31 -0500 (0:00:00.472) 0:02:07.994 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.10"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.10"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:32 -0500 (0:00:00.471) 0:02:08.466 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:32 -0500 (0:00:00.639) 0:02:09.105 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:33 -0500 (0:00:00.472) 0:02:09.578 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:33 -0500 (0:00:00.232) 0:02:09.810 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:33 -0500 (0:00:00.100) 0:02:09.911 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:33 -0500 (0:00:00.272) 0:02:10.183 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:34 -0500 (0:00:00.660) 0:02:10.844 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:35 -0500 (0:00:00.624) 0:02:11.468 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:35 -0500 (0:00:00.550) 0:02:12.018 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:36 -0500 (0:00:00.684) 0:02:12.702 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:36 -0500 (0:00:00.590) 0:02:13.293 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:37 -0500 (0:00:00.252) 0:02:13.546 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:37 -0500 (0:00:00.117) 0:02:13.663 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:37 -0500 (0:00:00.305) 0:02:13.969 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:38 -0500 (0:00:00.652) 0:02:14.622 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:38 -0500 (0:00:00.491) 0:02:15.114 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.10"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.10"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:39 -0500 (0:00:00.491) 0:02:15.605 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:39 -0500 (0:00:00.561) 0:02:16.166 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:40 -0500 (0:00:00.451) 0:02:16.618 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:40 -0500 (0:00:00.244) 0:02:16.862 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:40 -0500 (0:00:00.108) 0:02:16.971 ******* | |
| TASK [download : container_download | Make download decision if pull is required by tag or sha256] ***************************************************** | |
| Friday 16 November 2018 05:15:40 -0500 (0:00:00.237) 0:02:17.208 ******* | |
| included: /root/kubespray-2.6.0/roles/download/tasks/set_docker_image_facts.yml for node1, node2 | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:41 -0500 (0:00:00.586) 0:02:17.795 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:41 -0500 (0:00:00.503) 0:02:18.298 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.4"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.4"}, "changed": false} | |
| TASK [download : Register docker images info] ********************************************************************************************************** | |
| Friday 16 November 2018 05:15:42 -0500 (0:00:00.504) 0:02:18.803 ******* | |
| [WARNING]: raw module does not support the environment keyword | |
| [WARNING]: raw module does not support the environment keyword | |
| ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [download : set_fact] ***************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:43 -0500 (0:00:00.602) 0:02:19.405 ******* | |
| ok: [node1] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
| TASK [download : Check the local digest sha256 corresponds to the given image tag] ********************************************************************* | |
| Friday 16 November 2018 05:15:43 -0500 (0:00:00.501) 0:02:19.906 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *************************************** | |
| Friday 16 November 2018 05:15:43 -0500 (0:00:00.247) 0:02:20.154 ******* | |
| TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ************************************** | |
| Friday 16 November 2018 05:15:43 -0500 (0:00:00.100) 0:02:20.254 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:15:44 -0500 (0:00:00.198) 0:02:20.453 ******* | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ item.value.container | default(False) }} | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {{ item.value.container | default(False) }} | |
| PLAY [etcd:k8s-cluster:vault:calico-rr] **************************************************************************************************************** | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:15:46 -0500 (0:00:01.997) 0:02:22.450 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:15:46 -0500 (0:00:00.155) 0:02:22.606 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:15:47 -0500 (0:00:01.489) 0:02:24.096 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:15:49 -0500 (0:00:01.483) 0:02:25.579 ******* | |
| TASK [adduser : User | Create User Group] ************************************************************************************************************** | |
| Friday 16 November 2018 05:15:49 -0500 (0:00:00.192) 0:02:25.772 ******* | |
| TASK [adduser : User | Create User] ******************************************************************************************************************** | |
| Friday 16 November 2018 05:15:49 -0500 (0:00:00.176) 0:02:25.949 ******* | |
| TASK [vault : install hvac] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:49 -0500 (0:00:00.172) 0:02:26.121 ******* | |
| TASK [vault : include_tasks] *************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:49 -0500 (0:00:00.158) 0:02:26.280 ******* | |
| TASK [vault : include_tasks] *************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:50 -0500 (0:00:00.161) 0:02:26.442 ******* | |
| PLAY [etcd] ******************************************************************************************************************************************** | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:15:50 -0500 (0:00:00.209) 0:02:26.651 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:15:50 -0500 (0:00:00.097) 0:02:26.748 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:15:51 -0500 (0:00:01.292) 0:02:28.040 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:15:52 -0500 (0:00:01.290) 0:02:29.331 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [adduser : User | Create User Group] ************************************************************************************************************** | |
| Friday 16 November 2018 05:15:53 -0500 (0:00:00.340) 0:02:29.672 ******* | |
| ok: [node1] => {"changed": false, "gid": 991, "name": "etcd", "state": "present", "system": true} | |
| TASK [adduser : User | Create User] ******************************************************************************************************************** | |
| Friday 16 November 2018 05:15:53 -0500 (0:00:00.541) 0:02:30.214 ******* | |
| changed: [node1] => {"append": false, "changed": true, "comment": "Etcd user", "group": 991, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 995} | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:54 -0500 (0:00:00.582) 0:02:30.796 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/check_certs.yml for node1 | |
| TASK [etcd : Check_certs | check if all certs have already been generated on first master] ************************************************************* | |
| Friday 16 November 2018 05:15:54 -0500 (0:00:00.262) 0:02:31.058 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "examined": 0, "files": [], "matched": 0, "msg": "/etc/ssl/etcd/ssl was skipped as it does not seem to be a valid directory or it cannot be accessed\n"} | |
| TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] ***************************************** | |
| Friday 16 November 2018 05:15:55 -0500 (0:00:01.090) 0:02:32.149 ******* | |
| ok: [node1] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false} | |
| TASK [etcd : Check certs | check if a cert already exists on node] ************************************************************************************* | |
| Friday 16 November 2018 05:15:56 -0500 (0:00:00.354) 0:02:32.503 ******* | |
| ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"exists": false}} | |
| ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"exists": false}} | |
| TASK [etcd : Check_certs | Set 'gen_certs' to true] **************************************************************************************************** | |
| Friday 16 November 2018 05:15:56 -0500 (0:00:00.850) 0:02:33.354 ******* | |
| ok: [node1] => (item=/etc/ssl/etcd/ssl/ca.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/ssl/etcd/ssl/ca.pem"} | |
| ok: [node1] => (item=/etc/ssl/etcd/ssl/node-node1-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/ssl/etcd/ssl/node-node1-key.pem"} | |
| ok: [node1] => (item=/etc/ssl/etcd/ssl/node-node2-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/ssl/etcd/ssl/node-node2-key.pem"} | |
| TASK [etcd : Check_certs | Set 'gen_node_certs' to true] *********************************************************************************************** | |
| Friday 16 November 2018 05:15:57 -0500 (0:00:00.545) 0:02:33.899 ******* | |
| ok: [node1] => {"ansible_facts": {"gen_node_certs": {"node1": true, "node2": true}}, "changed": false} | |
| TASK [etcd : Check_certs | Set 'sync_certs' to true] *************************************************************************************************** | |
| Friday 16 November 2018 05:15:57 -0500 (0:00:00.437) 0:02:34.337 ******* | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {%- set certs = {'sync': False} -%} {% if | |
| gen_node_certs[inventory_hostname] or (not etcdcert_node.results[0].stat.exists|default(False)) or (not | |
| etcdcert_node.results[1].stat.exists|default(False)) or (etcdcert_node.results[1].stat.checksum|default('') != | |
| etcdcert_master.files|selectattr("path", "equalto", etcdcert_node.results[1].stat.path)|map(attribute="checksum")|first|default('')) -%} {%- | |
| set _ = certs.update({'sync': True}) -%} {% endif %} {{ certs.sync }} | |
| ok: [node1] => {"ansible_facts": {"sync_certs": true}, "changed": false} | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:15:58 -0500 (0:00:00.509) 0:02:34.846 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/gen_certs_script.yml for node1 | |
| TASK [etcd : Gen_certs | create etcd cert dir] ********************************************************************************************************* | |
| Friday 16 November 2018 05:15:58 -0500 (0:00:00.375) 0:02:35.222 ******* | |
| changed: [node1] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 6, "state": "directory", "uid": 996} | |
| TASK [etcd : Gen_certs | create etcd script dir (on node1)] ******************************************************************************************** | |
| Friday 16 November 2018 05:15:59 -0500 (0:00:00.684) 0:02:35.907 ******* | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 6, "state": "directory", "uid": 0} | |
| TASK [etcd : Gen_certs | create etcd cert dir (on node1)] ********************************************************************************************** | |
| Friday 16 November 2018 05:16:00 -0500 (0:00:00.738) 0:02:36.646 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 6, "state": "directory", "uid": 996} | |
| TASK [etcd : Gen_certs | write openssl config] ********************************************************************************************************* | |
| Friday 16 November 2018 05:16:00 -0500 (0:00:00.614) 0:02:37.261 ******* | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "checksum": "ecc461eb8efbc880171cd3da7f851f9a008ba6f7", "dest": "/etc/ssl/etcd/openssl.conf", "gid": 0, "group": "root", "md5sum": "cf8f5ee4b81e10068c371a2c256a219a", "mode": "0644", "owner": "root", "size": 805, "src": "/root/.ansible/tmp/ansible-tmp-1542363361.22-225524013216212/source", "state": "file", "uid": 0} | |
| TASK [etcd : Gen_certs | copy certs generation script] ************************************************************************************************* | |
| Friday 16 November 2018 05:16:02 -0500 (0:00:01.431) 0:02:38.692 ******* | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "checksum": "266083b165c0bcb22f1eba7e88d4a6e3720e1ce1", "dest": "/usr/local/bin/etcd-scripts/make-ssl-etcd.sh", "gid": 0, "group": "root", "md5sum": "1fc99690a2ed343216be5d01050c7129", "mode": "0700", "owner": "root", "size": 3411, "src": "/root/.ansible/tmp/ansible-tmp-1542363362.63-31352676090784/source", "state": "file", "uid": 0} | |
| TASK [etcd : Gen_certs | run cert generation script] *************************************************************************************************** | |
| Friday 16 November 2018 05:16:03 -0500 (0:00:01.062) 0:02:39.755 ******* | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "cmd": ["bash", "-x", "/usr/local/bin/etcd-scripts/make-ssl-etcd.sh", "-f", "/etc/ssl/etcd/openssl.conf", "-d", "/etc/ssl/etcd/ssl"], "delta": "0:00:00.742280", "end": "2018-11-16 05:16:04.637858", "rc": 0, "start": "2018-11-16 05:16:03.895578", "stderr": "+ set -o errexit\n+ set -o pipefail\n+ (( 4 ))\n+ case \"$1\" in\n+ CONFIG=/etc/ssl/etcd/openssl.conf\n+ shift 2\n+ (( 2 ))\n+ case \"$1\" in\n+ SSLDIR=/etc/ssl/etcd/ssl\n+ shift 2\n+ (( 0 ))\n+ '[' -z /etc/ssl/etcd/openssl.conf ']'\n+ '[' -z /etc/ssl/etcd/ssl ']'\n++ mktemp -d /tmp/etcd_cacert.XXXXXX\n+ tmpdir=/tmp/etcd_cacert.GujQ6K\n+ trap 'rm -rf \"${tmpdir}\"' EXIT\n+ cd /tmp/etcd_cacert.GujQ6K\n+ mkdir -p /etc/ssl/etcd/ssl\n+ '[' -e /etc/ssl/etcd/ssl/ca-key.pem ']'\n+ openssl genrsa -out ca-key.pem 2048\n+ openssl req -x509 -new -nodes -key ca-key.pem -days 36500 -out ca.pem -subj /CN=etcd-ca\n+ '[' -n ' node1 ' ']'\n+ for host in '$MASTERS'\n+ cn=node1\n+ openssl genrsa -out member-node1-key.pem 2048\n+ openssl req -new -key member-node1-key.pem -out member-node1.csr -subj /CN=etcd-member-node1 -config /etc/ssl/etcd/openssl.conf\n+ openssl x509 -req -in member-node1.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out member-node1.pem -days 36500 -extensions ssl_client -extfile /etc/ssl/etcd/openssl.conf\n+ openssl genrsa -out admin-node1-key.pem 2048\n+ openssl req -new -key admin-node1-key.pem -out admin-node1.csr -subj /CN=etcd-admin-node1\n+ openssl x509 -req -in admin-node1.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out admin-node1.pem -days 36500 -extensions ssl_client -extfile /etc/ssl/etcd/openssl.conf\n+ '[' -n ' node1 node2 ' ']'\n+ for host in '$HOSTS'\n+ cn=node1\n+ openssl genrsa -out node-node1-key.pem 2048\n+ openssl req -new -key node-node1-key.pem -out node-node1.csr -subj /CN=etcd-node-node1\n+ openssl x509 -req -in node-node1.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out node-node1.pem -days 36500 -extensions ssl_client -extfile /etc/ssl/etcd/openssl.conf\n+ for host in '$HOSTS'\n+ cn=node2\n+ openssl genrsa -out node-node2-key.pem 2048\n+ openssl req -new -key node-node2-key.pem -out node-node2.csr -subj /CN=etcd-node-node2\n+ openssl x509 -req -in node-node2.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out node-node2.pem -days 36500 -extensions ssl_client -extfile /etc/ssl/etcd/openssl.conf\n+ '[' -e /etc/ssl/etcd/ssl/ca-key.pem ']'\n+ mv admin-node1-key.pem admin-node1.pem ca-key.pem ca.pem member-node1-key.pem member-node1.pem node-node1-key.pem node-node1.pem node-node2-key.pem node-node2.pem /etc/ssl/etcd/ssl/\n+ rm -rf /tmp/etcd_cacert.GujQ6K", "stderr_lines": ["+ set -o errexit", "+ set -o pipefail", "+ (( 4 ))", "+ case \"$1\" in", "+ CONFIG=/etc/ssl/etcd/openssl.conf", "+ shift 2", "+ (( 2 ))", "+ case \"$1\" in", "+ SSLDIR=/etc/ssl/etcd/ssl", "+ shift 2", "+ (( 0 ))", "+ '[' -z /etc/ssl/etcd/openssl.conf ']'", "+ '[' -z /etc/ssl/etcd/ssl ']'", "++ mktemp -d /tmp/etcd_cacert.XXXXXX", "+ tmpdir=/tmp/etcd_cacert.GujQ6K", "+ trap 'rm -rf \"${tmpdir}\"' EXIT", "+ cd /tmp/etcd_cacert.GujQ6K", "+ mkdir -p /etc/ssl/etcd/ssl", "+ '[' -e /etc/ssl/etcd/ssl/ca-key.pem ']'", "+ openssl genrsa -out ca-key.pem 2048", "+ openssl req -x509 -new -nodes -key ca-key.pem -days 36500 -out ca.pem -subj /CN=etcd-ca", "+ '[' -n ' node1 ' ']'", "+ for host in '$MASTERS'", "+ cn=node1", "+ openssl genrsa -out member-node1-key.pem 2048", "+ openssl req -new -key member-node1-key.pem -out member-node1.csr -subj /CN=etcd-member-node1 -config /etc/ssl/etcd/openssl.conf", "+ openssl x509 -req -in member-node1.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out member-node1.pem -days 36500 -extensions ssl_client -extfile /etc/ssl/etcd/openssl.conf", "+ openssl genrsa -out admin-node1-key.pem 2048", "+ openssl req -new -key admin-node1-key.pem -out admin-node1.csr -subj /CN=etcd-admin-node1", "+ openssl x509 -req -in admin-node1.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out admin-node1.pem -days 36500 -extensions ssl_client -extfile /etc/ssl/etcd/openssl.conf", "+ '[' -n ' node1 node2 ' ']'", "+ for host in '$HOSTS'", "+ cn=node1", "+ openssl genrsa -out node-node1-key.pem 2048", "+ openssl req -new -key node-node1-key.pem -out node-node1.csr -subj /CN=etcd-node-node1", "+ openssl x509 -req -in node-node1.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out node-node1.pem -days 36500 -extensions ssl_client -extfile /etc/ssl/etcd/openssl.conf", "+ for host in '$HOSTS'", "+ cn=node2", "+ openssl genrsa -out node-node2-key.pem 2048", "+ openssl req -new -key node-node2-key.pem -out node-node2.csr -subj /CN=etcd-node-node2", "+ openssl x509 -req -in node-node2.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out node-node2.pem -days 36500 -extensions ssl_client -extfile /etc/ssl/etcd/openssl.conf", "+ '[' -e /etc/ssl/etcd/ssl/ca-key.pem ']'", "+ mv admin-node1-key.pem admin-node1.pem ca-key.pem ca.pem member-node1-key.pem member-node1.pem node-node1-key.pem node-node1.pem node-node2-key.pem node-node2.pem /etc/ssl/etcd/ssl/", "+ rm -rf /tmp/etcd_cacert.GujQ6K"], "stdout": "", "stdout_lines": []} | |
| TASK [etcd : set_fact] ********************************************************************************************************************************* | |
| Friday 16 November 2018 05:16:04 -0500 (0:00:01.425) 0:02:41.180 ******* | |
| ok: [node1] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem", "node-node2.pem", "node-node2-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "my_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem"]}, "changed": false} | |
| TASK [etcd : Gen_certs | Gather etcd master certs] ***************************************************************************************************** | |
| Friday 16 November 2018 05:16:05 -0500 (0:00:00.569) 0:02:41.749 ******* | |
| TASK [etcd : Gen_certs | Gather etcd node certs] ******************************************************************************************************* | |
| Friday 16 November 2018 05:16:05 -0500 (0:00:00.182) 0:02:41.932 ******* | |
| TASK [etcd : Gen_certs | Prepare tempfile for unpacking certs] ***************************************************************************************** | |
| Friday 16 November 2018 05:16:05 -0500 (0:00:00.097) 0:02:42.029 ******* | |
| TASK [etcd : Gen_certs | Write master certs to tempfile] *********************************************************************************************** | |
| Friday 16 November 2018 05:16:05 -0500 (0:00:00.106) 0:02:42.136 ******* | |
| TASK [etcd : Gen_certs | Unpack certs on masters] ****************************************************************************************************** | |
| Friday 16 November 2018 05:16:05 -0500 (0:00:00.128) 0:02:42.265 ******* | |
| TASK [etcd : Gen_certs | Cleanup tempfile] ************************************************************************************************************* | |
| Friday 16 November 2018 05:16:06 -0500 (0:00:00.128) 0:02:42.394 ******* | |
| TASK [etcd : Gen_certs | Copy certs on nodes] ********************************************************************************************************** | |
| Friday 16 November 2018 05:16:06 -0500 (0:00:00.117) 0:02:42.511 ******* | |
| TASK [etcd : Gen_certs | check certificate permissions] ************************************************************************************************ | |
| Friday 16 November 2018 05:16:06 -0500 (0:00:00.092) 0:02:42.604 ******* | |
| changed: [node1] => {"changed": true, "gid": 0, "group": "root", "mode": "0640", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 236, "state": "directory", "uid": 996} | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:16:06 -0500 (0:00:00.546) 0:02:43.151 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/upd_ca_trust.yml for node1 | |
| TASK [etcd : Gen_certs | target ca-certificate store file] ********************************************************************************************* | |
| Friday 16 November 2018 05:16:06 -0500 (0:00:00.202) 0:02:43.353 ******* | |
| ok: [node1] => {"ansible_facts": {"ca_cert_path": "/etc/pki/ca-trust/source/anchors/etcd-ca.crt"}, "changed": false} | |
| TASK [etcd : Gen_certs | add CA to trusted CA dir] ***************************************************************************************************** | |
| Friday 16 November 2018 05:16:07 -0500 (0:00:00.473) 0:02:43.827 ******* | |
| changed: [node1] => {"changed": true, "checksum": "dc777b8cb6d08fae5c7f3d0a7d91ac19e01fde64", "dest": "/etc/pki/ca-trust/source/anchors/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "4e86cc58c7a46ee09d02d7c74b7400d9", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0} | |
| TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/SUSE/Container Linux by CoreOS)] ******************************************************** | |
| Friday 16 November 2018 05:16:08 -0500 (0:00:00.733) 0:02:44.560 ******* | |
| TASK [etcd : Gen_certs | update ca-certificates (RedHat)] ********************************************************************************************** | |
| Friday 16 November 2018 05:16:08 -0500 (0:00:00.093) 0:02:44.654 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["update-ca-trust", "extract"], "delta": "0:00:00.949785", "end": "2018-11-16 05:16:09.675029", "rc": 0, "start": "2018-11-16 05:16:08.725244", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [etcd : Gen_certs | Get etcd certificate serials] ************************************************************************************************* | |
| Friday 16 November 2018 05:16:09 -0500 (0:00:01.483) 0:02:46.137 ******* | |
| ok: [node1] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.022762", "end": "2018-11-16 05:16:10.301861", "rc": 0, "start": "2018-11-16 05:16:10.279099", "stderr": "", "stderr_lines": [], "stdout": "8236ED4CFB89ED7E", "stdout_lines": ["8236ED4CFB89ED7E"]} | |
| TASK [etcd : Set etcd_client_cert_serial] ************************************************************************************************************** | |
| Friday 16 November 2018 05:16:10 -0500 (0:00:00.633) 0:02:46.771 ******* | |
| ok: [node1] => {"ansible_facts": {"etcd_client_cert_serial": "8236ED4CFB89ED7E"}, "changed": false} | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:16:10 -0500 (0:00:00.339) 0:02:47.110 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/install_docker.yml for node1 | |
| TASK [etcd : Install | Copy etcdctl binary from docker container] ************************************************************************************** | |
| Friday 16 November 2018 05:16:10 -0500 (0:00:00.202) 0:02:47.313 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["sh", "-c", "/usr/bin/docker rm -f etcdctl-binarycopy; /usr/bin/docker create --name etcdctl-binarycopy quay.io/coreos/etcd:v3.2.18 && /usr/bin/docker cp etcdctl-binarycopy:/usr/local/bin/etcdctl /usr/local/bin/etcdctl && /usr/bin/docker rm -f etcdctl-binarycopy"], "delta": "0:00:00.175804", "end": "2018-11-16 05:16:11.553639", "rc": 0, "start": "2018-11-16 05:16:11.377835", "stderr": "Error response from daemon: No such container: etcdctl-binarycopy", "stderr_lines": ["Error response from daemon: No such container: etcdctl-binarycopy"], "stdout": "8a1889a9169ee605715ddebd30d11e0edec0c1e78925b24e91a107c0246a6776\netcdctl-binarycopy", "stdout_lines": ["8a1889a9169ee605715ddebd30d11e0edec0c1e78925b24e91a107c0246a6776", "etcdctl-binarycopy"]} | |
| TASK [etcd : Install etcd launch script] *************************************************************************************************************** | |
| Friday 16 November 2018 05:16:11 -0500 (0:00:00.713) 0:02:48.027 ******* | |
| changed: [node1] => {"changed": true, "checksum": "3816e58bac18783f16ef2960ff516a15bbc03cee", "dest": "/usr/local/bin/etcd", "gid": 0, "group": "root", "md5sum": "e61d5b4d3b4b41175f7e5521efca40ed", "mode": "0750", "owner": "root", "size": 351, "src": "/root/.ansible/tmp/ansible-tmp-1542363372.0-72656949025518/source", "state": "file", "uid": 0} | |
| TASK [etcd : Install etcd-events launch script] ******************************************************************************************************** | |
| Friday 16 November 2018 05:16:12 -0500 (0:00:00.983) 0:02:49.010 ******* | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:16:12 -0500 (0:00:00.086) 0:02:49.096 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/configure.yml for node1 | |
| TASK [etcd : Configure | Check if etcd cluster is healthy] ********************************************************************************************* | |
| Friday 16 November 2018 05:16:13 -0500 (0:00:00.291) 0:02:49.388 ******* | |
| fatal: [node1]: FAILED! => {"changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.10.10.105:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.030757", "end": "2018-11-16 05:16:13.730394", "msg": "non-zero return code", "rc": 1, "start": "2018-11-16 05:16:13.699637", "stderr": "Error: client: etcd cluster is unavailable or misconfigured; error #0: dial tcp 10.10.10.105:2379: getsockopt: connection refused\n\nerror #0: dial tcp 10.10.10.105:2379: getsockopt: connection refused", "stderr_lines": ["Error: client: etcd cluster is unavailable or misconfigured; error #0: dial tcp 10.10.10.105:2379: getsockopt: connection refused", "", "error #0: dial tcp 10.10.10.105:2379: getsockopt: connection refused"], "stdout": "", "stdout_lines": []} | |
| ...ignoring | |
| TASK [etcd : Configure | Check if etcd-events cluster is healthy] ************************************************************************************** | |
| Friday 16 November 2018 05:16:13 -0500 (0:00:00.804) 0:02:50.192 ******* | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:16:13 -0500 (0:00:00.092) 0:02:50.285 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/refresh_config.yml for node1 | |
| TASK [etcd : Refresh config | Create etcd config file] ************************************************************************************************* | |
| Friday 16 November 2018 05:16:14 -0500 (0:00:00.170) 0:02:50.456 ******* | |
| changed: [node1] => {"changed": true, "checksum": "41ad35b3e4273d37579dd7b0a120c29d696bb741", "dest": "/etc/etcd.env", "gid": 0, "group": "root", "md5sum": "014c8bc1a53c8ca20688c93456695e96", "mode": "0644", "owner": "root", "size": 909, "src": "/root/.ansible/tmp/ansible-tmp-1542363374.44-4836240723050/source", "state": "file", "uid": 0} | |
| TASK [etcd : Refresh config | Create etcd-events config file] ****************************************************************************************** | |
| Friday 16 November 2018 05:16:15 -0500 (0:00:01.147) 0:02:51.604 ******* | |
| TASK [etcd : Configure | Copy etcd.service systemd file] *********************************************************************************************** | |
| Friday 16 November 2018 05:16:15 -0500 (0:00:00.091) 0:02:51.695 ******* | |
| changed: [node1] => {"changed": true, "checksum": "643a64e6855d3b34a04abbf561fd843945934936", "dest": "/etc/systemd/system/etcd.service", "gid": 0, "group": "root", "md5sum": "6c8c57186e4e724d74edfed4489ea5be", "mode": "0644", "owner": "root", "size": 354, "src": "/root/.ansible/tmp/ansible-tmp-1542363375.68-33552774441613/source", "state": "file", "uid": 0} | |
| TASK [etcd : Configure | Copy etcd-events.service systemd file] **************************************************************************************** | |
| Friday 16 November 2018 05:16:16 -0500 (0:00:00.994) 0:02:52.689 ******* | |
| TASK [etcd : Configure | reload systemd] *************************************************************************************************************** | |
| Friday 16 November 2018 05:16:16 -0500 (0:00:00.105) 0:02:52.795 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.068377", "end": "2018-11-16 05:16:17.033253", "rc": 0, "start": "2018-11-16 05:16:16.964876", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [etcd : Configure | Ensure etcd is running] ******************************************************************************************************* | |
| Friday 16 November 2018 05:16:17 -0500 (0:00:00.720) 0:02:53.515 ******* | |
| changed: [node1] => {"changed": true, "enabled": true, "name": "etcd", "state": "started", "status": {"ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "system.slice basic.target systemd-journald.socket docker.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "etcd docker wrapper", "DevicePolicy": "auto", "EnvironmentFile": "/etc/etcd.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/etcd ; argv[]=/usr/local/bin/etcd ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker rm -f etcd1 ; ignore_errors=yes ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStop": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker stop etcd1 ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/etcd.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "etcd.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "15064", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "15064", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "etcd.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "yes", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "always", "RestartUSec": "15s", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "User": "root", "WantedBy": "multi-user.target", "Wants": "docker.socket system.slice", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0"}} | |
| TASK [etcd : Configure | Ensure etcd-events is running] ************************************************************************************************ | |
| Friday 16 November 2018 05:16:17 -0500 (0:00:00.685) 0:02:54.201 ******* | |
| TASK [etcd : Configure | Check if etcd cluster is healthy] ********************************************************************************************* | |
| Friday 16 November 2018 05:16:17 -0500 (0:00:00.103) 0:02:54.305 ******* | |
| FAILED - RETRYING: Configure | Check if etcd cluster is healthy (4 retries left). | |
| ok: [node1] => {"attempts": 2, "changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.10.10.105:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.073819", "end": "2018-11-16 05:16:27.179958", "rc": 0, "start": "2018-11-16 05:16:27.106139", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [etcd : Configure | Check if etcd-events cluster is healthy] ************************************************************************************** | |
| Friday 16 November 2018 05:16:27 -0500 (0:00:09.343) 0:03:03.649 ******* | |
| TASK [etcd : Configure | Check if member is in etcd cluster] ******************************************************************************************* | |
| Friday 16 November 2018 05:16:27 -0500 (0:00:00.091) 0:03:03.741 ******* | |
| ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --no-sync --endpoints=https://10.10.10.105:2379 member list | grep -q 10.10.10.105", "delta": "0:00:00.054281", "end": "2018-11-16 05:16:28.184970", "rc": 0, "start": "2018-11-16 05:16:28.130689", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [etcd : Configure | Check if member is in etcd-events cluster] ************************************************************************************ | |
| Friday 16 November 2018 05:16:28 -0500 (0:00:00.911) 0:03:04.652 ******* | |
| TASK [etcd : Configure | Join member(s) to etcd cluster one at a time] ********************************************************************************* | |
| Friday 16 November 2018 05:16:28 -0500 (0:00:00.088) 0:03:04.740 ******* | |
| TASK [etcd : Configure | Join member(s) to etcd-events cluster one at a time] ************************************************************************** | |
| Friday 16 November 2018 05:16:28 -0500 (0:00:00.112) 0:03:04.853 ******* | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:16:28 -0500 (0:00:00.105) 0:03:04.958 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/refresh_config.yml for node1 | |
| TASK [etcd : Refresh config | Create etcd config file] ************************************************************************************************* | |
| Friday 16 November 2018 05:16:28 -0500 (0:00:00.232) 0:03:05.191 ******* | |
| changed: [node1] => {"changed": true, "checksum": "143c7463d63662b4c15d41f2c89f6fefc5252d9e", "dest": "/etc/etcd.env", "gid": 0, "group": "root", "md5sum": "fab18f28932228db558ef03a65dd4c7c", "mode": "0644", "owner": "root", "size": 914, "src": "/root/.ansible/tmp/ansible-tmp-1542363389.21-46080001422079/source", "state": "file", "uid": 0} | |
| TASK [etcd : Refresh config | Create etcd-events config file] ****************************************************************************************** | |
| Friday 16 November 2018 05:16:30 -0500 (0:00:01.268) 0:03:06.459 ******* | |
| TASK [etcd : Restart etcd if certs changed] ************************************************************************************************************ | |
| Friday 16 November 2018 05:16:30 -0500 (0:00:00.102) 0:03:06.561 ******* | |
| TASK [etcd : Restart etcd-events if certs changed] ***************************************************************************************************** | |
| Friday 16 November 2018 05:16:30 -0500 (0:00:00.108) 0:03:06.669 ******* | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:16:30 -0500 (0:00:00.094) 0:03:06.764 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/refresh_config.yml for node1 | |
| TASK [etcd : Refresh config | Create etcd config file] ************************************************************************************************* | |
| Friday 16 November 2018 05:16:30 -0500 (0:00:00.209) 0:03:06.974 ******* | |
| ok: [node1] => {"changed": false, "checksum": "143c7463d63662b4c15d41f2c89f6fefc5252d9e", "dest": "/etc/etcd.env", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 914, "state": "file", "uid": 0} | |
| TASK [etcd : Refresh config | Create etcd-events config file] ****************************************************************************************** | |
| Friday 16 November 2018 05:16:31 -0500 (0:00:01.157) 0:03:08.131 ******* | |
| RUNNING HANDLER [etcd : restart etcd] ****************************************************************************************************************** | |
| Friday 16 November 2018 05:16:31 -0500 (0:00:00.048) 0:03:08.180 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.002583", "end": "2018-11-16 05:16:32.381232", "rc": 0, "start": "2018-11-16 05:16:32.378649", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [etcd : Backup etcd data] ************************************************************************************************************** | |
| Friday 16 November 2018 05:16:32 -0500 (0:00:00.826) 0:03:09.006 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.003000", "end": "2018-11-16 05:16:33.119787", "rc": 0, "start": "2018-11-16 05:16:33.116787", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [etcd : Refresh Time Fact] ************************************************************************************************************* | |
| Friday 16 November 2018 05:16:33 -0500 (0:00:00.654) 0:03:09.661 ******* | |
| ok: [node1] | |
| RUNNING HANDLER [etcd : Set Backup Directory] ********************************************************************************************************** | |
| Friday 16 November 2018 05:16:34 -0500 (0:00:00.787) 0:03:10.449 ******* | |
| ok: [node1] => {"ansible_facts": {"etcd_backup_directory": "/var/backups/etcd-2018-11-16_05:16:33"}, "changed": false} | |
| RUNNING HANDLER [etcd : Create Backup Directory] ******************************************************************************************************* | |
| Friday 16 November 2018 05:16:34 -0500 (0:00:00.325) 0:03:10.774 ******* | |
| changed: [node1] => {"changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/var/backups/etcd-2018-11-16_05:16:33", "size": 6, "state": "directory", "uid": 0} | |
| RUNNING HANDLER [etcd : Stat etcd v2 data directory] *************************************************************************************************** | |
| Friday 16 November 2018 05:16:34 -0500 (0:00:00.509) 0:03:11.283 ******* | |
| ok: [node1] => {"changed": false, "stat": {"atime": 1542363378.0138404, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1542363378.0168405, "dev": 64768, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 25932231, "isblk": false, "ischr": false, "isdir": true, "isfifo": false, "isgid": false, "islnk": false, "isreg": false, "issock": false, "isuid": false, "mimetype": "inode/directory", "mode": "0700", "mtime": 1542363378.0168405, "nlink": 4, "path": "/var/lib/etcd/member", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 29, "uid": 0, "version": "1895565645", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}} | |
| RUNNING HANDLER [etcd : Backup etcd v2 data] *********************************************************************************************************** | |
| Friday 16 November 2018 05:16:35 -0500 (0:00:00.593) 0:03:11.877 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/usr/local/bin/etcdctl", "backup", "--data-dir", "/var/lib/etcd", "--backup-dir", "/var/backups/etcd-2018-11-16_05:16:33"], "delta": "0:00:00.022611", "end": "2018-11-16 05:16:36.032879", "rc": 0, "start": "2018-11-16 05:16:36.010268", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [etcd : Backup etcd v3 data] *********************************************************************************************************** | |
| Friday 16 November 2018 05:16:36 -0500 (0:00:00.564) 0:03:12.442 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/usr/local/bin/etcdctl", "--endpoints=https://10.10.10.105:2379", "snapshot", "save", "/var/backups/etcd-2018-11-16_05:16:33/snapshot.db"], "delta": "0:00:00.070096", "end": "2018-11-16 05:16:36.865144", "rc": 0, "start": "2018-11-16 05:16:36.795048", "stderr": "", "stderr_lines": [], "stdout": "Snapshot saved at /var/backups/etcd-2018-11-16_05:16:33/snapshot.db", "stdout_lines": ["Snapshot saved at /var/backups/etcd-2018-11-16_05:16:33/snapshot.db"]} | |
| RUNNING HANDLER [etcd : etcd | reload systemd] ********************************************************************************************************* | |
| Friday 16 November 2018 05:16:36 -0500 (0:00:00.828) 0:03:13.271 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.122198", "end": "2018-11-16 05:16:37.478891", "rc": 0, "start": "2018-11-16 05:16:37.356693", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [etcd : reload etcd] ******************************************************************************************************************* | |
| Friday 16 November 2018 05:16:37 -0500 (0:00:00.622) 0:03:13.893 ******* | |
| changed: [node1] => {"changed": true, "name": "etcd", "state": "started", "status": {"ActiveEnterTimestamp": "Fri 2018-11-16 05:16:17 EST", "ActiveEnterTimestampMonotonic": "507834178", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "systemd-journald.socket basic.target system.slice docker.service", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Fri 2018-11-16 05:16:17 EST", "AssertTimestampMonotonic": "507805426", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Fri 2018-11-16 05:16:17 EST", "ConditionTimestampMonotonic": "507805426", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/etcd.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "etcd docker wrapper", "DevicePolicy": "auto", "EnvironmentFile": "/etc/etcd.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "6768", "ExecMainStartTimestamp": "Fri 2018-11-16 05:16:17 EST", "ExecMainStartTimestampMonotonic": "507834093", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/etcd ; argv[]=/usr/local/bin/etcd ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker rm -f etcd1 ; ignore_errors=yes ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStop": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker stop etcd1 ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/etcd.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "etcd.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Fri 2018-11-16 05:16:17 EST", "InactiveExitTimestampMonotonic": "507806860", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "15064", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "15064", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "6768", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "etcd.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "yes", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "always", "RestartUSec": "15s", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "User": "root", "WantedBy": "multi-user.target", "Wants": "docker.socket system.slice", "WatchdogTimestamp": "Fri 2018-11-16 05:16:17 EST", "WatchdogTimestampMonotonic": "507834147", "WatchdogUSec": "0"}} | |
| RUNNING HANDLER [etcd : wait for etcd up] ************************************************************************************************************** | |
| Friday 16 November 2018 05:16:39 -0500 (0:00:02.147) 0:03:16.040 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "18", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:16:46 GMT", "json": {"health": "true"}, "msg": "OK (18 bytes)", "redirected": false, "status": 200, "url": "https://10.10.10.105:2379/health"} | |
| RUNNING HANDLER [etcd : set etcd_secret_changed] ******************************************************************************************************* | |
| Friday 16 November 2018 05:16:46 -0500 (0:00:07.088) 0:03:23.129 ******* | |
| ok: [node1] => {"ansible_facts": {"etcd_secret_changed": true}, "changed": false} | |
| PLAY [k8s-cluster:calico-rr] *************************************************************************************************************************** | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:16:47 -0500 (0:00:00.415) 0:03:23.545 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:16:47 -0500 (0:00:00.154) 0:03:23.699 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:16:48 -0500 (0:00:01.373) 0:03:25.072 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:16:50 -0500 (0:00:01.315) 0:03:26.388 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| ok: [node2] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [adduser : User | Create User Group] ************************************************************************************************************** | |
| Friday 16 November 2018 05:16:50 -0500 (0:00:00.452) 0:03:26.840 ******* | |
| ok: [node1] => {"changed": false, "gid": 991, "name": "etcd", "state": "present", "system": true} | |
| ok: [node2] => {"changed": false, "gid": 991, "name": "etcd", "state": "present", "system": true} | |
| TASK [adduser : User | Create User] ******************************************************************************************************************** | |
| Friday 16 November 2018 05:16:51 -0500 (0:00:00.618) 0:03:27.458 ******* | |
| ok: [node1] => {"append": false, "changed": false, "comment": "Etcd user", "group": 991, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 995} | |
| changed: [node2] => {"append": false, "changed": true, "comment": "Etcd user", "group": 991, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 995} | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:16:51 -0500 (0:00:00.685) 0:03:28.144 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/check_certs.yml for node1, node2 | |
| TASK [etcd : Check_certs | check if all certs have already been generated on first master] ************************************************************* | |
| Friday 16 November 2018 05:16:52 -0500 (0:00:00.355) 0:03:28.500 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "examined": 10, "files": [{"atime": 1542363368.0908406, "checksum": "dc777b8cb6d08fae5c7f3d0a7d91ac19e01fde64", "ctime": 1542363366.6738405, "dev": 64768, "gid": 0, "gr_name": "root", "inode": 8435256, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1542363364.0918405, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1090, "uid": 996, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1542363364.4418404, "checksum": "0f1714a68bf167282e6291c23d9ede2278a189d9", "ctime": 1542363366.6748405, "dev": 64768, "gid": 0, "gr_name": "root", "inode": 8734063, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1542363364.4348404, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 996, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1542363370.2988405, "checksum": "b8b4247c67e494831a5d52ef39e17bc409e8b99b", "ctime": 1542363366.6748405, "dev": 64768, "gid": 0, "gr_name": "root", "inode": 8734065, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1542363364.4638405, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1359, "uid": 996, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1542363364.6048405, "checksum": "1a1be3bc9265da34e5bc9487d3d721057ce93509", "ctime": 1542363366.6748405, "dev": 64768, "gid": 0, "gr_name": "root", "inode": 8734066, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1542363364.5968406, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 996, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1542363364.6278405, "checksum": "a00a9b194914cb41b9e8ec5e363c4918924b284d", "ctime": 1542363366.6748405, "dev": 64768, "gid": 0, "gr_name": "root", "inode": 8734068, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1542363364.6298406, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1359, "uid": 996, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 5, "msg": ""} | |
| TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] ***************************************** | |
| Friday 16 November 2018 05:16:52 -0500 (0:00:00.542) 0:03:29.042 ******* | |
| ok: [node1] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false} | |
| TASK [etcd : Check certs | check if a cert already exists on node] ************************************************************************************* | |
| Friday 16 November 2018 05:16:53 -0500 (0:00:00.401) 0:03:29.444 ******* | |
| ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1542363368.0908406, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "dc777b8cb6d08fae5c7f3d0a7d91ac19e01fde64", "ctime": 1542363366.6738405, "dev": 64768, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 8435256, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1542363364.0918405, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1090, "uid": 996, "version": "2084296658", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
| ok: [node2] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"exists": false}} | |
| ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"atime": 1542363412.5448406, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "0f1714a68bf167282e6291c23d9ede2278a189d9", "ctime": 1542363366.6748405, "dev": 64768, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 8734063, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1542363364.4348404, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 996, "version": "1183474463", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
| ok: [node2] => (item=node-node2-key.pem) => {"changed": false, "item": "node-node2-key.pem", "stat": {"exists": false}} | |
| TASK [etcd : Check_certs | Set 'gen_certs' to true] **************************************************************************************************** | |
| Friday 16 November 2018 05:16:53 -0500 (0:00:00.796) 0:03:30.241 ******* | |
| TASK [etcd : Check_certs | Set 'gen_node_certs' to true] *********************************************************************************************** | |
| Friday 16 November 2018 05:16:54 -0500 (0:00:00.169) 0:03:30.410 ******* | |
| ok: [node1] => {"ansible_facts": {"gen_node_certs": {"node1": false, "node2": false}}, "changed": false} | |
| TASK [etcd : Check_certs | Set 'sync_certs' to true] *************************************************************************************************** | |
| Friday 16 November 2018 05:16:54 -0500 (0:00:00.346) 0:03:30.757 ******* | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {%- set certs = {'sync': False} -%} {% if | |
| gen_node_certs[inventory_hostname] or (not etcdcert_node.results[0].stat.exists|default(False)) or (not | |
| etcdcert_node.results[1].stat.exists|default(False)) or (etcdcert_node.results[1].stat.checksum|default('') != | |
| etcdcert_master.files|selectattr("path", "equalto", etcdcert_node.results[1].stat.path)|map(attribute="checksum")|first|default('')) -%} {%- | |
| set _ = certs.update({'sync': True}) -%} {% endif %} {{ certs.sync }} | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {%- set certs = {'sync': False} -%} {% if | |
| gen_node_certs[inventory_hostname] or (not etcdcert_node.results[0].stat.exists|default(False)) or (not | |
| etcdcert_node.results[1].stat.exists|default(False)) or (etcdcert_node.results[1].stat.checksum|default('') != | |
| etcdcert_master.files|selectattr("path", "equalto", etcdcert_node.results[1].stat.path)|map(attribute="checksum")|first|default('')) -%} {%- | |
| set _ = certs.update({'sync': True}) -%} {% endif %} {{ certs.sync }} | |
| ok: [node2] => {"ansible_facts": {"sync_certs": true}, "changed": false} | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:16:54 -0500 (0:00:00.454) 0:03:31.211 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/gen_certs_script.yml for node1, node2 | |
| TASK [etcd : Gen_certs | create etcd cert dir] ********************************************************************************************************* | |
| Friday 16 November 2018 05:16:55 -0500 (0:00:00.342) 0:03:31.554 ******* | |
| changed: [node1] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 236, "state": "directory", "uid": 996} | |
| changed: [node2] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 6, "state": "directory", "uid": 996} | |
| TASK [etcd : Gen_certs | create etcd script dir (on node1)] ******************************************************************************************** | |
| Friday 16 November 2018 05:16:55 -0500 (0:00:00.669) 0:03:32.224 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 30, "state": "directory", "uid": 0} | |
| TASK [etcd : Gen_certs | create etcd cert dir (on node1)] ********************************************************************************************** | |
| Friday 16 November 2018 05:16:56 -0500 (0:00:00.590) 0:03:32.815 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 236, "state": "directory", "uid": 996} | |
| TASK [etcd : Gen_certs | write openssl config] ********************************************************************************************************* | |
| Friday 16 November 2018 05:16:57 -0500 (0:00:00.632) 0:03:33.447 ******* | |
| TASK [etcd : Gen_certs | copy certs generation script] ************************************************************************************************* | |
| Friday 16 November 2018 05:16:57 -0500 (0:00:00.152) 0:03:33.600 ******* | |
| TASK [etcd : Gen_certs | run cert generation script] *************************************************************************************************** | |
| Friday 16 November 2018 05:16:57 -0500 (0:00:00.150) 0:03:33.751 ******* | |
| TASK [etcd : set_fact] ********************************************************************************************************************************* | |
| Friday 16 November 2018 05:16:57 -0500 (0:00:00.102) 0:03:33.854 ******* | |
| ok: [node1] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem", "node-node2.pem", "node-node2-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "my_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem"]}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem", "node-node2.pem", "node-node2-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node2.pem", "admin-node2-key.pem", "member-node2.pem", "member-node2-key.pem"], "my_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem"]}, "changed": false} | |
| TASK [etcd : Gen_certs | Gather etcd master certs] ***************************************************************************************************** | |
| Friday 16 November 2018 05:16:57 -0500 (0:00:00.519) 0:03:34.373 ******* | |
| TASK [etcd : Gen_certs | Gather etcd node certs] ******************************************************************************************************* | |
| Friday 16 November 2018 05:16:58 -0500 (0:00:00.284) 0:03:34.658 ******* | |
| changed: [node2 -> 10.10.10.105] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true} | |
| TASK [etcd : Gen_certs | Prepare tempfile for unpacking certs] ***************************************************************************************** | |
| Friday 16 November 2018 05:16:58 -0500 (0:00:00.724) 0:03:35.382 ******* | |
| TASK [etcd : Gen_certs | Write master certs to tempfile] *********************************************************************************************** | |
| Friday 16 November 2018 05:16:59 -0500 (0:00:00.192) 0:03:35.575 ******* | |
| TASK [etcd : Gen_certs | Unpack certs on masters] ****************************************************************************************************** | |
| Friday 16 November 2018 05:16:59 -0500 (0:00:00.163) 0:03:35.738 ******* | |
| TASK [etcd : Gen_certs | Cleanup tempfile] ************************************************************************************************************* | |
| Friday 16 November 2018 05:16:59 -0500 (0:00:00.165) 0:03:35.904 ******* | |
| TASK [etcd : Gen_certs | Copy certs on nodes] ********************************************************************************************************** | |
| Friday 16 November 2018 05:16:59 -0500 (0:00:00.157) 0:03:36.061 ******* | |
| ok: [node2] => {"changed": false, "cmd": "base64 -d <<< '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' | tar xz -C /etc/ssl/etcd/ssl", "delta": "0:00:00.011080", "end": "2018-11-16 05:17:00.011379", "rc": 0, "start": "2018-11-16 05:17:00.000299", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [etcd : Gen_certs | check certificate permissions] ************************************************************************************************ | |
| Friday 16 November 2018 05:17:00 -0500 (0:00:00.654) 0:03:36.715 ******* | |
| changed: [node1] => {"changed": true, "gid": 0, "group": "root", "mode": "0640", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 236, "state": "directory", "uid": 996} | |
| changed: [node2] => {"changed": true, "gid": 0, "group": "root", "mode": "0640", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 68, "state": "directory", "uid": 996} | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:17:00 -0500 (0:00:00.608) 0:03:37.324 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/upd_ca_trust.yml for node1, node2 | |
| TASK [etcd : Gen_certs | target ca-certificate store file] ********************************************************************************************* | |
| Friday 16 November 2018 05:17:01 -0500 (0:00:00.364) 0:03:37.689 ******* | |
| ok: [node1] => {"ansible_facts": {"ca_cert_path": "/etc/pki/ca-trust/source/anchors/etcd-ca.crt"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"ca_cert_path": "/etc/pki/ca-trust/source/anchors/etcd-ca.crt"}, "changed": false} | |
| TASK [etcd : Gen_certs | add CA to trusted CA dir] ***************************************************************************************************** | |
| Friday 16 November 2018 05:17:01 -0500 (0:00:00.475) 0:03:38.164 ******* | |
| ok: [node1] => {"changed": false, "checksum": "dc777b8cb6d08fae5c7f3d0a7d91ac19e01fde64", "dest": "/etc/pki/ca-trust/source/anchors/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "4e86cc58c7a46ee09d02d7c74b7400d9", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "dc777b8cb6d08fae5c7f3d0a7d91ac19e01fde64", "dest": "/etc/pki/ca-trust/source/anchors/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "4e86cc58c7a46ee09d02d7c74b7400d9", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0} | |
| TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/SUSE/Container Linux by CoreOS)] ******************************************************** | |
| Friday 16 November 2018 05:17:02 -0500 (0:00:00.690) 0:03:38.855 ******* | |
| TASK [etcd : Gen_certs | update ca-certificates (RedHat)] ********************************************************************************************** | |
| Friday 16 November 2018 05:17:02 -0500 (0:00:00.153) 0:03:39.008 ******* | |
| changed: [node2] => {"changed": true, "cmd": ["update-ca-trust", "extract"], "delta": "0:00:00.981529", "end": "2018-11-16 05:17:03.917461", "rc": 0, "start": "2018-11-16 05:17:02.935932", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [etcd : Gen_certs | Get etcd certificate serials] ************************************************************************************************* | |
| Friday 16 November 2018 05:17:04 -0500 (0:00:01.613) 0:03:40.621 ******* | |
| ok: [node1] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.024756", "end": "2018-11-16 05:17:04.755648", "rc": 0, "start": "2018-11-16 05:17:04.730892", "stderr": "", "stderr_lines": [], "stdout": "8236ED4CFB89ED7E", "stdout_lines": ["8236ED4CFB89ED7E"]} | |
| ok: [node2] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node2.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.038029", "end": "2018-11-16 05:17:04.603899", "rc": 0, "start": "2018-11-16 05:17:04.565870", "stderr": "", "stderr_lines": [], "stdout": "8236ED4CFB89ED7F", "stdout_lines": ["8236ED4CFB89ED7F"]} | |
| TASK [etcd : Set etcd_client_cert_serial] ************************************************************************************************************** | |
| Friday 16 November 2018 05:17:04 -0500 (0:00:00.672) 0:03:41.294 ******* | |
| ok: [node1] => {"ansible_facts": {"etcd_client_cert_serial": "8236ED4CFB89ED7E"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"etcd_client_cert_serial": "8236ED4CFB89ED7F"}, "changed": false} | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:17:05 -0500 (0:00:00.417) 0:03:41.712 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/install_docker.yml for node1 | |
| TASK [etcd : Install | Copy etcdctl binary from docker container] ************************************************************************************** | |
| Friday 16 November 2018 05:17:05 -0500 (0:00:00.287) 0:03:42.000 ******* | |
| TASK [etcd : Install etcd launch script] *************************************************************************************************************** | |
| Friday 16 November 2018 05:17:05 -0500 (0:00:00.105) 0:03:42.106 ******* | |
| TASK [etcd : Install etcd-events launch script] ******************************************************************************************************** | |
| Friday 16 November 2018 05:17:05 -0500 (0:00:00.100) 0:03:42.206 ******* | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:17:05 -0500 (0:00:00.107) 0:03:42.314 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/configure.yml for node1 | |
| TASK [etcd : Configure | Check if etcd cluster is healthy] ********************************************************************************************* | |
| Friday 16 November 2018 05:17:06 -0500 (0:00:00.346) 0:03:42.660 ******* | |
| TASK [etcd : Configure | Check if etcd-events cluster is healthy] ************************************************************************************** | |
| Friday 16 November 2018 05:17:06 -0500 (0:00:00.091) 0:03:42.752 ******* | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:17:06 -0500 (0:00:00.096) 0:03:42.848 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/refresh_config.yml for node1 | |
| TASK [etcd : Refresh config | Create etcd config file] ************************************************************************************************* | |
| Friday 16 November 2018 05:17:06 -0500 (0:00:00.169) 0:03:43.018 ******* | |
| TASK [etcd : Refresh config | Create etcd-events config file] ****************************************************************************************** | |
| Friday 16 November 2018 05:17:06 -0500 (0:00:00.104) 0:03:43.122 ******* | |
| TASK [etcd : Configure | Copy etcd.service systemd file] *********************************************************************************************** | |
| Friday 16 November 2018 05:17:06 -0500 (0:00:00.117) 0:03:43.240 ******* | |
| TASK [etcd : Configure | Copy etcd-events.service systemd file] **************************************************************************************** | |
| Friday 16 November 2018 05:17:06 -0500 (0:00:00.103) 0:03:43.343 ******* | |
| TASK [etcd : Configure | reload systemd] *************************************************************************************************************** | |
| Friday 16 November 2018 05:17:07 -0500 (0:00:00.101) 0:03:43.445 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.062165", "end": "2018-11-16 05:17:07.644274", "rc": 0, "start": "2018-11-16 05:17:07.582109", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [etcd : Configure | Ensure etcd is running] ******************************************************************************************************* | |
| Friday 16 November 2018 05:17:07 -0500 (0:00:00.663) 0:03:44.108 ******* | |
| TASK [etcd : Configure | Ensure etcd-events is running] ************************************************************************************************ | |
| Friday 16 November 2018 05:17:07 -0500 (0:00:00.085) 0:03:44.194 ******* | |
| TASK [etcd : Configure | Check if etcd cluster is healthy] ********************************************************************************************* | |
| Friday 16 November 2018 05:17:07 -0500 (0:00:00.088) 0:03:44.283 ******* | |
| TASK [etcd : Configure | Check if etcd-events cluster is healthy] ************************************************************************************** | |
| Friday 16 November 2018 05:17:07 -0500 (0:00:00.091) 0:03:44.375 ******* | |
| TASK [etcd : Configure | Check if member is in etcd cluster] ******************************************************************************************* | |
| Friday 16 November 2018 05:17:08 -0500 (0:00:00.102) 0:03:44.477 ******* | |
| TASK [etcd : Configure | Check if member is in etcd-events cluster] ************************************************************************************ | |
| Friday 16 November 2018 05:17:08 -0500 (0:00:00.101) 0:03:44.579 ******* | |
| TASK [etcd : Configure | Join member(s) to etcd cluster one at a time] ********************************************************************************* | |
| Friday 16 November 2018 05:17:08 -0500 (0:00:00.103) 0:03:44.682 ******* | |
| TASK [etcd : Configure | Join member(s) to etcd-events cluster one at a time] ************************************************************************** | |
| Friday 16 November 2018 05:17:08 -0500 (0:00:00.127) 0:03:44.810 ******* | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:17:08 -0500 (0:00:00.105) 0:03:44.916 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/refresh_config.yml for node1 | |
| TASK [etcd : Refresh config | Create etcd config file] ************************************************************************************************* | |
| Friday 16 November 2018 05:17:08 -0500 (0:00:00.275) 0:03:45.192 ******* | |
| TASK [etcd : Refresh config | Create etcd-events config file] ****************************************************************************************** | |
| Friday 16 November 2018 05:17:08 -0500 (0:00:00.101) 0:03:45.294 ******* | |
| TASK [etcd : Restart etcd if certs changed] ************************************************************************************************************ | |
| Friday 16 November 2018 05:17:09 -0500 (0:00:00.095) 0:03:45.390 ******* | |
| TASK [etcd : Restart etcd-events if certs changed] ***************************************************************************************************** | |
| Friday 16 November 2018 05:17:09 -0500 (0:00:00.160) 0:03:45.550 ******* | |
| TASK [etcd : include_tasks] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:17:09 -0500 (0:00:00.155) 0:03:45.706 ******* | |
| included: /root/kubespray-2.6.0/roles/etcd/tasks/refresh_config.yml for node1 | |
| TASK [etcd : Refresh config | Create etcd config file] ************************************************************************************************* | |
| Friday 16 November 2018 05:17:09 -0500 (0:00:00.281) 0:03:45.987 ******* | |
| TASK [etcd : Refresh config | Create etcd-events config file] ****************************************************************************************** | |
| Friday 16 November 2018 05:17:09 -0500 (0:00:00.111) 0:03:46.099 ******* | |
| RUNNING HANDLER [etcd : set etcd_secret_changed] ******************************************************************************************************* | |
| Friday 16 November 2018 05:17:09 -0500 (0:00:00.053) 0:03:46.153 ******* | |
| ok: [node2] => {"ansible_facts": {"etcd_secret_changed": true}, "changed": false} | |
| PLAY [etcd:k8s-cluster:vault:calico-rr] **************************************************************************************************************** | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:17:10 -0500 (0:00:00.483) 0:03:46.636 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:17:10 -0500 (0:00:00.170) 0:03:46.807 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:17:11 -0500 (0:00:01.441) 0:03:48.249 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:17:13 -0500 (0:00:01.465) 0:03:49.715 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| ok: [node2] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [adduser : User | Create User Group] ************************************************************************************************************** | |
| Friday 16 November 2018 05:17:13 -0500 (0:00:00.658) 0:03:50.373 ******* | |
| TASK [adduser : User | Create User] ******************************************************************************************************************** | |
| Friday 16 November 2018 05:17:14 -0500 (0:00:00.164) 0:03:50.537 ******* | |
| TASK [vault : install hvac] **************************************************************************************************************************** | |
| Friday 16 November 2018 05:17:14 -0500 (0:00:00.156) 0:03:50.694 ******* | |
| TASK [vault : include_tasks] *************************************************************************************************************************** | |
| Friday 16 November 2018 05:17:14 -0500 (0:00:00.175) 0:03:50.870 ******* | |
| TASK [vault : include_tasks] *************************************************************************************************************************** | |
| Friday 16 November 2018 05:17:14 -0500 (0:00:00.164) 0:03:51.034 ******* | |
| PLAY [k8s-cluster] ************************************************************************************************************************************* | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:17:14 -0500 (0:00:00.313) 0:03:51.347 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:17:15 -0500 (0:00:00.186) 0:03:51.533 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:17:16 -0500 (0:00:01.558) 0:03:53.092 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:17:18 -0500 (0:00:01.410) 0:03:54.503 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| ok: [node2] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [kubernetes/secrets : Check_certs | check if the certs have already been generated on first master] *********************************************** | |
| Friday 16 November 2018 05:17:18 -0500 (0:00:00.654) 0:03:55.157 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "examined": 0, "files": [], "matched": 0, "msg": ""} | |
| TASK [kubernetes/secrets : Check_certs | Set default value for 'sync_certs', 'gen_certs', and 'secret_changed' to false] ****************************** | |
| Friday 16 November 2018 05:17:19 -0500 (0:00:00.614) 0:03:55.771 ******* | |
| ok: [node1] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false} | |
| TASK [kubernetes/secrets : Check_certs | Set 'gen_certs' to true] ************************************************************************************** | |
| Friday 16 November 2018 05:17:19 -0500 (0:00:00.448) 0:03:56.220 ******* | |
| ok: [node1] => (item=/etc/kubernetes/ssl/ca.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/ca.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/apiserver.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/apiserver.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/apiserver-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/apiserver-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/kube-scheduler.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/kube-scheduler.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/kube-scheduler-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/kube-scheduler-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/kube-controller-manager.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/kube-controller-manager.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/kube-controller-manager-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/kube-controller-manager-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/front-proxy-ca.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/front-proxy-ca.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/front-proxy-ca-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/front-proxy-ca-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/front-proxy-client.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/front-proxy-client.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/front-proxy-client-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/front-proxy-client-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/service-account-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/service-account-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/admin-node1.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/admin-node1.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/admin-node1-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/admin-node1-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/admin-node2.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/admin-node2.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/admin-node2-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/admin-node2-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/node-node1.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/node-node1.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/node-node1-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/node-node1-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/kube-proxy-node1.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/kube-proxy-node1.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/kube-proxy-node1-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/kube-proxy-node1-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/node-node2.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/node-node2.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/node-node2-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/node-node2-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/kube-proxy-node2.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/kube-proxy-node2.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/kube-proxy-node2-key.pem) => {"ansible_facts": {"gen_certs": true}, "changed": false, "item": "/etc/kubernetes/ssl/kube-proxy-node2-key.pem"} | |
| TASK [kubernetes/secrets : Check_certs | Set 'gen_master_certs' to true] ******************************************************************************* | |
| Friday 16 November 2018 05:17:22 -0500 (0:00:02.206) 0:03:58.426 ******* | |
| ok: [node1] => {"ansible_facts": {"gen_master_certs": " False"}, "changed": false} | |
| TASK [kubernetes/secrets : Check_certs | Set 'gen_node_certs' to true] ********************************************************************************* | |
| Friday 16 November 2018 05:17:22 -0500 (0:00:00.397) 0:03:58.824 ******* | |
| ok: [node1] => {"ansible_facts": {"gen_node_certs": {"node1": true, "node2": true}}, "changed": false} | |
| TASK [kubernetes/secrets : Check_tokens | check if the tokens have already been generated on first master] ********************************************* | |
| Friday 16 November 2018 05:17:22 -0500 (0:00:00.432) 0:03:59.256 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "stat": {"exists": false}} | |
| TASK [kubernetes/secrets : Check_tokens | Set default value for 'sync_tokens' and 'gen_tokens' to false] *********************************************** | |
| Friday 16 November 2018 05:17:23 -0500 (0:00:00.634) 0:03:59.891 ******* | |
| ok: [node1] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false} | |
| TASK [kubernetes/secrets : Check_tokens | Set 'sync_tokens' and 'gen_tokens' to true] ****************************************************************** | |
| Friday 16 November 2018 05:17:23 -0500 (0:00:00.483) 0:04:00.374 ******* | |
| ok: [node1] => {"ansible_facts": {"gen_tokens": true}, "changed": false} | |
| TASK [kubernetes/secrets : Check tokens | check if a cert already exists] ****************************************************************************** | |
| Friday 16 November 2018 05:17:24 -0500 (0:00:00.376) 0:04:00.751 ******* | |
| ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
| ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
| TASK [kubernetes/secrets : Check_tokens | Set 'sync_tokens' to true] *********************************************************************************** | |
| Friday 16 November 2018 05:17:25 -0500 (0:00:00.689) 0:04:01.440 ******* | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: {%- set tokens = {'sync': False} -%} {%- for | |
| server in groups['kube-master'] | intersect(ansible_play_batch) if (not hostvars[server].known_tokens.stat.exists) or | |
| (hostvars[server].known_tokens.stat.checksum|default('') != known_tokens_master.stat.checksum|default('')) -%} {%- set _ = tokens.update({'sync': | |
| True}) -%} {%- endfor -%} {{ tokens.sync }} | |
| ok: [node1] => {"ansible_facts": {"sync_tokens": true}, "changed": false} | |
| TASK [kubernetes/secrets : Make sure the certificate directory exits] ********************************************************************************** | |
| Friday 16 November 2018 05:17:25 -0500 (0:00:00.653) 0:04:02.094 ******* | |
| changed: [node1] => {"changed": true, "gid": 992, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 6, "state": "directory", "uid": 996} | |
| changed: [node2] => {"changed": true, "gid": 992, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 6, "state": "directory", "uid": 996} | |
| TASK [kubernetes/secrets : Make sure the tokens directory exits] *************************************************************************************** | |
| Friday 16 November 2018 05:17:26 -0500 (0:00:00.652) 0:04:02.747 ******* | |
| changed: [node1] => {"changed": true, "gid": 992, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 6, "state": "directory", "uid": 0} | |
| changed: [node2] => {"changed": true, "gid": 992, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 6, "state": "directory", "uid": 0} | |
| TASK [kubernetes/secrets : Gen_certs | Create kubernetes config directory (on node1)] ****************************************************************** | |
| Friday 16 November 2018 05:17:27 -0500 (0:00:00.680) 0:04:03.428 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 48, "state": "directory", "uid": 996} | |
| TASK [kubernetes/secrets : Gen_certs | Create kubernetes script directory (on node1)] ****************************************************************** | |
| Friday 16 November 2018 05:17:27 -0500 (0:00:00.758) 0:04:04.187 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 6, "state": "directory", "uid": 996} | |
| TASK [kubernetes/secrets : Get_tokens | Make sure the tokens directory exits (on node1)] *************************************************************** | |
| Friday 16 November 2018 05:17:28 -0500 (0:00:00.602) 0:04:04.789 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "gid": 992, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 6, "state": "directory", "uid": 0} | |
| TASK [kubernetes/secrets : include_tasks] ************************************************************************************************************** | |
| Friday 16 November 2018 05:17:28 -0500 (0:00:00.558) 0:04:05.348 ******* | |
| included: /root/kubespray-2.6.0/roles/kubernetes/secrets/tasks/gen_certs_script.yml for node1, node2 | |
| TASK [kubernetes/secrets : Gen_certs | Create kubernetes config directory (on node1)] ****************************************************************** | |
| Friday 16 November 2018 05:17:29 -0500 (0:00:00.527) 0:04:05.875 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 48, "state": "directory", "uid": 996} | |
| TASK [kubernetes/secrets : Gen_certs | Create kubernetes script directory (on node1)] ****************************************************************** | |
| Friday 16 November 2018 05:17:30 -0500 (0:00:00.632) 0:04:06.507 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 6, "state": "directory", "uid": 996} | |
| TASK [kubernetes/secrets : Gen_certs | write openssl config] ******************************************************************************************* | |
| Friday 16 November 2018 05:17:30 -0500 (0:00:00.630) 0:04:07.138 ******* | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "checksum": "85c9886fda2f6db49fff9aea1af9d315ca5fd276", "dest": "/etc/kubernetes/openssl.conf", "gid": 0, "group": "root", "md5sum": "20ffcf2f376180346e2c79f70abdca02", "mode": "0644", "owner": "root", "size": 520, "src": "/root/.ansible/tmp/ansible-tmp-1542363451.09-122816701768383/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/secrets : Gen_certs | copy certs generation script] *********************************************************************************** | |
| Friday 16 November 2018 05:17:32 -0500 (0:00:01.355) 0:04:08.493 ******* | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "checksum": "be54c7c8e883670362eba8179b9d172bb8ffd66e", "dest": "/usr/local/bin/kubernetes-scripts/make-ssl.sh", "gid": 0, "group": "root", "md5sum": "01de77a7faace7fdc6b5bc5134d6a874", "mode": "0700", "owner": "root", "size": 5170, "src": "/root/.ansible/tmp/ansible-tmp-1542363452.43-232760903260031/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/secrets : Gen_certs | run cert generation script] ************************************************************************************* | |
| Friday 16 November 2018 05:17:33 -0500 (0:00:00.957) 0:04:09.451 ******* | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "cmd": ["/usr/local/bin/kubernetes-scripts/make-ssl.sh", "-f", "/etc/kubernetes/openssl.conf", "-d", "/etc/kubernetes/ssl"], "delta": "0:00:02.013298", "end": "2018-11-16 05:17:35.555321", "rc": 0, "start": "2018-11-16 05:17:33.542023", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/secrets : set_fact] ******************************************************************************************************************* | |
| Friday 16 November 2018 05:17:35 -0500 (0:00:02.582) 0:04:12.033 ******* | |
| ok: [node1] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "apiserver.pem", "apiserver-key.pem", "kube-scheduler.pem", "kube-scheduler-key.pem", "kube-controller-manager.pem", "kube-controller-manager-key.pem", "front-proxy-ca.pem", "front-proxy-ca-key.pem", "front-proxy-client.pem", "front-proxy-client-key.pem", "service-account-key.pem", "admin-node1.pem", "admin-node1-key.pem", "admin-node2.pem", "admin-node2-key.pem"], "all_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem", "kube-proxy-node1.pem", "kube-proxy-node1-key.pem", "node-node2.pem", "node-node2-key.pem", "kube-proxy-node2.pem", "kube-proxy-node2-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "apiserver.pem", "apiserver-key.pem", "front-proxy-ca.pem", "front-proxy-ca-key.pem", "front-proxy-client.pem", "front-proxy-client-key.pem", "service-account-key.pem", "kube-scheduler.pem", "kube-scheduler-key.pem", "kube-controller-manager.pem", "kube-controller-manager-key.pem"], "my_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem", "kube-proxy-node1.pem", "kube-proxy-node1-key.pem"]}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "apiserver.pem", "apiserver-key.pem", "kube-scheduler.pem", "kube-scheduler-key.pem", "kube-controller-manager.pem", "kube-controller-manager-key.pem", "front-proxy-ca.pem", "front-proxy-ca-key.pem", "front-proxy-client.pem", "front-proxy-client-key.pem", "service-account-key.pem", "admin-node1.pem", "admin-node1-key.pem", "admin-node2.pem", "admin-node2-key.pem"], "all_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem", "kube-proxy-node1.pem", "kube-proxy-node1-key.pem", "node-node2.pem", "node-node2-key.pem", "kube-proxy-node2.pem", "kube-proxy-node2-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node2.pem", "admin-node2-key.pem", "apiserver.pem", "apiserver-key.pem", "front-proxy-ca.pem", "front-proxy-ca-key.pem", "front-proxy-client.pem", "front-proxy-client-key.pem", "service-account-key.pem", "kube-scheduler.pem", "kube-scheduler-key.pem", "kube-controller-manager.pem", "kube-controller-manager-key.pem"], "my_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "kube-proxy-node2.pem", "kube-proxy-node2-key.pem"]}, "changed": false} | |
| TASK [kubernetes/secrets : Check certs | check if a cert already exists on node] *********************************************************************** | |
| Friday 16 November 2018 05:17:36 -0500 (0:00:00.458) 0:04:12.492 ******* | |
| ok: [node2] => {"changed": false, "examined": 0, "files": [], "matched": 0, "msg": ""} | |
| TASK [kubernetes/secrets : Check_certs | Set 'sync_certs' to true on masters] ************************************************************************** | |
| Friday 16 November 2018 05:17:36 -0500 (0:00:00.740) 0:04:13.233 ******* | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: inventory_hostname in groups['kube-master'] | |
| and inventory_hostname != groups['kube-master'][0] and (not item in kubecert_node.files | map(attribute='path') | map("basename") | list or | |
| kubecert_node.files | selectattr("path", "equalto", "{{ kube_cert_dir }}/{{ item }}") | map(attribute="checksum")|first|default('') != | |
| kubecert_master.files | selectattr("path", "equalto", "{{ kube_cert_dir }}/{{ item }}") | map(attribute="checksum")|first|default('')) | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: inventory_hostname in groups['kube-master'] | |
| and inventory_hostname != groups['kube-master'][0] and (not item in kubecert_node.files | map(attribute='path') | map("basename") | list or | |
| kubecert_node.files | selectattr("path", "equalto", "{{ kube_cert_dir }}/{{ item }}") | map(attribute="checksum")|first|default('') != | |
| kubecert_master.files | selectattr("path", "equalto", "{{ kube_cert_dir }}/{{ item }}") | map(attribute="checksum")|first|default('')) | |
| ok: [node2] => (item=ca-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "ca-key.pem"} | |
| ok: [node2] => (item=admin-node2.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "admin-node2.pem"} | |
| ok: [node2] => (item=admin-node2-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "admin-node2-key.pem"} | |
| ok: [node2] => (item=apiserver.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "apiserver.pem"} | |
| ok: [node2] => (item=apiserver-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "apiserver-key.pem"} | |
| ok: [node2] => (item=front-proxy-ca.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "front-proxy-ca.pem"} | |
| ok: [node2] => (item=front-proxy-ca-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "front-proxy-ca-key.pem"} | |
| ok: [node2] => (item=front-proxy-client.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "front-proxy-client.pem"} | |
| ok: [node2] => (item=front-proxy-client-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "front-proxy-client-key.pem"} | |
| ok: [node2] => (item=service-account-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "service-account-key.pem"} | |
| ok: [node2] => (item=kube-scheduler.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-scheduler.pem"} | |
| ok: [node2] => (item=kube-scheduler-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-scheduler-key.pem"} | |
| ok: [node2] => (item=kube-controller-manager.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-controller-manager.pem"} | |
| ok: [node2] => (item=kube-controller-manager-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-controller-manager-key.pem"} | |
| ok: [node2] => (item=ca.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "ca.pem"} | |
| ok: [node2] => (item=node-node1.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "node-node1.pem"} | |
| ok: [node2] => (item=node-node1-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "node-node1-key.pem"} | |
| ok: [node2] => (item=kube-proxy-node1.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-proxy-node1.pem"} | |
| ok: [node2] => (item=kube-proxy-node1-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-proxy-node1-key.pem"} | |
| ok: [node2] => (item=node-node2.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "node-node2.pem"} | |
| ok: [node2] => (item=node-node2-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "node-node2-key.pem"} | |
| ok: [node2] => (item=kube-proxy-node2.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-proxy-node2.pem"} | |
| ok: [node2] => (item=kube-proxy-node2-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-proxy-node2-key.pem"} | |
| TASK [kubernetes/secrets : Check_certs | Set 'sync_certs' to true on nodes] **************************************************************************** | |
| Friday 16 November 2018 05:17:39 -0500 (0:00:02.943) 0:04:16.176 ******* | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: inventory_hostname in groups['kube-node'] | |
| and inventory_hostname != groups['kube-master'][0] and (not item in kubecert_node.files | map(attribute='path') | map("basename") | list or | |
| kubecert_node.files | selectattr("path", "equalto", "{{ kube_cert_dir }}/{{ item }}") | map(attribute="checksum")|first|default('') != | |
| kubecert_master.files | selectattr("path", "equalto", "{{ kube_cert_dir }}/{{ item }}") | map(attribute="checksum")|first|default('')) | |
| [WARNING]: when statements should not include jinja2 templating delimiters such as {{ }} or {% %}. Found: inventory_hostname in groups['kube-node'] | |
| and inventory_hostname != groups['kube-master'][0] and (not item in kubecert_node.files | map(attribute='path') | map("basename") | list or | |
| kubecert_node.files | selectattr("path", "equalto", "{{ kube_cert_dir }}/{{ item }}") | map(attribute="checksum")|first|default('') != | |
| kubecert_master.files | selectattr("path", "equalto", "{{ kube_cert_dir }}/{{ item }}") | map(attribute="checksum")|first|default('')) | |
| ok: [node2] => (item=ca.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "ca.pem"} | |
| ok: [node2] => (item=node-node2.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "node-node2.pem"} | |
| ok: [node2] => (item=node-node2-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "node-node2-key.pem"} | |
| ok: [node2] => (item=kube-proxy-node2.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-proxy-node2.pem"} | |
| ok: [node2] => (item=kube-proxy-node2-key.pem) => {"ansible_facts": {"sync_certs": true}, "changed": false, "item": "kube-proxy-node2-key.pem"} | |
| TASK [kubernetes/secrets : Gen_certs | Gather master certs] ******************************************************************************************** | |
| Friday 16 November 2018 05:17:40 -0500 (0:00:01.048) 0:04:17.225 ******* | |
| changed: [node2 -> 10.10.10.105] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true} | |
| TASK [kubernetes/secrets : Gen_certs | Gather node certs] ********************************************************************************************** | |
| Friday 16 November 2018 05:17:41 -0500 (0:00:00.778) 0:04:18.003 ******* | |
| changed: [node2 -> 10.10.10.105] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true} | |
| TASK [kubernetes/secrets : Gen_certs | Prepare tempfile for unpacking certs on masters] **************************************************************** | |
| Friday 16 November 2018 05:17:42 -0500 (0:00:00.830) 0:04:18.833 ******* | |
| changed: [node2] => {"changed": true, "cmd": ["mktemp", "/tmp/certsXXXXX.tar.gz"], "delta": "0:00:00.003228", "end": "2018-11-16 05:17:42.779568", "rc": 0, "start": "2018-11-16 05:17:42.776340", "stderr": "", "stderr_lines": [], "stdout": "/tmp/certstwNyI.tar.gz", "stdout_lines": ["/tmp/certstwNyI.tar.gz"]} | |
| TASK [kubernetes/secrets : Gen_certs | Write master certs to tempfile] ********************************************************************************* | |
| Friday 16 November 2018 05:17:43 -0500 (0:00:00.640) 0:04:19.474 ******* | |
| changed: [node2] => {"changed": true, "checksum": "b51645cfcff908a3752b8f0beaf63563a0a0bb27", "dest": "/tmp/certstwNyI.tar.gz", "gid": 0, "group": "root", "md5sum": "6ecda0f58c0b275ac5b9249bcadee2fb", "mode": "0600", "owner": "root", "size": 29428, "src": "/root/.ansible/tmp/ansible-tmp-1542363463.49-196529262227818/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/secrets : Gen_certs | Unpack certs on masters] **************************************************************************************** | |
| Friday 16 November 2018 05:17:44 -0500 (0:00:01.032) 0:04:20.507 ******* | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [kubernetes/secrets : Gen_certs | Cleanup tempfile on masters] ************************************************************************************ | |
| Friday 16 November 2018 05:17:44 -0500 (0:00:00.630) 0:04:21.138 ******* | |
| changed: [node2] => {"changed": true, "path": "/tmp/certstwNyI.tar.gz", "state": "absent"} | |
| TASK [kubernetes/secrets : Gen_certs | Copy certs on nodes] ******************************************************************************************** | |
| Friday 16 November 2018 05:17:45 -0500 (0:00:00.655) 0:04:21.793 ******* | |
| ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
| TASK [kubernetes/secrets : Gen_certs | check certificate permissions] ********************************************************************************** | |
| Friday 16 November 2018 05:17:46 -0500 (0:00:00.639) 0:04:22.433 ******* | |
| changed: [node1] => {"changed": true, "gid": 992, "group": "kube-cert", "mode": "0700", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 996} | |
| changed: [node2] => {"changed": true, "gid": 992, "group": "kube-cert", "mode": "0700", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 996} | |
| TASK [kubernetes/secrets : Gen_certs | target ca-certificates path] ************************************************************************************ | |
| Friday 16 November 2018 05:17:46 -0500 (0:00:00.728) 0:04:23.161 ******* | |
| ok: [node1] => {"ansible_facts": {"ca_cert_path": "/etc/pki/ca-trust/source/anchors/kube-ca.crt"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"ca_cert_path": "/etc/pki/ca-trust/source/anchors/kube-ca.crt"}, "changed": false} | |
| TASK [kubernetes/secrets : Gen_certs | add CA to trusted CA dir] *************************************************************************************** | |
| Friday 16 November 2018 05:17:47 -0500 (0:00:00.439) 0:04:23.601 ******* | |
| changed: [node1] => {"changed": true, "checksum": "44acc12cd883fa1c3aff34df2a9c62477a2614e3", "dest": "/etc/pki/ca-trust/source/anchors/kube-ca.crt", "gid": 0, "group": "root", "md5sum": "29bf587b3c98e1043f0a9aebc9a4e98c", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/kubernetes/ssl/ca.pem", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "44acc12cd883fa1c3aff34df2a9c62477a2614e3", "dest": "/etc/pki/ca-trust/source/anchors/kube-ca.crt", "gid": 0, "group": "root", "md5sum": "29bf587b3c98e1043f0a9aebc9a4e98c", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/kubernetes/ssl/ca.pem", "state": "file", "uid": 0} | |
| TASK [kubernetes/secrets : Gen_certs | update ca-certificates (Debian/Ubuntu/SUSE/Container Linux by CoreOS)] ****************************************** | |
| Friday 16 November 2018 05:17:47 -0500 (0:00:00.686) 0:04:24.288 ******* | |
| TASK [kubernetes/secrets : Gen_certs | update ca-certificates (RedHat)] ******************************************************************************** | |
| Friday 16 November 2018 05:17:48 -0500 (0:00:00.158) 0:04:24.446 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["update-ca-trust", "extract"], "delta": "0:00:01.012766", "end": "2018-11-16 05:17:49.662261", "rc": 0, "start": "2018-11-16 05:17:48.649495", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node2] => {"changed": true, "cmd": ["update-ca-trust", "extract"], "delta": "0:00:01.016323", "end": "2018-11-16 05:17:49.505412", "rc": 0, "start": "2018-11-16 05:17:48.489089", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/secrets : Gen_certs | Get certificate serials on kube masters] ************************************************************************ | |
| Friday 16 November 2018 05:17:49 -0500 (0:00:01.749) 0:04:26.196 ******* | |
| ok: [node1] => (item=admin-node1.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/admin-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.022535", "end": "2018-11-16 05:17:50.322940", "item": "admin-node1.pem", "rc": 0, "start": "2018-11-16 05:17:50.300405", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB28", "stdout_lines": ["C5284B0729E7BB28"]} | |
| ok: [node2] => (item=admin-node2.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/admin-node2.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.024365", "end": "2018-11-16 05:17:50.160297", "item": "admin-node2.pem", "rc": 0, "start": "2018-11-16 05:17:50.135932", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB29", "stdout_lines": ["C5284B0729E7BB29"]} | |
| ok: [node1] => (item=apiserver.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/apiserver.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.022915", "end": "2018-11-16 05:17:50.608199", "item": "apiserver.pem", "rc": 0, "start": "2018-11-16 05:17:50.585284", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB25", "stdout_lines": ["C5284B0729E7BB25"]} | |
| ok: [node2] => (item=apiserver.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/apiserver.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.021904", "end": "2018-11-16 05:17:50.438323", "item": "apiserver.pem", "rc": 0, "start": "2018-11-16 05:17:50.416419", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB25", "stdout_lines": ["C5284B0729E7BB25"]} | |
| ok: [node1] => (item=kube-controller-manager.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/kube-controller-manager.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.020238", "end": "2018-11-16 05:17:50.876981", "item": "kube-controller-manager.pem", "rc": 0, "start": "2018-11-16 05:17:50.856743", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB27", "stdout_lines": ["C5284B0729E7BB27"]} | |
| ok: [node2] => (item=kube-controller-manager.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/kube-controller-manager.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.025282", "end": "2018-11-16 05:17:50.725956", "item": "kube-controller-manager.pem", "rc": 0, "start": "2018-11-16 05:17:50.700674", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB27", "stdout_lines": ["C5284B0729E7BB27"]} | |
| ok: [node1] => (item=kube-scheduler.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/kube-scheduler.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.028232", "end": "2018-11-16 05:17:51.173024", "item": "kube-scheduler.pem", "rc": 0, "start": "2018-11-16 05:17:51.144792", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB26", "stdout_lines": ["C5284B0729E7BB26"]} | |
| ok: [node2] => (item=kube-scheduler.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/kube-scheduler.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.020638", "end": "2018-11-16 05:17:51.014683", "item": "kube-scheduler.pem", "rc": 0, "start": "2018-11-16 05:17:50.994045", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB26", "stdout_lines": ["C5284B0729E7BB26"]} | |
| TASK [kubernetes/secrets : Gen_certs | set kube master certificate serial facts] *********************************************************************** | |
| Friday 16 November 2018 05:17:51 -0500 (0:00:01.513) 0:04:27.710 ******* | |
| ok: [node2] => {"ansible_facts": {"apiserver_cert_serial": "C5284B0729E7BB25", "controller_manager_cert_serial": "C5284B0729E7BB27", "etcd_admin_cert_serial": "C5284B0729E7BB29", "scheduler_cert_serial": "C5284B0729E7BB26"}, "changed": false} | |
| ok: [node1] => {"ansible_facts": {"apiserver_cert_serial": "C5284B0729E7BB25", "controller_manager_cert_serial": "C5284B0729E7BB27", "etcd_admin_cert_serial": "C5284B0729E7BB28", "scheduler_cert_serial": "C5284B0729E7BB26"}, "changed": false} | |
| TASK [kubernetes/secrets : Gen_certs | Get certificate serials on kube nodes] ************************************************************************** | |
| Friday 16 November 2018 05:17:51 -0500 (0:00:00.499) 0:04:28.209 ******* | |
| ok: [node1] => (item=node-node1.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/node-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.021058", "end": "2018-11-16 05:17:52.348823", "item": "node-node1.pem", "rc": 0, "start": "2018-11-16 05:17:52.327765", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB2A", "stdout_lines": ["C5284B0729E7BB2A"]} | |
| ok: [node2] => (item=node-node2.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/node-node2.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.020236", "end": "2018-11-16 05:17:52.172902", "item": "node-node2.pem", "rc": 0, "start": "2018-11-16 05:17:52.152666", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB2B", "stdout_lines": ["C5284B0729E7BB2B"]} | |
| ok: [node1] => (item=kube-proxy-node1.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/kube-proxy-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.025160", "end": "2018-11-16 05:17:52.646856", "item": "kube-proxy-node1.pem", "rc": 0, "start": "2018-11-16 05:17:52.621696", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB2C", "stdout_lines": ["C5284B0729E7BB2C"]} | |
| ok: [node2] => (item=kube-proxy-node2.pem) => {"changed": false, "cmd": "openssl x509 -in /etc/kubernetes/ssl/kube-proxy-node2.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.026456", "end": "2018-11-16 05:17:52.469985", "item": "kube-proxy-node2.pem", "rc": 0, "start": "2018-11-16 05:17:52.443529", "stderr": "", "stderr_lines": [], "stdout": "C5284B0729E7BB2D", "stdout_lines": ["C5284B0729E7BB2D"]} | |
| TASK [kubernetes/secrets : Gen_certs | set kube node certificate serial facts] ************************************************************************* | |
| Friday 16 November 2018 05:17:52 -0500 (0:00:00.958) 0:04:29.168 ******* | |
| ok: [node1] => {"ansible_facts": {"kube_proxy_cert_serial": "C5284B0729E7BB2C", "kubelet_cert_serial": "C5284B0729E7BB2A"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"kube_proxy_cert_serial": "C5284B0729E7BB2D", "kubelet_cert_serial": "C5284B0729E7BB2B"}, "changed": false} | |
| TASK [kubernetes/secrets : Gen_tokens | copy tokens generation script] ********************************************************************************* | |
| Friday 16 November 2018 05:17:53 -0500 (0:00:00.525) 0:04:29.693 ******* | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "checksum": "ab9b3d2dcccd53c1fbd42398be62d69b2ce1a1bf", "dest": "/usr/local/bin/kubernetes-scripts/kube-gen-token.sh", "gid": 0, "group": "root", "md5sum": "4eedc4fc52b3a21f2a6057ff7e1f1b37", "mode": "0700", "owner": "root", "size": 1155, "src": "/root/.ansible/tmp/ansible-tmp-1542363473.73-271759478063209/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/secrets : Gen_tokens | generate tokens for master components] ************************************************************************* | |
| Friday 16 November 2018 05:17:54 -0500 (0:00:01.081) 0:04:30.775 ******* | |
| changed: [node1 -> 10.10.10.105] => (item=[u'system:kubectl', u'node1']) => {"changed": true, "cmd": ["/usr/local/bin/kubernetes-scripts/kube-gen-token.sh", "system:kubectl-node1"], "delta": "0:00:00.011233", "end": "2018-11-16 05:17:54.878117", "item": ["system:kubectl", "node1"], "rc": 0, "start": "2018-11-16 05:17:54.866884", "stderr": "", "stderr_lines": [], "stdout": "Added system:kubectl-node1", "stdout_lines": ["Added system:kubectl-node1"]} | |
| changed: [node1 -> 10.10.10.105] => (item=[u'system:kubectl', u'node2']) => {"changed": true, "cmd": ["/usr/local/bin/kubernetes-scripts/kube-gen-token.sh", "system:kubectl-node2"], "delta": "0:00:00.008806", "end": "2018-11-16 05:17:55.158019", "item": ["system:kubectl", "node2"], "rc": 0, "start": "2018-11-16 05:17:55.149213", "stderr": "", "stderr_lines": [], "stdout": "Added system:kubectl-node2", "stdout_lines": ["Added system:kubectl-node2"]} | |
| TASK [kubernetes/secrets : Gen_tokens | generate tokens for node components] *************************************************************************** | |
| Friday 16 November 2018 05:17:55 -0500 (0:00:00.934) 0:04:31.710 ******* | |
| changed: [node1 -> 10.10.10.105] => (item=[u'system:kubelet', u'node1']) => {"changed": true, "cmd": ["/usr/local/bin/kubernetes-scripts/kube-gen-token.sh", "system:kubelet-node1"], "delta": "0:00:00.009234", "end": "2018-11-16 05:17:55.956652", "item": ["system:kubelet", "node1"], "rc": 0, "start": "2018-11-16 05:17:55.947418", "stderr": "", "stderr_lines": [], "stdout": "Added system:kubelet-node1", "stdout_lines": ["Added system:kubelet-node1"]} | |
| changed: [node1 -> 10.10.10.105] => (item=[u'system:kubelet', u'node2']) => {"changed": true, "cmd": ["/usr/local/bin/kubernetes-scripts/kube-gen-token.sh", "system:kubelet-node2"], "delta": "0:00:00.008420", "end": "2018-11-16 05:17:56.243298", "item": ["system:kubelet", "node2"], "rc": 0, "start": "2018-11-16 05:17:56.234878", "stderr": "", "stderr_lines": [], "stdout": "Added system:kubelet-node2", "stdout_lines": ["Added system:kubelet-node2"]} | |
| TASK [kubernetes/secrets : Gen_tokens | Get list of tokens from first master] ************************************************************************** | |
| Friday 16 November 2018 05:17:56 -0500 (0:00:01.078) 0:04:32.788 ******* | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "cmd": "(find /etc/kubernetes/tokens -maxdepth 1 -type f)", "delta": "0:00:00.005414", "end": "2018-11-16 05:17:56.969063", "rc": 0, "start": "2018-11-16 05:17:56.963649", "stderr": "", "stderr_lines": [], "stdout": "/etc/kubernetes/tokens/known_tokens.csv\n/etc/kubernetes/tokens/system:kubectl-node1.token\n/etc/kubernetes/tokens/system:kubectl-node2.token\n/etc/kubernetes/tokens/system:kubelet-node1.token\n/etc/kubernetes/tokens/system:kubelet-node2.token", "stdout_lines": ["/etc/kubernetes/tokens/known_tokens.csv", "/etc/kubernetes/tokens/system:kubectl-node1.token", "/etc/kubernetes/tokens/system:kubectl-node2.token", "/etc/kubernetes/tokens/system:kubelet-node1.token", "/etc/kubernetes/tokens/system:kubelet-node2.token"]} | |
| TASK [kubernetes/secrets : Gen_tokens | Gather tokens] ************************************************************************************************* | |
| Friday 16 November 2018 05:17:57 -0500 (0:00:00.709) 0:04:33.498 ******* | |
| [WARNING]: Consider using the unarchive module rather than running tar. If you need to use command because unarchive is insufficient you can add | |
| warn=False to this command task or set command_warnings=False in ansible.cfg to get rid of this message. | |
| changed: [node1 -> 10.10.10.105] => {"changed": true, "cmd": "tar cfz - /etc/kubernetes/tokens/known_tokens.csv /etc/kubernetes/tokens/system:kubectl-node1.token /etc/kubernetes/tokens/system:kubectl-node2.token /etc/kubernetes/tokens/system:kubelet-node1.token /etc/kubernetes/tokens/system:kubelet-node2.token | base64 --wrap=0", "delta": "0:00:00.008378", "end": "2018-11-16 05:17:57.616374", "rc": 0, "start": "2018-11-16 05:17:57.607996", "stderr": "tar: Removing leading `/' from member names", "stderr_lines": ["tar: Removing leading `/' from member names"], "stdout": "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", "stdout_lines": ["H4sIAFWZ7lsAA+3XYU+CQBjAcV7zKfwApXB3iPbOaa00yqZj5psG+qiM8zDuyPTTR7o5VyxcLpru+b1hPnCDDf4DQY0qYeJDLECBrKgoBCEroYiW4mX7ozySb9pRjFSVsc029XVrMItpJqU2tUxmkfQ40ybM1krGcac9TCKVF5dKWhxF6qfj8vafqEHYbiZ89dYNm8T3giZtzd59WbN7tadlb7bmF3IlFcyvPp+RkeKXIhqDmTnUnQmAB3TcvgsUdzpT0fCdVRwIVyS1bvLayVpFMoe6ZVsP1zKI/RvV6AtrqvpOdVavz30g3qO6j/ZXcVDfr2o31N1k4d4uh5PuJFxw3hvGz7wt3bHdAhrAesCyVpHMof7f9+ovQGb/Wfe3vNn3m3Pk9W8wc69/ohnENCj2X4i8/s/yoUc7B/dPiuqfbvpPR9h/AfJe2tj/ecvtf/clVXD/BPsvQt6XNvZ/3g7uv7D3P9v2z7D/IuT9Pcb+EUIIIYQQQgghhBBC6DR9APbulpEAKAAA"]} | |
| TASK [kubernetes/secrets : Gen_tokens | Copy tokens on masters] **************************************************************************************** | |
| Friday 16 November 2018 05:17:57 -0500 (0:00:00.586) 0:04:34.084 ******* | |
| changed: [node2] => {"changed": true, "cmd": "echo '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' | base64 -d | tar xz -C /", "delta": "0:00:00.008499", "end": "2018-11-16 05:17:58.130611", "rc": 0, "start": "2018-11-16 05:17:58.122112", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/node : look up docker cgroup driver] ************************************************************************************************** | |
| Friday 16 November 2018 05:17:58 -0500 (0:00:00.747) 0:04:34.832 ******* | |
| ok: [node1] => {"changed": false, "cmd": "docker info | grep 'Cgroup Driver' | awk -F': ' '{ print $2; }'", "delta": "0:00:00.047758", "end": "2018-11-16 05:17:59.058153", "rc": 0, "start": "2018-11-16 05:17:59.010395", "stderr": "", "stderr_lines": [], "stdout": "cgroupfs", "stdout_lines": ["cgroupfs"]} | |
| ok: [node2] => {"changed": false, "cmd": "docker info | grep 'Cgroup Driver' | awk -F': ' '{ print $2; }'", "delta": "0:00:00.044741", "end": "2018-11-16 05:17:58.896266", "rc": 0, "start": "2018-11-16 05:17:58.851525", "stderr": "", "stderr_lines": [], "stdout": "cgroupfs", "stdout_lines": ["cgroupfs"]} | |
| TASK [kubernetes/node : set_fact] ********************************************************************************************************************** | |
| Friday 16 November 2018 05:17:59 -0500 (0:00:00.754) 0:04:35.587 ******* | |
| ok: [node1] => {"ansible_facts": {"kubelet_cgroup_driver_detected": "cgroupfs", "standalone_kubelet": false}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"kubelet_cgroup_driver_detected": "cgroupfs", "standalone_kubelet": false}, "changed": false} | |
| TASK [kubernetes/node : Pre-upgrade | check if kubelet container exists] ******************************************************************************* | |
| Friday 16 November 2018 05:17:59 -0500 (0:00:00.520) 0:04:36.107 ******* | |
| ok: [node1] => {"changed": false, "cmd": "docker ps -af name=kubelet | grep kubelet", "delta": "0:00:00.021569", "end": "2018-11-16 05:18:00.300975", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2018-11-16 05:18:00.279406", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| ok: [node2] => {"changed": false, "cmd": "docker ps -af name=kubelet | grep kubelet", "delta": "0:00:00.023860", "end": "2018-11-16 05:18:00.152301", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2018-11-16 05:18:00.128441", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/node : Pre-upgrade | copy /var/lib/cni from kubelet] ********************************************************************************** | |
| Friday 16 November 2018 05:18:00 -0500 (0:00:00.738) 0:04:36.846 ******* | |
| TASK [kubernetes/node : Pre-upgrade | ensure kubelet container service is stopped if using host deployment] ******************************************** | |
| Friday 16 November 2018 05:18:00 -0500 (0:00:00.152) 0:04:36.998 ******* | |
| TASK [kubernetes/node : Pre-upgrade | ensure kubelet container is removed if using host deployment] **************************************************** | |
| Friday 16 November 2018 05:18:00 -0500 (0:00:00.152) 0:04:37.150 ******* | |
| TASK [kubernetes/node : Ensure /var/lib/cni exists] **************************************************************************************************** | |
| Friday 16 November 2018 05:18:00 -0500 (0:00:00.178) 0:04:37.329 ******* | |
| ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/lib/cni", "size": 6, "state": "directory", "uid": 0} | |
| ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/lib/cni", "size": 6, "state": "directory", "uid": 0} | |
| TASK [kubernetes/node : Set kubelet deployment to host if kubeadm is enabled] ************************************************************************** | |
| Friday 16 November 2018 05:18:01 -0500 (0:00:00.711) 0:04:38.041 ******* | |
| TASK [kubernetes/node : install | Copy kubeadm binary from download dir] ******************************************************************************* | |
| Friday 16 November 2018 05:18:01 -0500 (0:00:00.144) 0:04:38.186 ******* | |
| TASK [kubernetes/node : install | Set kubeadm binary permissions] ************************************************************************************** | |
| Friday 16 November 2018 05:18:01 -0500 (0:00:00.150) 0:04:38.337 ******* | |
| TASK [kubernetes/node : include_tasks] ***************************************************************************************************************** | |
| Friday 16 November 2018 05:18:02 -0500 (0:00:00.151) 0:04:38.488 ******* | |
| included: /root/kubespray-2.6.0/roles/kubernetes/node/tasks/install_host.yml for node1, node2 | |
| TASK [kubernetes/node : install | Compare host kubelet with hyperkube container] *********************************************************************** | |
| Friday 16 November 2018 05:18:02 -0500 (0:00:00.301) 0:04:38.790 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/usr/local/bin:/systembindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/usr/bin/cmp", "/hyperkube", "/systembindir/kubelet"], "delta": "0:00:00.448094", "end": "2018-11-16 05:18:03.488106", "failed_when_result": false, "msg": "non-zero return code", "rc": 2, "start": "2018-11-16 05:18:03.040012", "stderr": "/usr/bin/cmp: /systembindir/kubelet: No such file or directory", "stderr_lines": ["/usr/bin/cmp: /systembindir/kubelet: No such file or directory"], "stdout": "", "stdout_lines": []} | |
| ok: [node2] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/usr/local/bin:/systembindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/usr/bin/cmp", "/hyperkube", "/systembindir/kubelet"], "delta": "0:00:00.437925", "end": "2018-11-16 05:18:03.323993", "failed_when_result": false, "msg": "non-zero return code", "rc": 2, "start": "2018-11-16 05:18:02.886068", "stderr": "/usr/bin/cmp: /systembindir/kubelet: No such file or directory", "stderr_lines": ["/usr/bin/cmp: /systembindir/kubelet: No such file or directory"], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/node : install | Copy kubelet from hyperkube container] ******************************************************************************* | |
| Friday 16 November 2018 05:18:03 -0500 (0:00:01.240) 0:04:40.031 ******* | |
| changed: [node2] => {"attempts": 1, "changed": true, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/usr/local/bin:/systembindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/bin/cp", "-f", "/hyperkube", "/systembindir/kubelet"], "delta": "0:00:01.278696", "end": "2018-11-16 05:18:05.337824", "rc": 0, "start": "2018-11-16 05:18:04.059128", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node1] => {"attempts": 1, "changed": true, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/usr/local/bin:/systembindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/bin/cp", "-f", "/hyperkube", "/systembindir/kubelet"], "delta": "0:00:01.369096", "end": "2018-11-16 05:18:05.609414", "rc": 0, "start": "2018-11-16 05:18:04.240318", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/node : install | Copy socat wrapper for Container Linux] ****************************************************************************** | |
| Friday 16 November 2018 05:18:05 -0500 (0:00:02.054) 0:04:42.085 ******* | |
| TASK [kubernetes/node : install | Write kubelet systemd init file] ************************************************************************************* | |
| Friday 16 November 2018 05:18:05 -0500 (0:00:00.153) 0:04:42.239 ******* | |
| changed: [node1] => {"changed": true, "checksum": "6776d5c1dc7ceb83b0ae25cbc09694a8a8a18f01", "dest": "/etc/systemd/system/kubelet.service", "gid": 0, "group": "root", "md5sum": "e3c5e62170c77b726e611dc1de802c43", "mode": "0644", "owner": "root", "size": 644, "src": "/root/.ansible/tmp/ansible-tmp-1542363486.25-160798881619031/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "6776d5c1dc7ceb83b0ae25cbc09694a8a8a18f01", "dest": "/etc/systemd/system/kubelet.service", "gid": 0, "group": "root", "md5sum": "e3c5e62170c77b726e611dc1de802c43", "mode": "0644", "owner": "root", "size": 644, "src": "/root/.ansible/tmp/ansible-tmp-1542363486.31-2717657169361/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/node : nginx-proxy | Write static pod] ************************************************************************************************ | |
| Friday 16 November 2018 05:18:06 -0500 (0:00:01.063) 0:04:43.302 ******* | |
| TASK [kubernetes/node : nginx-proxy | Make nginx directory] ******************************************************************************************** | |
| Friday 16 November 2018 05:18:07 -0500 (0:00:00.164) 0:04:43.466 ******* | |
| TASK [kubernetes/node : nginx-proxy | Write nginx-proxy configuration] ********************************************************************************* | |
| Friday 16 November 2018 05:18:07 -0500 (0:00:00.162) 0:04:43.629 ******* | |
| TASK [kubernetes/node : Write kubelet config file (non-kubeadm)] *************************************************************************************** | |
| Friday 16 November 2018 05:18:07 -0500 (0:00:00.165) 0:04:43.795 ******* | |
| changed: [node1] => {"changed": true, "checksum": "c38b67dd9b2dac82cf9381125514e7c71971c764", "dest": "/etc/kubernetes/kubelet.env", "gid": 0, "group": "root", "md5sum": "8bb7e598fac3242e11b4b04e35720125", "mode": "0644", "owner": "root", "size": 1791, "src": "/root/.ansible/tmp/ansible-tmp-1542363487.83-270542183459085/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "5b4f6f0285cefe978728d4917da807b224a9d23a", "dest": "/etc/kubernetes/kubelet.env", "gid": 0, "group": "root", "md5sum": "89bd7bef09c2d85e72ef4bd7a3bd11d2", "mode": "0644", "owner": "root", "size": 1791, "src": "/root/.ansible/tmp/ansible-tmp-1542363487.89-162667506689545/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/node : Write kubelet config file (kubeadm)] ******************************************************************************************* | |
| Friday 16 November 2018 05:18:08 -0500 (0:00:01.308) 0:04:45.103 ******* | |
| TASK [kubernetes/node : write the kubecfg (auth) file for kubelet] ************************************************************************************* | |
| Friday 16 November 2018 05:18:08 -0500 (0:00:00.157) 0:04:45.261 ******* | |
| changed: [node1] => (item=node) => {"changed": true, "checksum": "f111f1d774654aa000cc5b84fdae8a6918896b6c", "dest": "/etc/kubernetes/node-kubeconfig.yaml", "gid": 0, "group": "root", "item": "node", "md5sum": "a49635d2be273b05268f512880ddf039", "mode": "0644", "owner": "root", "size": 424, "src": "/root/.ansible/tmp/ansible-tmp-1542363489.35-100076781429791/source", "state": "file", "uid": 0} | |
| changed: [node2] => (item=node) => {"changed": true, "checksum": "fd6a8450682ae78341df622fe48891ce16ad3e46", "dest": "/etc/kubernetes/node-kubeconfig.yaml", "gid": 0, "group": "root", "item": "node", "md5sum": "bc343b36b6d7c227a0f9137c67cf73c8", "mode": "0644", "owner": "root", "size": 424, "src": "/root/.ansible/tmp/ansible-tmp-1542363489.42-824103562516/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item=kube-proxy) => {"changed": true, "checksum": "7805426612cdce244092faf3ac85bb0ad474d9f4", "dest": "/etc/kubernetes/kube-proxy-kubeconfig.yaml", "gid": 0, "group": "root", "item": "kube-proxy", "md5sum": "5c59335eb9d7834af8baff36707183b3", "mode": "0644", "owner": "root", "size": 448, "src": "/root/.ansible/tmp/ansible-tmp-1542363490.22-102847932365661/source", "state": "file", "uid": 0} | |
| changed: [node2] => (item=kube-proxy) => {"changed": true, "checksum": "3fb4505c73fbd5d50536c404e626b22eef064498", "dest": "/etc/kubernetes/kube-proxy-kubeconfig.yaml", "gid": 0, "group": "root", "item": "kube-proxy", "md5sum": "a8d4e257f5005eb8c062059a552a15a6", "mode": "0644", "owner": "root", "size": 448, "src": "/root/.ansible/tmp/ansible-tmp-1542363490.28-42319408096857/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/node : Ensure nodePort range is reserved] ********************************************************************************************* | |
| Friday 16 November 2018 05:18:11 -0500 (0:00:02.359) 0:04:47.620 ******* | |
| ok: [node1] => {"changed": false} | |
| ok: [node2] => {"changed": false} | |
| TASK [kubernetes/node : Verify if br_netfilter module exists] ****************************************************************************************** | |
| Friday 16 November 2018 05:18:12 -0500 (0:00:00.792) 0:04:48.413 ******* | |
| ok: [node1] => {"changed": false, "cmd": "modinfo br_netfilter", "delta": "0:00:00.007342", "end": "2018-11-16 05:18:12.633996", "failed_when_result": false, "rc": 0, "start": "2018-11-16 05:18:12.626654", "stderr": "", "stderr_lines": [], "stdout": "filename: /lib/modules/3.10.0-862.6.3.el7.x86_64/kernel/net/bridge/br_netfilter.ko.xz\ndescription: Linux ethernet netfilter firewall bridge\nauthor: Bart De Schuymer <bdschuym@pandora.be>\nauthor: Lennert Buytenhek <buytenh@gnu.org>\nlicense: GPL\nretpoline: Y\nrhelversion: 7.5\nsrcversion: C4DE536495D55C12BA6A8A8\ndepends: bridge\nintree: Y\nvermagic: 3.10.0-862.6.3.el7.x86_64 SMP mod_unload modversions \nsigner: CentOS Linux kernel signing key\nsig_key: 9C:60:A1:20:C6:30:21:90:5D:F0:D4:15:4A:9E:B1:9A:6C:E1:3C:FA\nsig_hashalgo: sha256", "stdout_lines": ["filename: /lib/modules/3.10.0-862.6.3.el7.x86_64/kernel/net/bridge/br_netfilter.ko.xz", "description: Linux ethernet netfilter firewall bridge", "author: Bart De Schuymer <bdschuym@pandora.be>", "author: Lennert Buytenhek <buytenh@gnu.org>", "license: GPL", "retpoline: Y", "rhelversion: 7.5", "srcversion: C4DE536495D55C12BA6A8A8", "depends: bridge", "intree: Y", "vermagic: 3.10.0-862.6.3.el7.x86_64 SMP mod_unload modversions ", "signer: CentOS Linux kernel signing key", "sig_key: 9C:60:A1:20:C6:30:21:90:5D:F0:D4:15:4A:9E:B1:9A:6C:E1:3C:FA", "sig_hashalgo: sha256"]} | |
| ok: [node2] => {"changed": false, "cmd": "modinfo br_netfilter", "delta": "0:00:00.006644", "end": "2018-11-16 05:18:12.477873", "failed_when_result": false, "rc": 0, "start": "2018-11-16 05:18:12.471229", "stderr": "", "stderr_lines": [], "stdout": "filename: /lib/modules/3.10.0-862.6.3.el7.x86_64/kernel/net/bridge/br_netfilter.ko.xz\ndescription: Linux ethernet netfilter firewall bridge\nauthor: Bart De Schuymer <bdschuym@pandora.be>\nauthor: Lennert Buytenhek <buytenh@gnu.org>\nlicense: GPL\nretpoline: Y\nrhelversion: 7.5\nsrcversion: C4DE536495D55C12BA6A8A8\ndepends: bridge\nintree: Y\nvermagic: 3.10.0-862.6.3.el7.x86_64 SMP mod_unload modversions \nsigner: CentOS Linux kernel signing key\nsig_key: 9C:60:A1:20:C6:30:21:90:5D:F0:D4:15:4A:9E:B1:9A:6C:E1:3C:FA\nsig_hashalgo: sha256", "stdout_lines": ["filename: /lib/modules/3.10.0-862.6.3.el7.x86_64/kernel/net/bridge/br_netfilter.ko.xz", "description: Linux ethernet netfilter firewall bridge", "author: Bart De Schuymer <bdschuym@pandora.be>", "author: Lennert Buytenhek <buytenh@gnu.org>", "license: GPL", "retpoline: Y", "rhelversion: 7.5", "srcversion: C4DE536495D55C12BA6A8A8", "depends: bridge", "intree: Y", "vermagic: 3.10.0-862.6.3.el7.x86_64 SMP mod_unload modversions ", "signer: CentOS Linux kernel signing key", "sig_key: 9C:60:A1:20:C6:30:21:90:5D:F0:D4:15:4A:9E:B1:9A:6C:E1:3C:FA", "sig_hashalgo: sha256"]} | |
| TASK [kubernetes/node : Enable br_netfilter module] **************************************************************************************************** | |
| Friday 16 November 2018 05:18:12 -0500 (0:00:00.761) 0:04:49.175 ******* | |
| ok: [node2] => {"changed": false, "name": "br_netfilter", "params": "", "state": "present"} | |
| ok: [node1] => {"changed": false, "name": "br_netfilter", "params": "", "state": "present"} | |
| TASK [kubernetes/node : Persist br_netfilter module] *************************************************************************************************** | |
| Friday 16 November 2018 05:18:13 -0500 (0:00:01.082) 0:04:50.257 ******* | |
| ok: [node1] => {"changed": false, "checksum": "c3394aff3e3a3e3920e68205b8e839b3d725648e", "dest": "/etc/modules-load.d/kubespray-br_netfilter.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/modules-load.d/kubespray-br_netfilter.conf", "size": 12, "state": "file", "uid": 0} | |
| ok: [node2] => {"changed": false, "checksum": "c3394aff3e3a3e3920e68205b8e839b3d725648e", "dest": "/etc/modules-load.d/kubespray-br_netfilter.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/modules-load.d/kubespray-br_netfilter.conf", "size": 12, "state": "file", "uid": 0} | |
| TASK [kubernetes/node : Check if bridge-nf-call-iptables key exists] *********************************************************************************** | |
| Friday 16 November 2018 05:18:14 -0500 (0:00:00.971) 0:04:51.229 ******* | |
| ok: [node1] => {"changed": false, "cmd": ["sysctl", "net.bridge.bridge-nf-call-iptables"], "delta": "0:00:00.005272", "end": "2018-11-16 05:18:15.318817", "failed_when_result": false, "rc": 0, "start": "2018-11-16 05:18:15.313545", "stderr": "", "stderr_lines": [], "stdout": "net.bridge.bridge-nf-call-iptables = 1", "stdout_lines": ["net.bridge.bridge-nf-call-iptables = 1"]} | |
| ok: [node2] => {"changed": false, "cmd": ["sysctl", "net.bridge.bridge-nf-call-iptables"], "delta": "0:00:00.006674", "end": "2018-11-16 05:18:15.172289", "failed_when_result": false, "rc": 0, "start": "2018-11-16 05:18:15.165615", "stderr": "", "stderr_lines": [], "stdout": "net.bridge.bridge-nf-call-iptables = 1", "stdout_lines": ["net.bridge.bridge-nf-call-iptables = 1"]} | |
| TASK [kubernetes/node : Enable bridge-nf-call tables] ************************************************************************************************** | |
| Friday 16 November 2018 05:18:15 -0500 (0:00:00.645) 0:04:51.875 ******* | |
| ok: [node1] => (item=net.bridge.bridge-nf-call-iptables) => {"changed": false, "item": "net.bridge.bridge-nf-call-iptables"} | |
| ok: [node2] => (item=net.bridge.bridge-nf-call-iptables) => {"changed": false, "item": "net.bridge.bridge-nf-call-iptables"} | |
| ok: [node1] => (item=net.bridge.bridge-nf-call-arptables) => {"changed": false, "item": "net.bridge.bridge-nf-call-arptables"} | |
| ok: [node2] => (item=net.bridge.bridge-nf-call-arptables) => {"changed": false, "item": "net.bridge.bridge-nf-call-arptables"} | |
| ok: [node1] => (item=net.bridge.bridge-nf-call-ip6tables) => {"changed": false, "item": "net.bridge.bridge-nf-call-ip6tables"} | |
| ok: [node2] => (item=net.bridge.bridge-nf-call-ip6tables) => {"changed": false, "item": "net.bridge.bridge-nf-call-ip6tables"} | |
| TASK [kubernetes/node : Modprode Kernel Module for IPVS] *********************************************************************************************** | |
| Friday 16 November 2018 05:18:16 -0500 (0:00:01.239) 0:04:53.114 ******* | |
| TASK [kubernetes/node : Persist ip_vs modules] ********************************************************************************************************* | |
| Friday 16 November 2018 05:18:16 -0500 (0:00:00.256) 0:04:53.370 ******* | |
| TASK [kubernetes/node : Write proxy manifest] ********************************************************************************************************** | |
| Friday 16 November 2018 05:18:17 -0500 (0:00:00.172) 0:04:53.543 ******* | |
| changed: [node1] => {"changed": true, "checksum": "c7b250248e13887bd5ac8977f97dc629b91dd861", "dest": "/etc/kubernetes/manifests/kube-proxy.manifest", "gid": 0, "group": "root", "md5sum": "b9738ed657f109d8d377269f6266c169", "mode": "0644", "owner": "root", "size": 2017, "src": "/root/.ansible/tmp/ansible-tmp-1542363497.5-153065595474088/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "00335786a951aa3ed88cf3aa0c0e27bc06644079", "dest": "/etc/kubernetes/manifests/kube-proxy.manifest", "gid": 0, "group": "root", "md5sum": "e2dec4f0f5e09b19e232a5fa657e9abe", "mode": "0644", "owner": "root", "size": 2017, "src": "/root/.ansible/tmp/ansible-tmp-1542363497.58-183146434482528/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/node : Purge proxy manifest for kubeadm] ********************************************************************************************** | |
| Friday 16 November 2018 05:18:18 -0500 (0:00:01.054) 0:04:54.597 ******* | |
| TASK [kubernetes/node : include_tasks] ***************************************************************************************************************** | |
| Friday 16 November 2018 05:18:18 -0500 (0:00:00.150) 0:04:54.748 ******* | |
| TASK [kubernetes/node : Write cloud-config] ************************************************************************************************************ | |
| Friday 16 November 2018 05:18:18 -0500 (0:00:00.165) 0:04:54.914 ******* | |
| RUNNING HANDLER [kubernetes/secrets : set secret_changed] ********************************************************************************************** | |
| Friday 16 November 2018 05:18:18 -0500 (0:00:00.117) 0:04:55.031 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.002788", "end": "2018-11-16 05:18:19.180968", "rc": 0, "start": "2018-11-16 05:18:19.178180", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [kubernetes/secrets : set secret_changed to true] ************************************************************************************** | |
| Friday 16 November 2018 05:18:19 -0500 (0:00:00.574) 0:04:55.605 ******* | |
| ok: [node1] => {"ansible_facts": {"secret_changed": true}, "changed": false} | |
| RUNNING HANDLER [kubernetes/secrets : clear kubeconfig for root user] ********************************************************************************** | |
| Friday 16 November 2018 05:18:19 -0500 (0:00:00.374) 0:04:55.980 ******* | |
| ok: [node1] => {"changed": false, "path": "/root/.kube/config", "state": "absent"} | |
| RUNNING HANDLER [kubernetes/node : restart kubelet] **************************************************************************************************** | |
| Friday 16 November 2018 05:18:20 -0500 (0:00:00.571) 0:04:56.551 ******* | |
| changed: [node2] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.003028", "end": "2018-11-16 05:18:20.483398", "rc": 0, "start": "2018-11-16 05:18:20.480370", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node1] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.002978", "end": "2018-11-16 05:18:20.784774", "rc": 0, "start": "2018-11-16 05:18:20.781796", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [kubernetes/node : Kubelet | reload systemd] ******************************************************************************************* | |
| Friday 16 November 2018 05:18:20 -0500 (0:00:00.692) 0:04:57.243 ******* | |
| changed: [node2] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.056703", "end": "2018-11-16 05:18:21.216149", "rc": 0, "start": "2018-11-16 05:18:21.159446", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node1] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.059233", "end": "2018-11-16 05:18:21.518233", "rc": 0, "start": "2018-11-16 05:18:21.459000", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [kubernetes/node : Kubelet | reload kubelet] ******************************************************************************************* | |
| Friday 16 November 2018 05:18:21 -0500 (0:00:00.691) 0:04:57.935 ******* | |
| changed: [node2] => {"changed": true, "name": "kubelet", "state": "started", "status": {"ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "basic.target docker.service systemd-journald.socket system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "Kubernetes Kubelet Server", "DevicePolicy": "auto", "Documentation": "https://github.com/GoogleCloudPlatform/kubernetes", "EnvironmentFile": "/etc/kubernetes/kubelet.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/kubelet ; argv[]=/usr/local/bin/kubelet $KUBE_LOGTOSTDERR $KUBE_LOG_LEVEL $KUBELET_API_SERVER $KUBELET_ADDRESS $KUBELET_PORT $KUBELET_HOSTNAME $KUBE_ALLOW_PRIV $KUBELET_ARGS $DOCKER_SOCKET $KUBELET_NETWORK_PLUGIN $KUBELET_VOLUME_PLUGIN $KUBELET_CLOUDPROVIDER ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/bin/mkdir ; argv[]=/bin/mkdir -p /var/lib/kubelet/volume-plugins ; ignore_errors=yes ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/kubelet.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "kubelet.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "11315", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "11315", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "kubelet.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "always", "RestartUSec": "10s", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "User": "root", "WantedBy": "multi-user.target", "Wants": "docker.socket system.slice", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0"}} | |
| changed: [node1] => {"changed": true, "name": "kubelet", "state": "started", "status": {"ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "docker.service system.slice systemd-journald.socket basic.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "no", "AssertTimestampMonotonic": "0", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "no", "ConditionTimestampMonotonic": "0", "Conflicts": "shutdown.target", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "Kubernetes Kubelet Server", "DevicePolicy": "auto", "Documentation": "https://github.com/GoogleCloudPlatform/kubernetes", "EnvironmentFile": "/etc/kubernetes/kubelet.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/kubelet ; argv[]=/usr/local/bin/kubelet $KUBE_LOGTOSTDERR $KUBE_LOG_LEVEL $KUBELET_API_SERVER $KUBELET_ADDRESS $KUBELET_PORT $KUBELET_HOSTNAME $KUBE_ALLOW_PRIV $KUBELET_ARGS $DOCKER_SOCKET $KUBELET_NETWORK_PLUGIN $KUBELET_VOLUME_PLUGIN $KUBELET_CLOUDPROVIDER ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/bin/mkdir ; argv[]=/bin/mkdir -p /var/lib/kubelet/volume-plugins ; ignore_errors=yes ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/kubelet.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "kubelet.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestampMonotonic": "0", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "15064", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "15064", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "0", "MemoryAccounting": "no", "MemoryCurrent": "18446744073709551615", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "kubelet.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "always", "RestartUSec": "10s", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "18446744073709551615", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "User": "root", "WantedBy": "multi-user.target", "Wants": "docker.socket system.slice", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "0"}} | |
| TASK [kubernetes/node : Enable kubelet] **************************************************************************************************************** | |
| Friday 16 November 2018 05:18:22 -0500 (0:00:00.761) 0:04:58.696 ******* | |
| ok: [node1] => {"changed": false, "enabled": true, "name": "kubelet", "state": "started", "status": {"ActiveEnterTimestamp": "Fri 2018-11-16 05:18:22 EST", "ActiveEnterTimestampMonotonic": "632324405", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "docker.service system.slice systemd-journald.socket basic.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Fri 2018-11-16 05:18:22 EST", "AssertTimestampMonotonic": "632293970", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Fri 2018-11-16 05:18:22 EST", "ConditionTimestampMonotonic": "632293970", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/kubelet.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "Kubernetes Kubelet Server", "DevicePolicy": "auto", "Documentation": "https://github.com/GoogleCloudPlatform/kubernetes", "EnvironmentFile": "/etc/kubernetes/kubelet.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "8992", "ExecMainStartTimestamp": "Fri 2018-11-16 05:18:22 EST", "ExecMainStartTimestampMonotonic": "632324306", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/kubelet ; argv[]=/usr/local/bin/kubelet $KUBE_LOGTOSTDERR $KUBE_LOG_LEVEL $KUBELET_API_SERVER $KUBELET_ADDRESS $KUBELET_PORT $KUBELET_HOSTNAME $KUBE_ALLOW_PRIV $KUBELET_ARGS $DOCKER_SOCKET $KUBELET_NETWORK_PLUGIN $KUBELET_VOLUME_PLUGIN $KUBELET_CLOUDPROVIDER ; ignore_errors=no ; start_time=[Fri 2018-11-16 05:18:22 EST] ; stop_time=[n/a] ; pid=8992 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/bin/mkdir ; argv[]=/bin/mkdir -p /var/lib/kubelet/volume-plugins ; ignore_errors=yes ; start_time=[Fri 2018-11-16 05:18:22 EST] ; stop_time=[Fri 2018-11-16 05:18:22 EST] ; pid=8990 ; code=exited ; status=0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/kubelet.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "kubelet.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Fri 2018-11-16 05:18:22 EST", "InactiveExitTimestampMonotonic": "632295125", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "15064", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "15064", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "8992", "MemoryAccounting": "no", "MemoryCurrent": "27598848", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "kubelet.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "always", "RestartUSec": "10s", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "11", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "User": "root", "WantedBy": "multi-user.target", "Wants": "docker.socket system.slice", "WatchdogTimestamp": "Fri 2018-11-16 05:18:22 EST", "WatchdogTimestampMonotonic": "632324348", "WatchdogUSec": "0"}} | |
| ok: [node2] => {"changed": false, "enabled": true, "name": "kubelet", "state": "started", "status": {"ActiveEnterTimestamp": "Fri 2018-11-16 05:18:21 EST", "ActiveEnterTimestampMonotonic": "628016212", "ActiveExitTimestampMonotonic": "0", "ActiveState": "active", "After": "basic.target docker.service systemd-journald.socket system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Fri 2018-11-16 05:18:21 EST", "AssertTimestampMonotonic": "627992065", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Fri 2018-11-16 05:18:21 EST", "ConditionTimestampMonotonic": "627992065", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/kubelet.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "Kubernetes Kubelet Server", "DevicePolicy": "auto", "Documentation": "https://github.com/GoogleCloudPlatform/kubernetes", "EnvironmentFile": "/etc/kubernetes/kubelet.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "4448", "ExecMainStartTimestamp": "Fri 2018-11-16 05:18:21 EST", "ExecMainStartTimestampMonotonic": "628016166", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/kubelet ; argv[]=/usr/local/bin/kubelet $KUBE_LOGTOSTDERR $KUBE_LOG_LEVEL $KUBELET_API_SERVER $KUBELET_ADDRESS $KUBELET_PORT $KUBELET_HOSTNAME $KUBE_ALLOW_PRIV $KUBELET_ARGS $DOCKER_SOCKET $KUBELET_NETWORK_PLUGIN $KUBELET_VOLUME_PLUGIN $KUBELET_CLOUDPROVIDER ; ignore_errors=no ; start_time=[Fri 2018-11-16 05:18:21 EST] ; stop_time=[n/a] ; pid=4448 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/bin/mkdir ; argv[]=/bin/mkdir -p /var/lib/kubelet/volume-plugins ; ignore_errors=yes ; start_time=[Fri 2018-11-16 05:18:21 EST] ; stop_time=[Fri 2018-11-16 05:18:21 EST] ; pid=4446 ; code=exited ; status=0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/kubelet.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "kubelet.service", "IgnoreOnIsolate": "no", "IgnoreOnSnapshot": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "Fri 2018-11-16 05:18:21 EST", "InactiveExitTimestampMonotonic": "627993161", "JobTimeoutAction": "none", "JobTimeoutUSec": "0", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMSGQUEUE": "819200", "LimitNICE": "0", "LimitNOFILE": "4096", "LimitNPROC": "11315", "LimitRSS": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTTIME": "18446744073709551615", "LimitSIGPENDING": "11315", "LimitSTACK": "18446744073709551615", "LoadState": "loaded", "MainPID": "4448", "MemoryAccounting": "no", "MemoryCurrent": "28065792", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "Names": "kubelet.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "basic.target", "Restart": "always", "RestartUSec": "10s", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "11", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UMask": "0022", "UnitFilePreset": "disabled", "UnitFileState": "enabled", "User": "root", "WantedBy": "multi-user.target", "Wants": "docker.socket system.slice", "WatchdogTimestamp": "Fri 2018-11-16 05:18:21 EST", "WatchdogTimestampMonotonic": "628016196", "WatchdogUSec": "0"}} | |
| PLAY [kube-master] ************************************************************************************************************************************* | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:18:23 -0500 (0:00:00.782) 0:04:59.479 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:18:23 -0500 (0:00:00.162) 0:04:59.642 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:18:24 -0500 (0:00:01.386) 0:05:01.029 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:18:26 -0500 (0:00:01.401) 0:05:02.430 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| ok: [node2] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [kubernetes/master : Pre-upgrade | etcd3 upgrade | see if old config exists] ********************************************************************** | |
| Friday 16 November 2018 05:18:26 -0500 (0:00:00.494) 0:05:02.924 ******* | |
| ok: [node1 -> 10.10.10.105] => {"changed": false, "cmd": ["/usr/local/bin/etcdctl", "--peers=https://10.10.10.105:2379", "ls", "/registry/minions"], "delta": "0:00:00.058721", "end": "2018-11-16 05:18:27.266543", "failed_when_result": false, "msg": "non-zero return code", "rc": 4, "start": "2018-11-16 05:18:27.207822", "stderr": "Error: 100: Key not found (/registry) [4]", "stderr_lines": ["Error: 100: Key not found (/registry) [4]"], "stdout": "", "stdout_lines": []} | |
| ok: [node2 -> 10.10.10.105] => {"changed": false, "cmd": ["/usr/local/bin/etcdctl", "--peers=https://10.10.10.105:2379", "ls", "/registry/minions"], "delta": "0:00:00.050813", "end": "2018-11-16 05:18:27.410248", "failed_when_result": false, "msg": "non-zero return code", "rc": 4, "start": "2018-11-16 05:18:27.359435", "stderr": "Error: 100: Key not found (/registry) [4]", "stderr_lines": ["Error: 100: Key not found (/registry) [4]"], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/master : Pre-upgrade | etcd3 upgrade | use etcd2 unless forced to etcd3] ************************************************************** | |
| Friday 16 November 2018 05:18:27 -0500 (0:00:00.957) 0:05:03.881 ******* | |
| TASK [kubernetes/master : Pre-upgrade | Delete master manifests] *************************************************************************************** | |
| Friday 16 November 2018 05:18:27 -0500 (0:00:00.169) 0:05:04.051 ******* | |
| ok: [node1] => (item=kube-apiserver) => {"changed": false, "item": "kube-apiserver", "path": "/etc/kubernetes/manifests/kube-apiserver.manifest", "state": "absent"} | |
| ok: [node2] => (item=kube-apiserver) => {"changed": false, "item": "kube-apiserver", "path": "/etc/kubernetes/manifests/kube-apiserver.manifest", "state": "absent"} | |
| ok: [node1] => (item=kube-controller-manager) => {"changed": false, "item": "kube-controller-manager", "path": "/etc/kubernetes/manifests/kube-controller-manager.manifest", "state": "absent"} | |
| ok: [node2] => (item=kube-controller-manager) => {"changed": false, "item": "kube-controller-manager", "path": "/etc/kubernetes/manifests/kube-controller-manager.manifest", "state": "absent"} | |
| ok: [node1] => (item=kube-scheduler) => {"changed": false, "item": "kube-scheduler", "path": "/etc/kubernetes/manifests/kube-scheduler.manifest", "state": "absent"} | |
| ok: [node2] => (item=kube-scheduler) => {"changed": false, "item": "kube-scheduler", "path": "/etc/kubernetes/manifests/kube-scheduler.manifest", "state": "absent"} | |
| TASK [kubernetes/master : Pre-upgrade | Delete master containers forcefully] *************************************************************************** | |
| Friday 16 November 2018 05:18:28 -0500 (0:00:01.137) 0:05:05.189 ******* | |
| TASK [kubernetes/master : Make sure the users directory exits] ***************************************************************************************** | |
| Friday 16 November 2018 05:18:29 -0500 (0:00:00.219) 0:05:05.408 ******* | |
| TASK [kubernetes/master : Populate users for basic auth in API] **************************************************************************************** | |
| Friday 16 November 2018 05:18:29 -0500 (0:00:00.166) 0:05:05.575 ******* | |
| TASK [kubernetes/master : Write secrets for encrypting secret data at rest] **************************************************************************** | |
| Friday 16 November 2018 05:18:29 -0500 (0:00:00.171) 0:05:05.747 ******* | |
| TASK [kubernetes/master : Compare host kubectl with hyperkube container] ******************************************************************************* | |
| Friday 16 November 2018 05:18:29 -0500 (0:00:00.159) 0:05:05.906 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/usr/local/bin:/systembindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/usr/bin/cmp", "/hyperkube", "/systembindir/kubectl"], "delta": "0:00:00.400154", "end": "2018-11-16 05:18:30.392918", "failed_when_result": false, "msg": "non-zero return code", "rc": 2, "start": "2018-11-16 05:18:29.992764", "stderr": "/usr/bin/cmp: /systembindir/kubectl: No such file or directory", "stderr_lines": ["/usr/bin/cmp: /systembindir/kubectl: No such file or directory"], "stdout": "", "stdout_lines": []} | |
| ok: [node2] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/usr/local/bin:/systembindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/usr/bin/cmp", "/hyperkube", "/systembindir/kubectl"], "delta": "0:00:00.474042", "end": "2018-11-16 05:18:30.304305", "failed_when_result": false, "msg": "non-zero return code", "rc": 2, "start": "2018-11-16 05:18:29.830263", "stderr": "/usr/bin/cmp: /systembindir/kubectl: No such file or directory", "stderr_lines": ["/usr/bin/cmp: /systembindir/kubectl: No such file or directory"], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/master : Copy kubectl from hyperkube container] *************************************************************************************** | |
| Friday 16 November 2018 05:18:30 -0500 (0:00:01.110) 0:05:07.017 ******* | |
| ok: [node2] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/usr/local/bin:/systembindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/bin/cp", "-f", "/hyperkube", "/systembindir/kubectl"], "delta": "0:00:00.810900", "end": "2018-11-16 05:18:31.754970", "rc": 0, "start": "2018-11-16 05:18:30.944070", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/usr/local/bin:/systembindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/bin/cp", "-f", "/hyperkube", "/systembindir/kubectl"], "delta": "0:00:01.088145", "end": "2018-11-16 05:18:32.193924", "rc": 0, "start": "2018-11-16 05:18:31.105779", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/master : Install kubectl bash completion] ********************************************************************************************* | |
| Friday 16 November 2018 05:18:32 -0500 (0:00:01.664) 0:05:08.682 ******* | |
| changed: [node1] => {"changed": true, "cmd": "/usr/local/bin/kubectl completion bash >/etc/bash_completion.d/kubectl.sh", "delta": "0:00:00.291352", "end": "2018-11-16 05:18:33.048417", "rc": 0, "start": "2018-11-16 05:18:32.757065", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node2] => {"changed": true, "cmd": "/usr/local/bin/kubectl completion bash >/etc/bash_completion.d/kubectl.sh", "delta": "0:00:00.298391", "end": "2018-11-16 05:18:32.889949", "rc": 0, "start": "2018-11-16 05:18:32.591558", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [kubernetes/master : Set kubectl bash completion file] ******************************************************************************************** | |
| Friday 16 November 2018 05:18:33 -0500 (0:00:00.904) 0:05:09.586 ******* | |
| ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/bash_completion.d/kubectl.sh", "size": 418973, "state": "file", "uid": 0} | |
| ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/bash_completion.d/kubectl.sh", "size": 418973, "state": "file", "uid": 0} | |
| TASK [kubernetes/master : kubeadm | Check if old apiserver cert exists on host] ************************************************************************ | |
| Friday 16 November 2018 05:18:33 -0500 (0:00:00.672) 0:05:10.259 ******* | |
| TASK [kubernetes/master : kubeadm | Check service account key] ***************************************************************************************** | |
| Friday 16 November 2018 05:18:34 -0500 (0:00:00.166) 0:05:10.426 ******* | |
| TASK [kubernetes/master : kubeadm | Check if kubeadm has already run] ********************************************************************************** | |
| Friday 16 November 2018 05:18:34 -0500 (0:00:00.107) 0:05:10.533 ******* | |
| TASK [kubernetes/master : kubeadm | Delete old admin.conf] ********************************************************************************************* | |
| Friday 16 November 2018 05:18:34 -0500 (0:00:00.169) 0:05:10.703 ******* | |
| TASK [kubernetes/master : kubeadm | Delete old static pods] ******************************************************************************************** | |
| Friday 16 November 2018 05:18:34 -0500 (0:00:00.169) 0:05:10.872 ******* | |
| TASK [kubernetes/master : kubeadm | Forcefully delete old static pods] ********************************************************************************* | |
| Friday 16 November 2018 05:18:34 -0500 (0:00:00.244) 0:05:11.117 ******* | |
| TASK [kubernetes/master : kubeadm | aggregate all SANs] ************************************************************************************************ | |
| Friday 16 November 2018 05:18:34 -0500 (0:00:00.221) 0:05:11.339 ******* | |
| TASK [kubernetes/master : kubeadm | Copy etcd cert dir under k8s cert dir] ***************************************************************************** | |
| Friday 16 November 2018 05:18:35 -0500 (0:00:00.177) 0:05:11.517 ******* | |
| TASK [kubernetes/master : kubeadm | Create kubeadm config] ********************************************************************************************* | |
| Friday 16 November 2018 05:18:35 -0500 (0:00:00.171) 0:05:11.688 ******* | |
| TASK [kubernetes/master : kubeadm | Initialize first master] ******************************************************************************************* | |
| Friday 16 November 2018 05:18:35 -0500 (0:00:00.175) 0:05:11.864 ******* | |
| TASK [kubernetes/master : kubeadm | Upgrade first master] ********************************************************************************************** | |
| Friday 16 November 2018 05:18:35 -0500 (0:00:00.163) 0:05:12.027 ******* | |
| TASK [kubernetes/master : kubeadm | Enable kube-proxy] ************************************************************************************************* | |
| Friday 16 November 2018 05:18:35 -0500 (0:00:00.167) 0:05:12.195 ******* | |
| TASK [kubernetes/master : slurp kubeadm certs] ********************************************************************************************************* | |
| Friday 16 November 2018 05:18:36 -0500 (0:00:00.286) 0:05:12.481 ******* | |
| TASK [kubernetes/master : kubeadm | write out kubeadm certs] ******************************************************************************************* | |
| Friday 16 November 2018 05:18:36 -0500 (0:00:00.397) 0:05:12.879 ******* | |
| TASK [kubernetes/master : kubeadm | Init other uninitialized masters] ********************************************************************************** | |
| Friday 16 November 2018 05:18:37 -0500 (0:00:00.533) 0:05:13.412 ******* | |
| TASK [kubernetes/master : kubeadm | Upgrade other masters] ********************************************************************************************* | |
| Friday 16 November 2018 05:18:37 -0500 (0:00:00.202) 0:05:13.615 ******* | |
| TASK [kubernetes/master : kubeadm | Check service account key again] *********************************************************************************** | |
| Friday 16 November 2018 05:18:37 -0500 (0:00:00.250) 0:05:13.866 ******* | |
| TASK [kubernetes/master : kubeadm | Set secret_changed if service account key was updated] ************************************************************* | |
| Friday 16 November 2018 05:18:37 -0500 (0:00:00.111) 0:05:13.977 ******* | |
| TASK [kubernetes/master : kubeadm | Purge old certs] *************************************************************************************************** | |
| Friday 16 November 2018 05:18:37 -0500 (0:00:00.193) 0:05:14.171 ******* | |
| TASK [kubernetes/master : Write kube-apiserver manifest] *********************************************************************************************** | |
| Friday 16 November 2018 05:18:37 -0500 (0:00:00.182) 0:05:14.353 ******* | |
| changed: [node1] => {"changed": true, "checksum": "52a80afd5286f797915a22a2a924b73fcd71cc82", "dest": "/etc/kubernetes/manifests/kube-apiserver.manifest", "gid": 0, "group": "root", "md5sum": "19e2818acbcd08c6009bb5227d26ef03", "mode": "0644", "owner": "root", "size": 3475, "src": "/root/.ansible/tmp/ansible-tmp-1542363518.26-210318037200326/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "e3a8da08ab1023823536d617ce6f99993816fbae", "dest": "/etc/kubernetes/manifests/kube-apiserver.manifest", "gid": 0, "group": "root", "md5sum": "57e0eb5fcda38c337b11c909828c35ec", "mode": "0644", "owner": "root", "size": 3475, "src": "/root/.ansible/tmp/ansible-tmp-1542363518.33-192551038549876/source", "state": "file", "uid": 0} | |
| RUNNING HANDLER [kubernetes/master : Master | Restart apiserver] *************************************************************************************** | |
| Friday 16 November 2018 05:18:39 -0500 (0:00:01.485) 0:05:15.838 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.003566", "end": "2018-11-16 05:18:40.008899", "rc": 0, "start": "2018-11-16 05:18:40.005333", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node2] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.002991", "end": "2018-11-16 05:18:39.883503", "rc": 0, "start": "2018-11-16 05:18:39.880512", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [kubernetes/master : Master | Remove apiserver container] ****************************************************************************** | |
| Friday 16 November 2018 05:18:40 -0500 (0:00:00.777) 0:05:16.615 ******* | |
| changed: [node1] => {"attempts": 1, "changed": true, "cmd": "docker ps -af name=k8s_kube-apiserver* -q | xargs --no-run-if-empty docker rm -f", "delta": "0:00:00.139543", "end": "2018-11-16 05:18:40.937094", "rc": 0, "start": "2018-11-16 05:18:40.797551", "stderr": "", "stderr_lines": [], "stdout": "315bb22dc5a4", "stdout_lines": ["315bb22dc5a4"]} | |
| changed: [node2] => {"attempts": 1, "changed": true, "cmd": "docker ps -af name=k8s_kube-apiserver* -q | xargs --no-run-if-empty docker rm -f", "delta": "0:00:00.113778", "end": "2018-11-16 05:18:40.777062", "rc": 0, "start": "2018-11-16 05:18:40.663284", "stderr": "", "stderr_lines": [], "stdout": "7e2369ad27b8", "stdout_lines": ["7e2369ad27b8"]} | |
| RUNNING HANDLER [kubernetes/master : Master | wait for the apiserver to be running] ******************************************************************** | |
| Friday 16 November 2018 05:18:41 -0500 (0:00:00.818) 0:05:17.434 ******* | |
| FAILED - RETRYING: Master | wait for the apiserver to be running (30 retries left). | |
| FAILED - RETRYING: Master | wait for the apiserver to be running (30 retries left). | |
| ok: [node2] => {"attempts": 2, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:19:09 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "https://127.0.0.1:6443/healthz"} | |
| ok: [node1] => {"attempts": 2, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:19:09 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "https://127.0.0.1:6443/healthz"} | |
| TASK [kubernetes/master : Write kube-scheduler policy file] ******************************************************************************************** | |
| Friday 16 November 2018 05:19:10 -0500 (0:00:28.986) 0:05:46.420 ******* | |
| changed: [node1] => {"changed": true, "checksum": "03eac66ab50faa4afb62358841f801fa8c54c8aa", "dest": "/etc/kubernetes/kube-scheduler-policy.yaml", "gid": 0, "group": "root", "md5sum": "62cd0cdba2b1a6faa7bc3064ec5e62b1", "mode": "0644", "owner": "root", "size": 945, "src": "/root/.ansible/tmp/ansible-tmp-1542363550.35-229637662125537/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "03eac66ab50faa4afb62358841f801fa8c54c8aa", "dest": "/etc/kubernetes/kube-scheduler-policy.yaml", "gid": 0, "group": "root", "md5sum": "62cd0cdba2b1a6faa7bc3064ec5e62b1", "mode": "0644", "owner": "root", "size": 945, "src": "/root/.ansible/tmp/ansible-tmp-1542363550.44-239475358057231/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/master : Write kube-scheduler kubeconfig] ********************************************************************************************* | |
| Friday 16 November 2018 05:19:11 -0500 (0:00:01.059) 0:05:47.480 ******* | |
| changed: [node1] => {"changed": true, "checksum": "cca1e184bf425363350279f3b48ac5c4a8f12dfa", "dest": "/etc/kubernetes/kube-scheduler-kubeconfig.yaml", "gid": 0, "group": "root", "md5sum": "97d11d87956f735448f800a37952ea6c", "mode": "0644", "owner": "root", "size": 460, "src": "/root/.ansible/tmp/ansible-tmp-1542363551.41-253271225824632/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "cca1e184bf425363350279f3b48ac5c4a8f12dfa", "dest": "/etc/kubernetes/kube-scheduler-kubeconfig.yaml", "gid": 0, "group": "root", "md5sum": "97d11d87956f735448f800a37952ea6c", "mode": "0644", "owner": "root", "size": 460, "src": "/root/.ansible/tmp/ansible-tmp-1542363551.48-100386143914332/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/master : Write kube-scheduler manifest] *********************************************************************************************** | |
| Friday 16 November 2018 05:19:12 -0500 (0:00:01.277) 0:05:48.757 ******* | |
| changed: [node1] => {"changed": true, "checksum": "e0dacd51f3e21930a43b304a46fe40002c754e0d", "dest": "/etc/kubernetes/manifests/kube-scheduler.manifest", "gid": 0, "group": "root", "md5sum": "41674bcd248f83c30255171ed478d8cd", "mode": "0644", "owner": "root", "size": 1737, "src": "/root/.ansible/tmp/ansible-tmp-1542363552.68-140202065242185/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "e0dacd51f3e21930a43b304a46fe40002c754e0d", "dest": "/etc/kubernetes/manifests/kube-scheduler.manifest", "gid": 0, "group": "root", "md5sum": "41674bcd248f83c30255171ed478d8cd", "mode": "0644", "owner": "root", "size": 1737, "src": "/root/.ansible/tmp/ansible-tmp-1542363552.77-90158183779484/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/master : Write kube-controller-manager kubeconfig] ************************************************************************************ | |
| Friday 16 November 2018 05:19:13 -0500 (0:00:01.104) 0:05:49.861 ******* | |
| changed: [node1] => {"changed": true, "checksum": "c6bc384b2b87a6f55303b33a1c8c9bef35b6243d", "dest": "/etc/kubernetes/kube-controller-manager-kubeconfig.yaml", "gid": 0, "group": "root", "md5sum": "56ef66fa01a913741d0a02e89d5d43d7", "mode": "0644", "owner": "root", "size": 514, "src": "/root/.ansible/tmp/ansible-tmp-1542363553.81-230751938993776/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "c6bc384b2b87a6f55303b33a1c8c9bef35b6243d", "dest": "/etc/kubernetes/kube-controller-manager-kubeconfig.yaml", "gid": 0, "group": "root", "md5sum": "56ef66fa01a913741d0a02e89d5d43d7", "mode": "0644", "owner": "root", "size": 514, "src": "/root/.ansible/tmp/ansible-tmp-1542363553.91-118341850972949/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/master : Write kube-controller-manager manifest] ************************************************************************************** | |
| Friday 16 November 2018 05:19:14 -0500 (0:00:01.321) 0:05:51.183 ******* | |
| changed: [node1] => {"changed": true, "checksum": "00c167d03767b3b5f1750a2a82cf2f3f5fceae77", "dest": "/etc/kubernetes/manifests/kube-controller-manager.manifest", "gid": 0, "group": "root", "md5sum": "dcbe401bcc4f443ee8b490b1f5df5b61", "mode": "0644", "owner": "root", "size": 2351, "src": "/root/.ansible/tmp/ansible-tmp-1542363555.13-249751293313930/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "75cde4e7873e266b27baaff13be6f2b1cbaea4c2", "dest": "/etc/kubernetes/manifests/kube-controller-manager.manifest", "gid": 0, "group": "root", "md5sum": "cf657e523ca4afa4929311d45cdc8fee", "mode": "0644", "owner": "root", "size": 2351, "src": "/root/.ansible/tmp/ansible-tmp-1542363555.22-260359351529506/source", "state": "file", "uid": 0} | |
| RUNNING HANDLER [kubernetes/master : Master | Restart kube-scheduler] ********************************************************************************** | |
| Friday 16 November 2018 05:19:15 -0500 (0:00:01.150) 0:05:52.334 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.004890", "end": "2018-11-16 05:19:16.522594", "rc": 0, "start": "2018-11-16 05:19:16.517704", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node2] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.003386", "end": "2018-11-16 05:19:16.364226", "rc": 0, "start": "2018-11-16 05:19:16.360840", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [kubernetes/master : Master | Restart kube-controller-manager] ************************************************************************* | |
| Friday 16 November 2018 05:19:16 -0500 (0:00:00.754) 0:05:53.088 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.002863", "end": "2018-11-16 05:19:17.223618", "rc": 0, "start": "2018-11-16 05:19:17.220755", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| changed: [node2] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.003447", "end": "2018-11-16 05:19:17.091415", "rc": 0, "start": "2018-11-16 05:19:17.087968", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| RUNNING HANDLER [kubernetes/master : Master | Remove scheduler container] ****************************************************************************** | |
| Friday 16 November 2018 05:19:17 -0500 (0:00:00.740) 0:05:53.829 ******* | |
| changed: [node1] => {"attempts": 1, "changed": true, "cmd": "docker ps -af name=k8s_kube-scheduler* -q | xargs --no-run-if-empty docker rm -f", "delta": "0:00:00.118515", "end": "2018-11-16 05:19:18.121447", "rc": 0, "start": "2018-11-16 05:19:18.002932", "stderr": "", "stderr_lines": [], "stdout": "713d531b9f68", "stdout_lines": ["713d531b9f68"]} | |
| changed: [node2] => {"attempts": 1, "changed": true, "cmd": "docker ps -af name=k8s_kube-scheduler* -q | xargs --no-run-if-empty docker rm -f", "delta": "0:00:00.104276", "end": "2018-11-16 05:19:17.971819", "rc": 0, "start": "2018-11-16 05:19:17.867543", "stderr": "", "stderr_lines": [], "stdout": "2521230613de", "stdout_lines": ["2521230613de"]} | |
| RUNNING HANDLER [kubernetes/master : Master | Remove controller manager container] ********************************************************************* | |
| Friday 16 November 2018 05:19:18 -0500 (0:00:00.793) 0:05:54.623 ******* | |
| changed: [node1] => {"attempts": 1, "changed": true, "cmd": "docker ps -af name=k8s_kube-controller-manager* -q | xargs --no-run-if-empty docker rm -f", "delta": "0:00:00.124646", "end": "2018-11-16 05:19:19.026416", "rc": 0, "start": "2018-11-16 05:19:18.901770", "stderr": "", "stderr_lines": [], "stdout": "724205b6fdc9", "stdout_lines": ["724205b6fdc9"]} | |
| changed: [node2] => {"attempts": 1, "changed": true, "cmd": "docker ps -af name=k8s_kube-controller-manager* -q | xargs --no-run-if-empty docker rm -f", "delta": "0:00:00.119324", "end": "2018-11-16 05:19:18.856267", "rc": 0, "start": "2018-11-16 05:19:18.736943", "stderr": "", "stderr_lines": [], "stdout": "a6f1adb63924", "stdout_lines": ["a6f1adb63924"]} | |
| RUNNING HANDLER [kubernetes/master : Master | wait for kube-scheduler] ********************************************************************************* | |
| Friday 16 November 2018 05:19:19 -0500 (0:00:00.895) 0:05:55.519 ******* | |
| FAILED - RETRYING: Master | wait for kube-scheduler (60 retries left). | |
| FAILED - RETRYING: Master | wait for kube-scheduler (60 retries left). | |
| ok: [node2] => {"attempts": 2, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:19:25 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "http://localhost:10251/healthz"} | |
| ok: [node1] => {"attempts": 2, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:19:25 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "http://localhost:10251/healthz"} | |
| RUNNING HANDLER [kubernetes/master : Master | wait for kube-controller-manager] ************************************************************************ | |
| Friday 16 November 2018 05:19:25 -0500 (0:00:06.311) 0:06:01.830 ******* | |
| ok: [node2] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:19:26 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "http://localhost:10252/healthz"} | |
| ok: [node1] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:19:26 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "http://localhost:10252/healthz"} | |
| TASK [kubernetes/client : Set external kube-apiserver endpoint] **************************************************************************************** | |
| Friday 16 November 2018 05:19:26 -0500 (0:00:00.960) 0:06:02.790 ******* | |
| ok: [node1] => {"ansible_facts": {"external_apiserver_endpoint": "https://10.10.10.105:6443"}, "changed": false} | |
| ok: [node2] => {"ansible_facts": {"external_apiserver_endpoint": "https://10.10.10.101:6443"}, "changed": false} | |
| TASK [kubernetes/client : Gather certs for admin kubeconfig] ******************************************************************************************* | |
| Friday 16 November 2018 05:19:26 -0500 (0:00:00.491) 0:06:03.282 ******* | |
| ok: [node2] => (item=/etc/kubernetes/ssl/ca.pem) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/ca.pem", "source": "/etc/kubernetes/ssl/ca.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/ca.pem) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/ca.pem", "source": "/etc/kubernetes/ssl/ca.pem"} | |
| ok: [node2] => (item=/etc/kubernetes/ssl/admin-node2.pem) => {"changed": false, "content": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURvekNDQW91Z0F3SUJBZ0lKQU1Vb1N3Y3A1N3NwTUEwR0NTcUdTSWIzRFFFQkN3VUFNQkl4RURBT0JnTlYKQkFNTUIydDFZbVV0WTJFd0lCY05NVGd4TVRFMk1UQXhOek0xV2hnUE1qRXhPREV3TWpNeE1ERTNNelZhTURReApHVEFYQmdOVkJBTU1FR3QxWW1VdFlXUnRhVzR0Ym05a1pUSXhGekFWQmdOVkJBb01Ebk41YzNSbGJUcHRZWE4wClpYSnpNSUlCSWpBTkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQTBtK25PNkZkTFJEVlB6Zk4KRTB3cmF3VnhrU05CYllINlFPaWFZM1hpTGtjVFp4RW1vWERtdnNZb1hma09sMEtpcWpZcWRuWGRuYjV5MXBoWApnQ3pSZVVVVmM2S05TZDh5RU5MSmxCaGNpbzcvRnlnUVlrZ0krV3JoMlpCNlJHb3N0eWtubURxY1ZBUG5HNGNYCm8rWGRTaDIwV0l6cmpHNWJzWm1QVXBJUVJCOWRESGRONnh5SUNEbWFIQXdWVTFlb0dwN3hBTnNHQzI3cVVURFUKSDBNM3VQWVBQdkhsVDBEOW1WVDFTWUp1SEw5QXptNzJSYm9GZU5KR0RNMW02MGtacTlGYTVhVVBBRmNNb0FjMwpIZDZWSGVDQ0RYY3FzS01mNi9xYy83ZlJKQkhTWGFGS1Y0bU5nVG1lOXRCTlFQNnRmSmpyTXJrRmc0L3dMaURWCldrZ29Ud0lEQVFBQm80SFhNSUhVTUFrR0ExVWRFd1FDTUFBd0N3WURWUjBQQkFRREFnWGdNSUc1QmdOVkhSRUUKZ2JFd2dhNkNDbXQxWW1WeWJtVjBaWE9DRW10MVltVnlibVYwWlhNdVpHVm1ZWFZzZElJV2EzVmlaWEp1WlhSbApjeTVrWldaaGRXeDBMbk4yWTRJa2EzVmlaWEp1WlhSbGN5NWtaV1poZFd4MExuTjJZeTVqYkhWemRHVnlMbXh2ClkyRnNnZ2xzYjJOaGJHaHZjM1NDQlc1dlpHVXhnZ1Z1YjJSbE1vSWRiR0l0WVhCcGMyVnlkbVZ5TG10MVltVnkKYm1WMFpYTXViRzlqWVd5SEJBb0tDbW1IQkFvS0NtV0hCQXJwQUFHSEJIOEFBQUV3RFFZSktvWklodmNOQVFFTApCUUFEZ2dFQkFEUEFmKy9qa1Y3anlDTmY4ZDV6bGk3RWd1T3NMTm1XbTJXekVLNHlvUnZIUkZaRTE1L0EyTU52CmxITHU5UnN4MW9UbUFEQ2Rkayt2UEFoK0xPSlVYUGFnK0xteGhKYSt4Ny9rNTBHTjcyYzAzS09FZFV4ZGt3VzcKUWdBZG9RcHNJSFhxZ2Z4TEd1cUFqeE5yTDg1NlM5TkRkNkFTVjI1Y1JYaXJhZys5RXhTT0NkL0hlNFJLVWNYKwpLcTFDL1V3UDZLcTRmSzFqM0hzSmcrWEU3VkdEaUVIOXR6dWszRWVnU2tMbjkvdlg2a09JZExSbU0ydm0rQUtrCnllcUNWdm9vZUVtc2JjK1lVTk9HZ0RkOHl4NDBNaXdQbTZuZjI4Y1kwaldTVFNrQ0phZ1pEa3Y1enBpQ29zNGwKMm5sWDZUaW1NVDJaMHdMbERZUVVFUTB4Wk1OeHUyRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", "encoding": "base64", "item": "/etc/kubernetes/ssl/admin-node2.pem", "source": "/etc/kubernetes/ssl/admin-node2.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/admin-node1.pem) => {"changed": false, "content": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURvekNDQW91Z0F3SUJBZ0lKQU1Vb1N3Y3A1N3NvTUEwR0NTcUdTSWIzRFFFQkN3VUFNQkl4RURBT0JnTlYKQkFNTUIydDFZbVV0WTJFd0lCY05NVGd4TVRFMk1UQXhOek0wV2hnUE1qRXhPREV3TWpNeE1ERTNNelJhTURReApHVEFYQmdOVkJBTU1FR3QxWW1VdFlXUnRhVzR0Ym05a1pURXhGekFWQmdOVkJBb01Ebk41YzNSbGJUcHRZWE4wClpYSnpNSUlCSWpBTkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQTQ5RkFpNW41KzQ4NllQMEYKbnpZNDRVRlVQeXpDS0hjM1MveHVzZkF1c25EL1VyVzNtanQ5cVZHZk12Z0JIYm5sczdmRHl1WjJKUllqUXBHSgp1dDh3SmRTUGhmUXkxd05NK3ozZHc1WkswL08vZzVkYVJxSEFYeVluaGdBV1JPUjlQQnVPVjBYSndMcjNaR0VoCjFZeWViWUlabWk3Ujc3VmJQMVROWkh6TkFOTzhnQmd3UWFlTHBLeDZoZURnWFk1TjFEK21DK1NKRzZiajhObEQKS2c0NkFWYW1VUmtDeUxralVxK1k0dElzaTBnWUtab0RCTVZaa1l3dXN1aXdxTC9NZytYNUx6SElxVDd5azZYVgpqN3lCQ1I2YjZHYm82SDA2alN5TG5LK0oxLzNONFZMZE1wQWFvTkFnc2VaaVU4c1ZZT3JsWUpSR3R1REVVMFhvCkJPK29NUUlEQVFBQm80SFhNSUhVTUFrR0ExVWRFd1FDTUFBd0N3WURWUjBQQkFRREFnWGdNSUc1QmdOVkhSRUUKZ2JFd2dhNkNDbXQxWW1WeWJtVjBaWE9DRW10MVltVnlibVYwWlhNdVpHVm1ZWFZzZElJV2EzVmlaWEp1WlhSbApjeTVrWldaaGRXeDBMbk4yWTRJa2EzVmlaWEp1WlhSbGN5NWtaV1poZFd4MExuTjJZeTVqYkhWemRHVnlMbXh2ClkyRnNnZ2xzYjJOaGJHaHZjM1NDQlc1dlpHVXhnZ1Z1YjJSbE1vSWRiR0l0WVhCcGMyVnlkbVZ5TG10MVltVnkKYm1WMFpYTXViRzlqWVd5SEJBb0tDbW1IQkFvS0NtV0hCQXJwQUFHSEJIOEFBQUV3RFFZSktvWklodmNOQVFFTApCUUFEZ2dFQkFJNjN3V0tLQ0xab2FKUXBpWkxDYUpsWG5OMXRhUlFkS21qK2g5Mk02N3hPSEY1M0ljN0kvZlF0CmZwK29TN3VWdDE1YlpJWC9jWkpaV0NpWTlrYlM3TDVEa0pNMTFlaW95Ynk3TmZvWTVidThmYU9WYUwxUmluSzMKeVdzWFRtNnkyRmhvQnRFbmdXMGZrK29NUjd2dGE1cTFDT0hFOXFsY2VzSFBIdFlhbnBRYXN5bHdud2tlOGZvOQpBdjEzWklTd0cxU2s4cTB4M2RNWGZEQXBQSEJWNHlrM1ZHUWM0ZFM4UmFhMmhwNkdjTUdnZ3NHV2JlT1RiY2ZBCkZZdk9DSUlpZ2FlSzBBMkRHTFRCQmJLeDRHZ0svcHFoTEg2dmRUSjBXQ0hlK3J4ak91NW0vdWdmUUpjQjYxMmEKQ1NNWi9DaitqbjV6cTFYdUhJS1paKzU5MENzK0dSdz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", "encoding": "base64", "item": "/etc/kubernetes/ssl/admin-node1.pem", "source": "/etc/kubernetes/ssl/admin-node1.pem"} | |
| ok: [node2] => (item=/etc/kubernetes/ssl/admin-node2-key.pem) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/admin-node2-key.pem", "source": "/etc/kubernetes/ssl/admin-node2-key.pem"} | |
| ok: [node1] => (item=/etc/kubernetes/ssl/admin-node1-key.pem) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/admin-node1-key.pem", "source": "/etc/kubernetes/ssl/admin-node1-key.pem"} | |
| TASK [kubernetes/client : Write admin kubeconfig] ****************************************************************************************************** | |
| Friday 16 November 2018 05:19:28 -0500 (0:00:01.433) 0:06:04.716 ******* | |
| changed: [node1] => {"changed": true, "checksum": "57259f6488c88c0b326ccc23551dd169f25c451c", "dest": "/etc/kubernetes/admin.conf", "gid": 992, "group": "kube-cert", "md5sum": "2957fdb8b713fb7a637af4f194df2e66", "mode": "0640", "owner": "root", "size": 5856, "src": "/root/.ansible/tmp/ansible-tmp-1542363568.7-111630954894250/source", "state": "file", "uid": 0} | |
| changed: [node2] => {"changed": true, "checksum": "e146d197b6602d2574163468e45950fe74c284f2", "dest": "/etc/kubernetes/admin.conf", "gid": 992, "group": "kube-cert", "md5sum": "31a5b875f96d4e59ff392627e36c0c41", "mode": "0640", "owner": "root", "size": 5856, "src": "/root/.ansible/tmp/ansible-tmp-1542363568.77-126224542561562/source", "state": "file", "uid": 0} | |
| TASK [kubernetes/client : Create kube config dir] ****************************************************************************************************** | |
| Friday 16 November 2018 05:19:29 -0500 (0:00:01.085) 0:06:05.801 ******* | |
| changed: [node1] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/root/.kube", "size": 6, "state": "directory", "uid": 0} | |
| changed: [node2] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/root/.kube", "size": 6, "state": "directory", "uid": 0} | |
| TASK [kubernetes/client : Copy admin kubeconfig to root user home] ************************************************************************************* | |
| Friday 16 November 2018 05:19:30 -0500 (0:00:00.737) 0:06:06.539 ******* | |
| changed: [node2] => {"changed": true, "checksum": "e146d197b6602d2574163468e45950fe74c284f2", "dest": "/root/.kube/config", "gid": 0, "group": "root", "md5sum": "31a5b875f96d4e59ff392627e36c0c41", "mode": "0600", "owner": "root", "size": 5856, "src": "/etc/kubernetes/admin.conf", "state": "file", "uid": 0} | |
| changed: [node1] => {"changed": true, "checksum": "57259f6488c88c0b326ccc23551dd169f25c451c", "dest": "/root/.kube/config", "gid": 0, "group": "root", "md5sum": "2957fdb8b713fb7a637af4f194df2e66", "mode": "0600", "owner": "root", "size": 5856, "src": "/etc/kubernetes/admin.conf", "state": "file", "uid": 0} | |
| TASK [kubernetes/client : Copy admin kubeconfig to ansible host] *************************************************************************************** | |
| Friday 16 November 2018 05:19:30 -0500 (0:00:00.702) 0:06:07.242 ******* | |
| TASK [kubernetes/client : Copy kubectl binary to ansible host] ***************************************************************************************** | |
| Friday 16 November 2018 05:19:30 -0500 (0:00:00.094) 0:06:07.336 ******* | |
| TASK [kubernetes/client : create helper script kubectl.sh on ansible host] ***************************************************************************** | |
| Friday 16 November 2018 05:19:31 -0500 (0:00:00.109) 0:06:07.446 ******* | |
| TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Wait for kube-apiserver] *********************************************************************** | |
| Friday 16 November 2018 05:19:31 -0500 (0:00:00.102) 0:06:07.548 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:19:32 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "https://127.0.0.1:6443/healthz"} | |
| TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add ClusterRoleBinding to admit nodes] ********************************************************* | |
| Friday 16 November 2018 05:19:32 -0500 (0:00:01.139) 0:06:08.688 ******* | |
| changed: [node1] => {"changed": true, "checksum": "7a5d333673421310e034bd1931c65d490d541632", "dest": "/etc/kubernetes/node-crb.yml", "gid": 0, "group": "root", "md5sum": "63565185c3821bd7eb783657a86d84c9", "mode": "0644", "owner": "root", "size": 408, "src": "/root/.ansible/tmp/ansible-tmp-1542363572.7-119037625770769/source", "state": "file", "uid": 0} | |
| TASK [kubernetes-apps/cluster_roles : Apply workaround to allow all nodes with cert O=system:nodes to register] **************************************** | |
| Friday 16 November 2018 05:19:33 -0500 (0:00:01.013) 0:06:09.702 ******* | |
| ok: [node1] => {"changed": false, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io \"kubespray:system:node\" created"} | |
| TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add webhook ClusterRole that grants access to proxy, stats, log, spec, and metrics on a kubelet] *** | |
| Friday 16 November 2018 05:19:34 -0500 (0:00:01.554) 0:06:11.256 ******* | |
| TASK [kubernetes-apps/cluster_roles : Apply webhook ClusterRole] *************************************************************************************** | |
| Friday 16 November 2018 05:19:35 -0500 (0:00:00.257) 0:06:11.514 ******* | |
| TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add ClusterRoleBinding for system:nodes to webhook ClusterRole] ******************************** | |
| Friday 16 November 2018 05:19:35 -0500 (0:00:00.184) 0:06:11.699 ******* | |
| TASK [kubernetes-apps/cluster_roles : Grant system:nodes the webhook ClusterRole] ********************************************************************** | |
| Friday 16 November 2018 05:19:35 -0500 (0:00:00.241) 0:06:11.940 ******* | |
| TASK [kubernetes-apps/cluster_roles : Check if vsphere-cloud-provider ClusterRole exists] ************************************************************** | |
| Friday 16 November 2018 05:19:35 -0500 (0:00:00.235) 0:06:12.176 ******* | |
| TASK [kubernetes-apps/cluster_roles : Write vsphere-cloud-provider ClusterRole manifest] *************************************************************** | |
| Friday 16 November 2018 05:19:35 -0500 (0:00:00.196) 0:06:12.373 ******* | |
| TASK [kubernetes-apps/cluster_roles : Apply vsphere-cloud-provider ClusterRole] ************************************************************************ | |
| Friday 16 November 2018 05:19:36 -0500 (0:00:00.215) 0:06:12.588 ******* | |
| PLAY [k8s-cluster] ************************************************************************************************************************************* | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:19:36 -0500 (0:00:00.262) 0:06:12.850 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:19:36 -0500 (0:00:00.197) 0:06:13.048 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:19:38 -0500 (0:00:01.589) 0:06:14.638 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:19:39 -0500 (0:00:01.493) 0:06:16.132 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| ok: [node2] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [kubernetes/kubeadm : Set kubeadm_discovery_address] ********************************************************************************************** | |
| Friday 16 November 2018 05:19:40 -0500 (0:00:00.491) 0:06:16.623 ******* | |
| TASK [kubernetes/kubeadm : Check if kubelet.conf exists] *********************************************************************************************** | |
| Friday 16 November 2018 05:19:40 -0500 (0:00:00.156) 0:06:16.779 ******* | |
| TASK [kubernetes/kubeadm : Calculate kubeadm CA cert hash] ********************************************************************************************* | |
| Friday 16 November 2018 05:19:40 -0500 (0:00:00.241) 0:06:17.020 ******* | |
| TASK [kubernetes/kubeadm : Create kubeadm token for joining nodes with 24h expiration (default)] ******************************************************* | |
| Friday 16 November 2018 05:19:40 -0500 (0:00:00.164) 0:06:17.185 ******* | |
| TASK [kubernetes/kubeadm : Create kubeadm client config] *********************************************************************************************** | |
| Friday 16 November 2018 05:19:40 -0500 (0:00:00.087) 0:06:17.273 ******* | |
| TASK [kubernetes/kubeadm : Join to cluster if needed] ************************************************************************************************** | |
| Friday 16 November 2018 05:19:41 -0500 (0:00:00.150) 0:06:17.424 ******* | |
| TASK [kubernetes/kubeadm : Wait for kubelet bootstrap to create config] ******************************************************************************** | |
| Friday 16 November 2018 05:19:41 -0500 (0:00:00.161) 0:06:17.585 ******* | |
| TASK [kubernetes/kubeadm : Update server field in kubelet kubeconfig] ********************************************************************************** | |
| Friday 16 November 2018 05:19:41 -0500 (0:00:00.158) 0:06:17.744 ******* | |
| TASK [kubernetes/kubeadm : Update server field in kube-proxy kubeconfig] ******************************************************************************* | |
| Friday 16 November 2018 05:19:41 -0500 (0:00:00.230) 0:06:17.975 ******* | |
| TASK [kubernetes/kubeadm : Restart all kube-proxy pods to ensure that they load the new configmap] ***************************************************** | |
| Friday 16 November 2018 05:19:41 -0500 (0:00:00.158) 0:06:18.133 ******* | |
| TASK [kubernetes/kubeadm : Symlink kubelet kubeconfig for calico/canal] ******************************************************************************** | |
| Friday 16 November 2018 05:19:41 -0500 (0:00:00.095) 0:06:18.228 ******* | |
| TASK [network_plugin/cilium : Cilium | Ensure BFPFS mounted] ******************************************************************************************* | |
| Friday 16 November 2018 05:19:42 -0500 (0:00:00.176) 0:06:18.405 ******* | |
| TASK [network_plugin/cilium : Cilium | Create Cilium certs directory] ********************************************************************************** | |
| Friday 16 November 2018 05:19:42 -0500 (0:00:00.302) 0:06:18.707 ******* | |
| TASK [network_plugin/cilium : Cilium | Link etcd certificates for cilium] ****************************************************************************** | |
| Friday 16 November 2018 05:19:42 -0500 (0:00:00.180) 0:06:18.887 ******* | |
| TASK [network_plugin/cilium : Cilium | Create Cilium node manifests] *********************************************************************************** | |
| Friday 16 November 2018 05:19:42 -0500 (0:00:00.238) 0:06:19.126 ******* | |
| TASK [network_plugin/cilium : Cilium | Set CNI directory permissions] ********************************************************************************** | |
| Friday 16 November 2018 05:19:43 -0500 (0:00:00.303) 0:06:19.429 ******* | |
| TASK [network_plugin/cilium : Cilium | Create network policy directory] ******************************************************************************** | |
| Friday 16 November 2018 05:19:43 -0500 (0:00:00.166) 0:06:19.596 ******* | |
| TASK [network_plugin/calico : Calico | Disable calico-node service if it exists] *********************************************************************** | |
| Friday 16 November 2018 05:19:43 -0500 (0:00:00.156) 0:06:19.752 ******* | |
| ok: [node1] => {"changed": false, "failed_when_result": false, "msg": "Could not find the requested service calico-node: host"} | |
| ok: [node2] => {"changed": false, "failed_when_result": false, "msg": "Could not find the requested service calico-node: host"} | |
| TASK [network_plugin/calico : Calico | Get kubelet hostname] ******************************************************************************************* | |
| Friday 16 November 2018 05:19:44 -0500 (0:00:00.700) 0:06:20.453 ******* | |
| TASK [network_plugin/calico : Calico | Write Calico cni config] **************************************************************************************** | |
| Friday 16 November 2018 05:19:44 -0500 (0:00:00.243) 0:06:20.696 ******* | |
| changed: [node1] => {"changed": true, "checksum": "31b40bdb3e9ac90de91e145ad9dcab25afa6fd89", "dest": "/etc/cni/net.d/10-calico.conflist", "gid": 0, "group": "root", "md5sum": "e4c2a5957c090ce49c7d10ebd4c15cc8", "mode": "0644", "owner": "kube", "size": 716, "src": "/root/.ansible/tmp/ansible-tmp-1542363584.63-177248077023840/source", "state": "file", "uid": 996} | |
| changed: [node2] => {"changed": true, "checksum": "e2e107d9e92826aad6e9af9ea7649040a8d49221", "dest": "/etc/cni/net.d/10-calico.conflist", "gid": 0, "group": "root", "md5sum": "dc875fe7d1a91305013d575a118409b2", "mode": "0644", "owner": "kube", "size": 716, "src": "/root/.ansible/tmp/ansible-tmp-1542363584.71-244867682597364/source", "state": "file", "uid": 996} | |
| TASK [network_plugin/calico : Calico | Create calico certs directory] ********************************************************************************** | |
| Friday 16 November 2018 05:19:45 -0500 (0:00:01.284) 0:06:21.981 ******* | |
| changed: [node1] => {"changed": true, "gid": 0, "group": "root", "mode": "0750", "owner": "root", "path": "/etc/calico/certs", "size": 6, "state": "directory", "uid": 0} | |
| changed: [node2] => {"changed": true, "gid": 0, "group": "root", "mode": "0750", "owner": "root", "path": "/etc/calico/certs", "size": 6, "state": "directory", "uid": 0} | |
| TASK [network_plugin/calico : Calico | Link etcd certificates for calico-node] ************************************************************************* | |
| Friday 16 November 2018 05:19:46 -0500 (0:00:00.675) 0:06:22.657 ******* | |
| changed: [node1] => (item={u's': u'ca.pem', u'd': u'ca_cert.crt'}) => {"changed": true, "dest": "/etc/calico/certs/ca_cert.crt", "gid": 0, "group": "root", "item": {"d": "ca_cert.crt", "s": "ca.pem"}, "mode": "0640", "owner": "kube", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "hard", "uid": 996} | |
| changed: [node2] => (item={u's': u'ca.pem', u'd': u'ca_cert.crt'}) => {"changed": true, "dest": "/etc/calico/certs/ca_cert.crt", "gid": 0, "group": "root", "item": {"d": "ca_cert.crt", "s": "ca.pem"}, "mode": "0640", "owner": "kube", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "hard", "uid": 996} | |
| changed: [node1] => (item={u's': u'node-node1.pem', u'd': u'cert.crt'}) => {"changed": true, "dest": "/etc/calico/certs/cert.crt", "gid": 0, "group": "root", "item": {"d": "cert.crt", "s": "node-node1.pem"}, "mode": "0640", "owner": "kube", "size": 1359, "src": "/etc/ssl/etcd/ssl/node-node1.pem", "state": "hard", "uid": 996} | |
| changed: [node2] => (item={u's': u'node-node2.pem', u'd': u'cert.crt'}) => {"changed": true, "dest": "/etc/calico/certs/cert.crt", "gid": 0, "group": "root", "item": {"d": "cert.crt", "s": "node-node2.pem"}, "mode": "0640", "owner": "kube", "size": 1359, "src": "/etc/ssl/etcd/ssl/node-node2.pem", "state": "hard", "uid": 996} | |
| changed: [node1] => (item={u's': u'node-node1-key.pem', u'd': u'key.pem'}) => {"changed": true, "dest": "/etc/calico/certs/key.pem", "gid": 0, "group": "root", "item": {"d": "key.pem", "s": "node-node1-key.pem"}, "mode": "0640", "owner": "kube", "size": 1675, "src": "/etc/ssl/etcd/ssl/node-node1-key.pem", "state": "hard", "uid": 996} | |
| changed: [node2] => (item={u's': u'node-node2-key.pem', u'd': u'key.pem'}) => {"changed": true, "dest": "/etc/calico/certs/key.pem", "gid": 0, "group": "root", "item": {"d": "key.pem", "s": "node-node2-key.pem"}, "mode": "0640", "owner": "kube", "size": 1675, "src": "/etc/ssl/etcd/ssl/node-node2-key.pem", "state": "hard", "uid": 996} | |
| TASK [network_plugin/calico : Calico | Install calicoctl container script] ***************************************************************************** | |
| Friday 16 November 2018 05:19:47 -0500 (0:00:01.173) 0:06:23.831 ******* | |
| ok: [node1] => {"changed": false, "checksum": "249efc3de7324b1609608ce5a224635670531080", "dest": "/usr/local/bin/calicoctl", "gid": 0, "group": "root", "md5sum": "696ec13696fc6b4a6ba003a92834cf33", "mode": "0755", "owner": "root", "size": 501, "src": "/root/.ansible/tmp/ansible-tmp-1542363587.74-64570667666872/source", "state": "file", "uid": 0} | |
| ok: [node2] => {"changed": false, "checksum": "249efc3de7324b1609608ce5a224635670531080", "dest": "/usr/local/bin/calicoctl", "gid": 0, "group": "root", "md5sum": "696ec13696fc6b4a6ba003a92834cf33", "mode": "0755", "owner": "root", "size": 501, "src": "/root/.ansible/tmp/ansible-tmp-1542363587.82-177473818831219/source", "state": "file", "uid": 0} | |
| TASK [network_plugin/calico : Calico | Copy cni plugins from hyperkube] ******************************************************************************** | |
| Friday 16 November 2018 05:19:48 -0500 (0:00:01.226) 0:06:25.058 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/opt/cni/bin:/cnibindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/bin/cp", "-rf", "/opt/cni/bin/.", "/cnibindir/"], "delta": "0:00:00.605907", "end": "2018-11-16 05:19:49.779054", "rc": 0, "start": "2018-11-16 05:19:49.173147", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| ok: [node2] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/opt/cni/bin:/cnibindir", "gcr.io/google-containers/hyperkube:v1.10.4", "/bin/cp", "-rf", "/opt/cni/bin/.", "/cnibindir/"], "delta": "0:00:00.630331", "end": "2018-11-16 05:19:49.679649", "rc": 0, "start": "2018-11-16 05:19:49.049318", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [network_plugin/calico : Calico | Copy cni plugins from calico/cni container] ********************************************************************* | |
| Friday 16 November 2018 05:19:50 -0500 (0:00:01.356) 0:06:26.414 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/opt/cni/bin:/cnibindir", "quay.io/calico/cni:v1.11.4", "sh", "-c", "cp /opt/cni/bin/* /cnibindir/"], "delta": "0:00:00.895324", "end": "2018-11-16 05:19:51.446349", "rc": 0, "start": "2018-11-16 05:19:50.551025", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| ok: [node2] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/opt/cni/bin:/cnibindir", "quay.io/calico/cni:v1.11.4", "sh", "-c", "cp /opt/cni/bin/* /cnibindir/"], "delta": "0:00:00.960527", "end": "2018-11-16 05:19:51.343277", "rc": 0, "start": "2018-11-16 05:19:50.382750", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [network_plugin/calico : Calico | Set cni directory permissions] ********************************************************************************** | |
| Friday 16 November 2018 05:19:51 -0500 (0:00:01.646) 0:06:28.061 ******* | |
| changed: [node1] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 209, "state": "directory", "uid": 996} | |
| changed: [node2] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 209, "state": "directory", "uid": 996} | |
| TASK [network_plugin/calico : Calico | wait for etcd] ************************************************************************************************** | |
| Friday 16 November 2018 05:19:52 -0500 (0:00:00.681) 0:06:28.742 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "18", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:19:53 GMT", "json": {"health": "true"}, "msg": "OK (18 bytes)", "redirected": false, "status": 200, "url": "https://10.10.10.105:2379/health"} | |
| TASK [network_plugin/calico : Calico | Check if calico network pool has already been configured] ******************************************************* | |
| Friday 16 November 2018 05:19:53 -0500 (0:00:01.022) 0:06:29.764 ******* | |
| [WARNING]: Consider using the get_url or uri module rather than running curl. If you need to use command because get_url or uri is insufficient you | |
| can add warn=False to this command task or set command_warnings=False in ansible.cfg to get rid of this message. | |
| ok: [node1] => {"changed": false, "cmd": ["curl", "--cacert", "/etc/ssl/etcd/ssl/ca.pem", "--cert", "/etc/ssl/etcd/ssl/node-node1.pem", "--key", "/etc/ssl/etcd/ssl/node-node1-key.pem", "https://10.10.10.105:2379/v2/keys/calico/v1/ipam/v4/pool"], "delta": "0:00:00.151704", "end": "2018-11-16 05:19:54.222583", "rc": 0, "start": "2018-11-16 05:19:54.070879", "stderr": " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r100 72 100 72 0 0 511 0 --:--:-- --:--:-- --:--:-- 514", "stderr_lines": [" % Total % Received % Xferd Average Speed Time Time Time Current", " Dload Upload Total Spent Left Speed", "", " 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0", "100 72 100 72 0 0 511 0 --:--:-- --:--:-- --:--:-- 514"], "stdout": "{\"errorCode\":100,\"message\":\"Key not found\",\"cause\":\"/calico\",\"index\":4}", "stdout_lines": ["{\"errorCode\":100,\"message\":\"Key not found\",\"cause\":\"/calico\",\"index\":4}"]} | |
| TASK [network_plugin/calico : Calico | Configure calico network pool] ********************************************************************************** | |
| Friday 16 November 2018 05:19:54 -0500 (0:00:00.933) 0:06:30.698 ******* | |
| changed: [node1] => {"changed": true, "cmd": "echo '{ \"kind\": \"ipPool\", \"spec\": {\"disabled\": false, \"ipip\": {\"enabled\": True, \"mode\": \"always\"},\n\"nat-outgoing\": True},\n\"apiVersion\": \"v1\", \"metadata\": {\"cidr\": \"10.233.64.0/18\"} }' | /usr/local/bin/calicoctl apply -f -", "delta": "0:00:00.641894", "end": "2018-11-16 05:19:55.415589", "rc": 0, "start": "2018-11-16 05:19:54.773695", "stderr": "", "stderr_lines": [], "stdout": "Successfully applied 1 'ipPool' resource(s)", "stdout_lines": ["Successfully applied 1 'ipPool' resource(s)"]} | |
| TASK [network_plugin/calico : Calico | Get calico configuration from etcd] ***************************************************************************** | |
| Friday 16 November 2018 05:19:55 -0500 (0:00:01.183) 0:06:31.881 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["curl", "--cacert", "/etc/ssl/etcd/ssl/ca.pem", "--cert", "/etc/ssl/etcd/ssl/node-node1.pem", "--key", "/etc/ssl/etcd/ssl/node-node1-key.pem", "https://10.10.10.105:2379/v2/keys/calico/v1/ipam/v4/pool"], "delta": "0:00:00.156219", "end": "2018-11-16 05:19:56.308756", "rc": 0, "start": "2018-11-16 05:19:56.152537", "stderr": " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r100 335 100 335 0 0 2281 0 --:--:-- --:--:-- --:--:-- 2294", "stderr_lines": [" % Total % Received % Xferd Average Speed Time Time Time Current", " Dload Upload Total Spent Left Speed", "", " 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0", "100 335 100 335 0 0 2281 0 --:--:-- --:--:-- --:--:-- 2294"], "stdout": "{\"action\":\"get\",\"node\":{\"key\":\"/calico/v1/ipam/v4/pool\",\"dir\":true,\"nodes\":[{\"key\":\"/calico/v1/ipam/v4/pool/10.233.64.0-18\",\"value\":\"{\\\"cidr\\\":\\\"10.233.64.0/18\\\",\\\"ipip\\\":\\\"tunl0\\\",\\\"ipip_mode\\\":\\\"always\\\",\\\"masquerade\\\":true,\\\"ipam\\\":true,\\\"disabled\\\":false}\",\"modifiedIndex\":5,\"createdIndex\":5}],\"modifiedIndex\":5,\"createdIndex\":5}}", "stdout_lines": ["{\"action\":\"get\",\"node\":{\"key\":\"/calico/v1/ipam/v4/pool\",\"dir\":true,\"nodes\":[{\"key\":\"/calico/v1/ipam/v4/pool/10.233.64.0-18\",\"value\":\"{\\\"cidr\\\":\\\"10.233.64.0/18\\\",\\\"ipip\\\":\\\"tunl0\\\",\\\"ipip_mode\\\":\\\"always\\\",\\\"masquerade\\\":true,\\\"ipam\\\":true,\\\"disabled\\\":false}\",\"modifiedIndex\":5,\"createdIndex\":5}],\"modifiedIndex\":5,\"createdIndex\":5}}"]} | |
| TASK [network_plugin/calico : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:19:56 -0500 (0:00:00.919) 0:06:32.801 ******* | |
| ok: [node1] => {"ansible_facts": {"calico_pools": {"action": "get", "node": {"createdIndex": 5, "dir": true, "key": "/calico/v1/ipam/v4/pool", "modifiedIndex": 5, "nodes": [{"createdIndex": 5, "key": "/calico/v1/ipam/v4/pool/10.233.64.0-18", "modifiedIndex": 5, "value": "{\"cidr\":\"10.233.64.0/18\",\"ipip\":\"tunl0\",\"ipip_mode\":\"always\",\"masquerade\":true,\"ipam\":true,\"disabled\":false}"}]}}}, "changed": false} | |
| TASK [network_plugin/calico : Calico | Set global as_num] ********************************************************************************************** | |
| Friday 16 November 2018 05:19:56 -0500 (0:00:00.371) 0:06:33.173 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/usr/local/bin/calicoctl", "config", "set", "asNumber", "64512"], "delta": "0:00:00.462593", "end": "2018-11-16 05:19:57.700082", "rc": 0, "start": "2018-11-16 05:19:57.237489", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
| TASK [network_plugin/calico : Calico | Disable node mesh] ********************************************************************************************** | |
| Friday 16 November 2018 05:19:57 -0500 (0:00:00.991) 0:06:34.164 ******* | |
| TASK [network_plugin/calico : Calico | Configure peering with router(s)] ******************************************************************************* | |
| Friday 16 November 2018 05:19:57 -0500 (0:00:00.119) 0:06:34.284 ******* | |
| TASK [network_plugin/calico : Calico | Configure peering with route reflectors] ************************************************************************ | |
| Friday 16 November 2018 05:19:58 -0500 (0:00:00.150) 0:06:34.435 ******* | |
| TASK [network_plugin/calico : Calico | Create calico manifests] **************************************************************************************** | |
| Friday 16 November 2018 05:19:58 -0500 (0:00:00.166) 0:06:34.601 ******* | |
| changed: [node1] => (item={u'type': u'cm', u'name': u'calico-config', u'file': u'calico-config.yml'}) => {"changed": true, "checksum": "aa328342e82815b3f072460be63218aa0db524b1", "dest": "/etc/kubernetes/calico-config.yml", "gid": 0, "group": "root", "item": {"file": "calico-config.yml", "name": "calico-config", "type": "cm"}, "md5sum": "283501ca602a181d091aa02b5129d686", "mode": "0644", "owner": "root", "size": 316, "src": "/root/.ansible/tmp/ansible-tmp-1542363598.53-258140515044718/source", "state": "file", "uid": 0} | |
| changed: [node2] => (item={u'type': u'cm', u'name': u'calico-config', u'file': u'calico-config.yml'}) => {"changed": true, "checksum": "aa328342e82815b3f072460be63218aa0db524b1", "dest": "/etc/kubernetes/calico-config.yml", "gid": 0, "group": "root", "item": {"file": "calico-config.yml", "name": "calico-config", "type": "cm"}, "md5sum": "283501ca602a181d091aa02b5129d686", "mode": "0644", "owner": "root", "size": 316, "src": "/root/.ansible/tmp/ansible-tmp-1542363598.61-83184603876007/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'ds', u'name': u'calico-node', u'file': u'calico-node.yml'}) => {"changed": true, "checksum": "a8df6feed8ecd195a1ffe78efdda52903f97dd72", "dest": "/etc/kubernetes/calico-node.yml", "gid": 0, "group": "root", "item": {"file": "calico-node.yml", "name": "calico-node", "type": "ds"}, "md5sum": "3a355202e3e0eccb1d3fefded2dfc934", "mode": "0644", "owner": "root", "size": 5934, "src": "/root/.ansible/tmp/ansible-tmp-1542363599.38-167432257850785/source", "state": "file", "uid": 0} | |
| changed: [node2] => (item={u'type': u'ds', u'name': u'calico-node', u'file': u'calico-node.yml'}) => {"changed": true, "checksum": "6c9b0ef03b081f4474ba26352eb294a5c59008fb", "dest": "/etc/kubernetes/calico-node.yml", "gid": 0, "group": "root", "item": {"file": "calico-node.yml", "name": "calico-node", "type": "ds"}, "md5sum": "1947722c3cfc7851d481004879333e8b", "mode": "0644", "owner": "root", "size": 5934, "src": "/root/.ansible/tmp/ansible-tmp-1542363599.47-38484835844344/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'sa', u'name': u'calico', u'file': u'calico-node-sa.yml'}) => {"changed": true, "checksum": "c94d2aa63492bb9c1462f1d8440e047cfd0b5f51", "dest": "/etc/kubernetes/calico-node-sa.yml", "gid": 0, "group": "root", "item": {"file": "calico-node-sa.yml", "name": "calico", "type": "sa"}, "md5sum": "04e0a37d7e036cdafb2b32f23645ec6f", "mode": "0644", "owner": "root", "size": 147, "src": "/root/.ansible/tmp/ansible-tmp-1542363600.04-108417577849015/source", "state": "file", "uid": 0} | |
| changed: [node2] => (item={u'type': u'sa', u'name': u'calico', u'file': u'calico-node-sa.yml'}) => {"changed": true, "checksum": "c94d2aa63492bb9c1462f1d8440e047cfd0b5f51", "dest": "/etc/kubernetes/calico-node-sa.yml", "gid": 0, "group": "root", "item": {"file": "calico-node-sa.yml", "name": "calico", "type": "sa"}, "md5sum": "04e0a37d7e036cdafb2b32f23645ec6f", "mode": "0644", "owner": "root", "size": 147, "src": "/root/.ansible/tmp/ansible-tmp-1542363600.16-194040082567390/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'clusterrole', u'name': u'calico', u'file': u'calico-cr.yml'}) => {"changed": true, "checksum": "87355e7c8c9954e36b90384ac8cd4e76005b79e0", "dest": "/etc/kubernetes/calico-cr.yml", "gid": 0, "group": "root", "item": {"file": "calico-cr.yml", "name": "calico", "type": "clusterrole"}, "md5sum": "8fd3c1a35641985102e36649ac27292c", "mode": "0644", "owner": "root", "size": 215, "src": "/root/.ansible/tmp/ansible-tmp-1542363600.67-98440528087182/source", "state": "file", "uid": 0} | |
| changed: [node2] => (item={u'type': u'clusterrole', u'name': u'calico', u'file': u'calico-cr.yml'}) => {"changed": true, "checksum": "87355e7c8c9954e36b90384ac8cd4e76005b79e0", "dest": "/etc/kubernetes/calico-cr.yml", "gid": 0, "group": "root", "item": {"file": "calico-cr.yml", "name": "calico", "type": "clusterrole"}, "md5sum": "8fd3c1a35641985102e36649ac27292c", "mode": "0644", "owner": "root", "size": 215, "src": "/root/.ansible/tmp/ansible-tmp-1542363600.8-266984407862566/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'clusterrolebinding', u'name': u'calico', u'file': u'calico-crb.yml'}) => {"changed": true, "checksum": "4c242c0edb1c62b5a759af67900bdda8df83420a", "dest": "/etc/kubernetes/calico-crb.yml", "gid": 0, "group": "root", "item": {"file": "calico-crb.yml", "name": "calico", "type": "clusterrolebinding"}, "md5sum": "4890b13200e0ef5c268ecd3598af9523", "mode": "0644", "owner": "root", "size": 270, "src": "/root/.ansible/tmp/ansible-tmp-1542363601.32-262728591262537/source", "state": "file", "uid": 0} | |
| changed: [node2] => (item={u'type': u'clusterrolebinding', u'name': u'calico', u'file': u'calico-crb.yml'}) => {"changed": true, "checksum": "4c242c0edb1c62b5a759af67900bdda8df83420a", "dest": "/etc/kubernetes/calico-crb.yml", "gid": 0, "group": "root", "item": {"file": "calico-crb.yml", "name": "calico", "type": "clusterrolebinding"}, "md5sum": "4890b13200e0ef5c268ecd3598af9523", "mode": "0644", "owner": "root", "size": 270, "src": "/root/.ansible/tmp/ansible-tmp-1542363601.44-98812915499389/source", "state": "file", "uid": 0} | |
| TASK [network_plugin/flannel : Flannel pre-upgrade | Purge legacy flannel systemd unit file] *********************************************************** | |
| Friday 16 November 2018 05:20:02 -0500 (0:00:03.858) 0:06:38.459 ******* | |
| TASK [network_plugin/flannel : Flannel pre-upgrade | Purge legacy Flannel static pod manifest] ********************************************************* | |
| Friday 16 November 2018 05:20:02 -0500 (0:00:00.166) 0:06:38.626 ******* | |
| TASK [network_plugin/flannel : Flannel pre-upgrade | Remove Flannel's certificate directory not required by CNI] *************************************** | |
| Friday 16 November 2018 05:20:02 -0500 (0:00:00.167) 0:06:38.793 ******* | |
| TASK [network_plugin/flannel : Flannel | Create Flannel manifests] ************************************************************************************* | |
| Friday 16 November 2018 05:20:02 -0500 (0:00:00.172) 0:06:38.966 ******* | |
| TASK [network_plugin/weave : Weave | Copy cni plugins from hyperkube] ********************************************************************************** | |
| Friday 16 November 2018 05:20:02 -0500 (0:00:00.206) 0:06:39.173 ******* | |
| TASK [network_plugin/weave : Weave | Create manifest] ************************************************************************************************** | |
| Friday 16 November 2018 05:20:02 -0500 (0:00:00.166) 0:06:39.340 ******* | |
| TASK [network_plugin/weave : Weave | Fix nodePort for Weave] ******************************************************************************************* | |
| Friday 16 November 2018 05:20:03 -0500 (0:00:00.171) 0:06:39.511 ******* | |
| TASK [network_plugin/canal : Canal | Write Canal cni config] ******************************************************************************************* | |
| Friday 16 November 2018 05:20:03 -0500 (0:00:00.163) 0:06:39.675 ******* | |
| TASK [network_plugin/canal : Canal | Create canal certs directory] ************************************************************************************* | |
| Friday 16 November 2018 05:20:03 -0500 (0:00:00.162) 0:06:39.837 ******* | |
| TASK [network_plugin/canal : Canal | Link etcd certificates for canal-node] **************************************************************************** | |
| Friday 16 November 2018 05:20:03 -0500 (0:00:00.165) 0:06:40.003 ******* | |
| TASK [network_plugin/canal : Canal | Set Flannel etcd configuration] *********************************************************************************** | |
| Friday 16 November 2018 05:20:03 -0500 (0:00:00.272) 0:06:40.276 ******* | |
| TASK [network_plugin/canal : Canal | Create canal node manifests] ************************************************************************************** | |
| Friday 16 November 2018 05:20:03 -0500 (0:00:00.100) 0:06:40.376 ******* | |
| TASK [network_plugin/canal : Canal | Copy cni plugins from hyperkube] ********************************************************************************** | |
| Friday 16 November 2018 05:20:04 -0500 (0:00:00.329) 0:06:40.706 ******* | |
| TASK [network_plugin/canal : Canal | Copy cni plugins from calico/cni] ********************************************************************************* | |
| Friday 16 November 2018 05:20:04 -0500 (0:00:00.163) 0:06:40.869 ******* | |
| TASK [network_plugin/canal : Canal | Set cni directory permissions] ************************************************************************************ | |
| Friday 16 November 2018 05:20:04 -0500 (0:00:00.167) 0:06:41.037 ******* | |
| TASK [network_plugin/canal : Canal | Install calicoctl container script] ******************************************************************************* | |
| Friday 16 November 2018 05:20:04 -0500 (0:00:00.165) 0:06:41.203 ******* | |
| TASK [network_plugin/canal : Canal | Create network policy directory] ********************************************************************************** | |
| Friday 16 November 2018 05:20:04 -0500 (0:00:00.166) 0:06:41.369 ******* | |
| TASK [network_plugin/contiv : Contiv | Load openvswitch kernel module] ********************************************************************************* | |
| Friday 16 November 2018 05:20:05 -0500 (0:00:00.201) 0:06:41.571 ******* | |
| TASK [network_plugin/contiv : Contiv | Create contiv etcd directories] ********************************************************************************* | |
| Friday 16 November 2018 05:20:05 -0500 (0:00:00.166) 0:06:41.738 ******* | |
| TASK [network_plugin/contiv : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:20:05 -0500 (0:00:00.191) 0:06:41.929 ******* | |
| TASK [network_plugin/contiv : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:20:05 -0500 (0:00:00.164) 0:06:42.093 ******* | |
| TASK [network_plugin/contiv : Contiv | Create /var/contiv] ********************************************************************************************* | |
| Friday 16 November 2018 05:20:05 -0500 (0:00:00.161) 0:06:42.255 ******* | |
| TASK [network_plugin/contiv : Contiv | Create contiv config directory] ********************************************************************************* | |
| Friday 16 November 2018 05:20:06 -0500 (0:00:00.162) 0:06:42.417 ******* | |
| TASK [network_plugin/contiv : Contiv | Install all Kubernetes resources] ******************************************************************************* | |
| Friday 16 November 2018 05:20:06 -0500 (0:00:00.222) 0:06:42.640 ******* | |
| TASK [network_plugin/contiv : Contiv | Generate contiv-api-proxy certificates] ************************************************************************* | |
| Friday 16 November 2018 05:20:06 -0500 (0:00:00.157) 0:06:42.797 ******* | |
| TASK [network_plugin/contiv : Contiv | Fetch the generated certificate] ******************************************************************************** | |
| Friday 16 November 2018 05:20:06 -0500 (0:00:00.172) 0:06:42.970 ******* | |
| TASK [network_plugin/contiv : Contiv | Copy the generated certificate on nodes] ************************************************************************ | |
| Friday 16 November 2018 05:20:06 -0500 (0:00:00.127) 0:06:43.097 ******* | |
| TASK [network_plugin/contiv : Contiv | Copy cni plugins from hyperkube] ******************************************************************************** | |
| Friday 16 November 2018 05:20:06 -0500 (0:00:00.206) 0:06:43.303 ******* | |
| TASK [network_plugin/contiv : Contiv | Copy netctl binary from docker container] *********************************************************************** | |
| Friday 16 November 2018 05:20:07 -0500 (0:00:00.159) 0:06:43.463 ******* | |
| TASK [network_plugin/cloud : Cloud | Copy cni plugins from hyperkube] ********************************************************************************** | |
| Friday 16 November 2018 05:20:07 -0500 (0:00:00.159) 0:06:43.623 ******* | |
| TASK [network_plugin/cloud : Cloud | Set cni directory permissions] ************************************************************************************ | |
| Friday 16 November 2018 05:20:07 -0500 (0:00:00.167) 0:06:43.790 ******* | |
| PLAY [kube-master[0]] ********************************************************************************************************************************** | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:20:07 -0500 (0:00:00.191) 0:06:43.981 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:20:07 -0500 (0:00:00.110) 0:06:44.092 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:20:08 -0500 (0:00:01.260) 0:06:45.352 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:20:10 -0500 (0:00:01.320) 0:06:46.673 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Get default token name] ************************************************************************** | |
| Friday 16 November 2018 05:20:10 -0500 (0:00:00.331) 0:06:47.005 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "cmd": "/usr/local/bin/kubectl get secrets -o custom-columns=name:{.metadata.name} --no-headers | grep -m1 default-token", "delta": "0:00:00.280249", "end": "2018-11-16 05:20:11.355425", "rc": 0, "start": "2018-11-16 05:20:11.075176", "stderr": "", "stderr_lines": [], "stdout": "default-token-hkn9j", "stdout_lines": ["default-token-hkn9j"]} | |
| TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Get default token data] ************************************************************************** | |
| Friday 16 November 2018 05:20:11 -0500 (0:00:00.825) 0:06:47.831 ******* | |
| ok: [node1] => {"changed": false, "cmd": ["/usr/local/bin/kubectl", "get", "secrets", "default-token-hkn9j", "-ojson"], "delta": "0:00:00.262609", "end": "2018-11-16 05:20:12.156421", "rc": 0, "start": "2018-11-16 05:20:11.893812", "stderr": "", "stderr_lines": [], "stdout": "{\n \"apiVersion\": \"v1\",\n \"data\": {\n \"ca.crt\": \"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\",\n \"namespace\": \"ZGVmYXVsdA==\",\n \"token\": \"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\"\n },\n \"kind\": \"Secret\",\n \"metadata\": {\n \"annotations\": {\n \"kubernetes.io/service-account.name\": \"default\",\n \"kubernetes.io/service-account.uid\": \"21c35d03-e989-11e8-8698-080027d0cdfe\"\n },\n \"creationTimestamp\": \"2018-11-16T10:19:42Z\",\n \"name\": \"default-token-hkn9j\",\n \"namespace\": \"default\",\n \"resourceVersion\": \"405\",\n \"selfLink\": \"/api/v1/namespaces/default/secrets/default-token-hkn9j\",\n \"uid\": \"21dd3ab3-e989-11e8-8698-080027d0cdfe\"\n },\n \"type\": \"kubernetes.io/service-account-token\"\n}", "stdout_lines": ["{", " \"apiVersion\": \"v1\",", " \"data\": {", " \"ca.crt\": \"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\",", " \"namespace\": \"ZGVmYXVsdA==\",", " \"token\": \"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\"", " },", " \"kind\": \"Secret\",", " \"metadata\": {", " \"annotations\": {", " \"kubernetes.io/service-account.name\": \"default\",", " \"kubernetes.io/service-account.uid\": \"21c35d03-e989-11e8-8698-080027d0cdfe\"", " },", " \"creationTimestamp\": \"2018-11-16T10:19:42Z\",", " \"name\": \"default-token-hkn9j\",", " \"namespace\": \"default\",", " \"resourceVersion\": \"405\",", " \"selfLink\": \"/api/v1/namespaces/default/secrets/default-token-hkn9j\",", " \"uid\": \"21dd3ab3-e989-11e8-8698-080027d0cdfe\"", " },", " \"type\": \"kubernetes.io/service-account-token\"", "}"]} | |
| TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Test if default certificate is expired] ********************************************************** | |
| Friday 16 November 2018 05:20:12 -0500 (0:00:00.798) 0:06:48.629 ******* | |
| ok: [node1] => {"changed": false, "content": "", "failed_when_result": false, "msg": "Status code was -1 and not [200]: Request failed: <urlopen error [Errno 101] Network is unreachable>", "redirected": false, "status": -1, "url": "https://10.233.0.1/api/v1/nodes"} | |
| TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Determine if certificate is expired] ************************************************************* | |
| Friday 16 November 2018 05:20:13 -0500 (0:00:00.791) 0:06:49.421 ******* | |
| ok: [node1] => {"ansible_facts": {"needs_rotation": true}, "changed": false} | |
| TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Get all serviceaccount tokens to expire] ********************************************************* | |
| Friday 16 November 2018 05:20:13 -0500 (0:00:00.355) 0:06:49.776 ******* | |
| changed: [node1] => {"changed": true, "cmd": "/usr/local/bin/kubectl get secrets --all-namespaces -o 'jsonpath={range .items[*]}{\"\\n\"}{.metadata.namespace}{\" \"}{.metadata.name}{\" \"}{.type}{end}' | grep kubernetes.io/service-account-token | egrep 'default-token|kube-proxy|kube-dns|dnsmasq|netchecker|weave|calico|canal|flannel|dashboard|cluster-proportional-autoscaler|efk|tiller|local-volume-provisioner'", "delta": "0:00:00.320227", "end": "2018-11-16 05:20:14.157537", "rc": 0, "start": "2018-11-16 05:20:13.837310", "stderr": "", "stderr_lines": [], "stdout": "default default-token-hkn9j kubernetes.io/service-account-token\nkube-public default-token-vbqtj kubernetes.io/service-account-token\nkube-system default-token-w6c8h kubernetes.io/service-account-token", "stdout_lines": ["default default-token-hkn9j kubernetes.io/service-account-token", "kube-public default-token-vbqtj kubernetes.io/service-account-token", "kube-system default-token-w6c8h kubernetes.io/service-account-token"]} | |
| TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Delete expired tokens] *************************************************************************** | |
| Friday 16 November 2018 05:20:14 -0500 (0:00:00.846) 0:06:50.623 ******* | |
| changed: [node1] => (item=default default-token-hkn9j kubernetes.io/service-account-token) => {"changed": true, "cmd": ["/usr/local/bin/kubectl", "delete", "secrets", "-n", "default", "default-token-hkn9j"], "delta": "0:00:00.263905", "end": "2018-11-16 05:20:14.953951", "item": "default default-token-hkn9j kubernetes.io/service-account-token", "rc": 0, "start": "2018-11-16 05:20:14.690046", "stderr": "", "stderr_lines": [], "stdout": "secret \"default-token-hkn9j\" deleted", "stdout_lines": ["secret \"default-token-hkn9j\" deleted"]} | |
| changed: [node1] => (item=kube-public default-token-vbqtj kubernetes.io/service-account-token) => {"changed": true, "cmd": ["/usr/local/bin/kubectl", "delete", "secrets", "-n", "kube-public", "default-token-vbqtj"], "delta": "0:00:00.259228", "end": "2018-11-16 05:20:15.452345", "item": "kube-public default-token-vbqtj kubernetes.io/service-account-token", "rc": 0, "start": "2018-11-16 05:20:15.193117", "stderr": "", "stderr_lines": [], "stdout": "secret \"default-token-vbqtj\" deleted", "stdout_lines": ["secret \"default-token-vbqtj\" deleted"]} | |
| changed: [node1] => (item=kube-system default-token-w6c8h kubernetes.io/service-account-token) => {"changed": true, "cmd": ["/usr/local/bin/kubectl", "delete", "secrets", "-n", "kube-system", "default-token-w6c8h"], "delta": "0:00:00.251986", "end": "2018-11-16 05:20:15.940128", "item": "kube-system default-token-w6c8h kubernetes.io/service-account-token", "rc": 0, "start": "2018-11-16 05:20:15.688142", "stderr": "", "stderr_lines": [], "stdout": "secret \"default-token-w6c8h\" deleted", "stdout_lines": ["secret \"default-token-w6c8h\" deleted"]} | |
| TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Delete pods in system namespace] ***************************************************************** | |
| Friday 16 November 2018 05:20:16 -0500 (0:00:01.789) 0:06:52.413 ******* | |
| changed: [node1] => {"changed": true, "cmd": ["/usr/local/bin/kubectl", "delete", "pods", "-n", "kube-system", "--all"], "delta": "0:00:00.451500", "end": "2018-11-16 05:20:16.915068", "rc": 0, "start": "2018-11-16 05:20:16.463568", "stderr": "", "stderr_lines": [], "stdout": "pod \"kube-apiserver-node1\" deleted\npod \"kube-apiserver-node2\" deleted\npod \"kube-controller-manager-node1\" deleted\npod \"kube-controller-manager-node2\" deleted\npod \"kube-proxy-node1\" deleted\npod \"kube-proxy-node2\" deleted\npod \"kube-scheduler-node1\" deleted\npod \"kube-scheduler-node2\" deleted", "stdout_lines": ["pod \"kube-apiserver-node1\" deleted", "pod \"kube-apiserver-node2\" deleted", "pod \"kube-controller-manager-node1\" deleted", "pod \"kube-controller-manager-node2\" deleted", "pod \"kube-proxy-node1\" deleted", "pod \"kube-proxy-node2\" deleted", "pod \"kube-scheduler-node1\" deleted", "pod \"kube-scheduler-node2\" deleted"]} | |
| PLAY [kube-master] ************************************************************************************************************************************* | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:20:17 -0500 (0:00:01.033) 0:06:53.446 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:20:17 -0500 (0:00:00.169) 0:06:53.616 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:20:18 -0500 (0:00:01.337) 0:06:54.954 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:20:19 -0500 (0:00:01.361) 0:06:56.315 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| ok: [node2] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [kubernetes-apps/network_plugin/cilium : Cilium | Start Resources] ******************************************************************************** | |
| Friday 16 November 2018 05:20:20 -0500 (0:00:00.390) 0:06:56.706 ******* | |
| TASK [kubernetes-apps/network_plugin/cilium : Cilium | Wait for pods to run] *************************************************************************** | |
| Friday 16 November 2018 05:20:20 -0500 (0:00:00.279) 0:06:56.986 ******* | |
| TASK [kubernetes-apps/network_plugin/calico : Start Calico resources] ********************************************************************************** | |
| Friday 16 November 2018 05:20:20 -0500 (0:00:00.160) 0:06:57.146 ******* | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'283501ca602a181d091aa02b5129d686', u'uid': 0, u'dest': u'/etc/kubernetes/calico-config.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363598.53-258140515044718/source', u'group': u'root', '_ansible_item_label': {u'type': u'cm', u'name': u'calico-config', u'file': u'calico-config.yml'}, 'item': {u'type': u'cm', u'name': u'calico-config', u'file': u'calico-config.yml'}, u'checksum': u'aa328342e82815b3f072460be63218aa0db524b1', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/calico-config.yml', u'selevel': None, u'_original_basename': u'calico-config.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363598.53-258140515044718/source', u'group': None, u'unsafe_writes': None, u'checksum': u'aa328342e82815b3f072460be63218aa0db524b1', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 316, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": true, "checksum": "aa328342e82815b3f072460be63218aa0db524b1", "dest": "/etc/kubernetes/calico-config.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "calico-config.yml.j2", "attributes": null, "backup": false, "checksum": "aa328342e82815b3f072460be63218aa0db524b1", "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-config.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363598.53-258140515044718/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "calico-config.yml", "name": "calico-config", "type": "cm"}, "md5sum": "283501ca602a181d091aa02b5129d686", "mode": "0644", "owner": "root", "size": 316, "src": "/root/.ansible/tmp/ansible-tmp-1542363598.53-258140515044718/source", "state": "file", "uid": 0}, "msg": "success: configmap \"calico-config\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'3a355202e3e0eccb1d3fefded2dfc934', u'uid': 0, u'dest': u'/etc/kubernetes/calico-node.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363599.38-167432257850785/source', u'group': u'root', '_ansible_item_label': {u'type': u'ds', u'name': u'calico-node', u'file': u'calico-node.yml'}, 'item': {u'type': u'ds', u'name': u'calico-node', u'file': u'calico-node.yml'}, u'checksum': u'a8df6feed8ecd195a1ffe78efdda52903f97dd72', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/calico-node.yml', u'selevel': None, u'_original_basename': u'calico-node.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363599.38-167432257850785/source', u'group': None, u'unsafe_writes': None, u'checksum': u'a8df6feed8ecd195a1ffe78efdda52903f97dd72', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 5934, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": true, "checksum": "a8df6feed8ecd195a1ffe78efdda52903f97dd72", "dest": "/etc/kubernetes/calico-node.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "calico-node.yml.j2", "attributes": null, "backup": false, "checksum": "a8df6feed8ecd195a1ffe78efdda52903f97dd72", "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-node.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363599.38-167432257850785/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "calico-node.yml", "name": "calico-node", "type": "ds"}, "md5sum": "3a355202e3e0eccb1d3fefded2dfc934", "mode": "0644", "owner": "root", "size": 5934, "src": "/root/.ansible/tmp/ansible-tmp-1542363599.38-167432257850785/source", "state": "file", "uid": 0}, "msg": "success: daemonset.extensions \"calico-node\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'04e0a37d7e036cdafb2b32f23645ec6f', u'uid': 0, u'dest': u'/etc/kubernetes/calico-node-sa.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363600.04-108417577849015/source', u'group': u'root', '_ansible_item_label': {u'type': u'sa', u'name': u'calico', u'file': u'calico-node-sa.yml'}, 'item': {u'type': u'sa', u'name': u'calico', u'file': u'calico-node-sa.yml'}, u'checksum': u'c94d2aa63492bb9c1462f1d8440e047cfd0b5f51', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/calico-node-sa.yml', u'selevel': None, u'_original_basename': u'calico-node-sa.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363600.04-108417577849015/source', u'group': None, u'unsafe_writes': None, u'checksum': u'c94d2aa63492bb9c1462f1d8440e047cfd0b5f51', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 147, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": true, "checksum": "c94d2aa63492bb9c1462f1d8440e047cfd0b5f51", "dest": "/etc/kubernetes/calico-node-sa.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "calico-node-sa.yml.j2", "attributes": null, "backup": false, "checksum": "c94d2aa63492bb9c1462f1d8440e047cfd0b5f51", "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-node-sa.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363600.04-108417577849015/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "calico-node-sa.yml", "name": "calico", "type": "sa"}, "md5sum": "04e0a37d7e036cdafb2b32f23645ec6f", "mode": "0644", "owner": "root", "size": 147, "src": "/root/.ansible/tmp/ansible-tmp-1542363600.04-108417577849015/source", "state": "file", "uid": 0}, "msg": "success: serviceaccount \"calico-node\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'8fd3c1a35641985102e36649ac27292c', u'uid': 0, u'dest': u'/etc/kubernetes/calico-cr.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363600.67-98440528087182/source', u'group': u'root', '_ansible_item_label': {u'type': u'clusterrole', u'name': u'calico', u'file': u'calico-cr.yml'}, 'item': {u'type': u'clusterrole', u'name': u'calico', u'file': u'calico-cr.yml'}, u'checksum': u'87355e7c8c9954e36b90384ac8cd4e76005b79e0', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/calico-cr.yml', u'selevel': None, u'_original_basename': u'calico-cr.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363600.67-98440528087182/source', u'group': None, u'unsafe_writes': None, u'checksum': u'87355e7c8c9954e36b90384ac8cd4e76005b79e0', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 215, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": true, "checksum": "87355e7c8c9954e36b90384ac8cd4e76005b79e0", "dest": "/etc/kubernetes/calico-cr.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "calico-cr.yml.j2", "attributes": null, "backup": false, "checksum": "87355e7c8c9954e36b90384ac8cd4e76005b79e0", "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-cr.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363600.67-98440528087182/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "calico-cr.yml", "name": "calico", "type": "clusterrole"}, "md5sum": "8fd3c1a35641985102e36649ac27292c", "mode": "0644", "owner": "root", "size": 215, "src": "/root/.ansible/tmp/ansible-tmp-1542363600.67-98440528087182/source", "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io \"calico-node\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'4890b13200e0ef5c268ecd3598af9523', u'uid': 0, u'dest': u'/etc/kubernetes/calico-crb.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363601.32-262728591262537/source', u'group': u'root', '_ansible_item_label': {u'type': u'clusterrolebinding', u'name': u'calico', u'file': u'calico-crb.yml'}, 'item': {u'type': u'clusterrolebinding', u'name': u'calico', u'file': u'calico-crb.yml'}, u'checksum': u'4c242c0edb1c62b5a759af67900bdda8df83420a', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/calico-crb.yml', u'selevel': None, u'_original_basename': u'calico-crb.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363601.32-262728591262537/source', u'group': None, u'unsafe_writes': None, u'checksum': u'4c242c0edb1c62b5a759af67900bdda8df83420a', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 270, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": true, "checksum": "4c242c0edb1c62b5a759af67900bdda8df83420a", "dest": "/etc/kubernetes/calico-crb.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "calico-crb.yml.j2", "attributes": null, "backup": false, "checksum": "4c242c0edb1c62b5a759af67900bdda8df83420a", "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-crb.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363601.32-262728591262537/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "calico-crb.yml", "name": "calico", "type": "clusterrolebinding"}, "md5sum": "4890b13200e0ef5c268ecd3598af9523", "mode": "0644", "owner": "root", "size": 270, "src": "/root/.ansible/tmp/ansible-tmp-1542363601.32-262728591262537/source", "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io \"calico-node\" created"} | |
| TASK [kubernetes-apps/network_plugin/canal : Canal | Start Resources] ********************************************************************************** | |
| Friday 16 November 2018 05:20:24 -0500 (0:00:03.572) 0:07:00.718 ******* | |
| TASK [kubernetes-apps/network_plugin/flannel : Flannel | Start Resources] ****************************************************************************** | |
| Friday 16 November 2018 05:20:24 -0500 (0:00:00.330) 0:07:01.049 ******* | |
| TASK [kubernetes-apps/network_plugin/flannel : Flannel | Wait for flannel subnet.env file presence] **************************************************** | |
| Friday 16 November 2018 05:20:24 -0500 (0:00:00.206) 0:07:01.255 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : Contiv | Create Kubernetes resources] ******************************************************************** | |
| Friday 16 November 2018 05:20:25 -0500 (0:00:00.261) 0:07:01.517 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : Contiv | Wait for netmaster] ***************************************************************************** | |
| Friday 16 November 2018 05:20:25 -0500 (0:00:00.114) 0:07:01.631 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : Contiv | Get global configuration] *********************************************************************** | |
| Friday 16 November 2018 05:20:25 -0500 (0:00:00.176) 0:07:01.807 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : set_fact] ************************************************************************************************ | |
| Friday 16 November 2018 05:20:25 -0500 (0:00:00.090) 0:07:01.898 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : Contiv | Set global forwarding mode] ********************************************************************* | |
| Friday 16 November 2018 05:20:25 -0500 (0:00:00.157) 0:07:02.056 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : Contiv | Set global fabric mode] ************************************************************************* | |
| Friday 16 November 2018 05:20:25 -0500 (0:00:00.097) 0:07:02.153 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : Contiv | Get existing networks] ************************************************************************** | |
| Friday 16 November 2018 05:20:25 -0500 (0:00:00.105) 0:07:02.259 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : Contiv | Create networks] ******************************************************************************** | |
| Friday 16 November 2018 05:20:25 -0500 (0:00:00.091) 0:07:02.351 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : Contiv | Check if default group exists] ****************************************************************** | |
| Friday 16 November 2018 05:20:26 -0500 (0:00:00.102) 0:07:02.453 ******* | |
| TASK [kubernetes-apps/network_plugin/contiv : Contiv | Create default group] *************************************************************************** | |
| Friday 16 November 2018 05:20:26 -0500 (0:00:00.099) 0:07:02.552 ******* | |
| TASK [kubernetes-apps/network_plugin/weave : Weave | Start Resources] ********************************************************************************** | |
| Friday 16 November 2018 05:20:26 -0500 (0:00:00.096) 0:07:02.649 ******* | |
| TASK [kubernetes-apps/network_plugin/weave : Weave | Wait for Weave to become available] *************************************************************** | |
| Friday 16 November 2018 05:20:26 -0500 (0:00:00.185) 0:07:02.835 ******* | |
| TASK [policy_controller/calico : Set cert dir] ********************************************************************************************************* | |
| Friday 16 November 2018 05:20:26 -0500 (0:00:00.177) 0:07:03.012 ******* | |
| TASK [policy_controller/calico : Delete the old calico-policy-controller if it exist] ****************************************************************** | |
| Friday 16 November 2018 05:20:26 -0500 (0:00:00.151) 0:07:03.164 ******* | |
| TASK [policy_controller/calico : Create calico-kube-controllers manifests] ***************************************************************************** | |
| Friday 16 November 2018 05:20:26 -0500 (0:00:00.099) 0:07:03.263 ******* | |
| TASK [policy_controller/calico : Start of Calico kube controllers] ************************************************************************************* | |
| Friday 16 November 2018 05:20:27 -0500 (0:00:00.248) 0:07:03.511 ******* | |
| TASK [policy_controller/calico : Set cert dir] ********************************************************************************************************* | |
| Friday 16 November 2018 05:20:27 -0500 (0:00:00.271) 0:07:03.783 ******* | |
| TASK [policy_controller/calico : Delete the old calico-policy-controller if it exist] ****************************************************************** | |
| Friday 16 November 2018 05:20:27 -0500 (0:00:00.157) 0:07:03.941 ******* | |
| TASK [policy_controller/calico : Create calico-kube-controllers manifests] ***************************************************************************** | |
| Friday 16 November 2018 05:20:27 -0500 (0:00:00.088) 0:07:04.030 ******* | |
| TASK [policy_controller/calico : Start of Calico kube controllers] ************************************************************************************* | |
| Friday 16 November 2018 05:20:27 -0500 (0:00:00.247) 0:07:04.277 ******* | |
| TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Remove legacy addon dir and manifests] ***************************** | |
| Friday 16 November 2018 05:20:28 -0500 (0:00:00.281) 0:07:04.558 ******* | |
| TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Remove legacy namespace] ******************************************* | |
| Friday 16 November 2018 05:20:28 -0500 (0:00:00.178) 0:07:04.737 ******* | |
| TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Create addon dir] ************************************************** | |
| Friday 16 November 2018 05:20:28 -0500 (0:00:00.181) 0:07:04.919 ******* | |
| TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Create manifests] ************************************************** | |
| Friday 16 November 2018 05:20:28 -0500 (0:00:00.175) 0:07:05.095 ******* | |
| TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Apply manifests] *************************************************** | |
| Friday 16 November 2018 05:20:29 -0500 (0:00:00.417) 0:07:05.513 ******* | |
| TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Remove legacy addon dir and manifests] ****************************************** | |
| Friday 16 November 2018 05:20:29 -0500 (0:00:00.420) 0:07:05.933 ******* | |
| TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Remove legacy namespace] ******************************************************** | |
| Friday 16 November 2018 05:20:29 -0500 (0:00:00.160) 0:07:06.093 ******* | |
| TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Create addon dir] *************************************************************** | |
| Friday 16 November 2018 05:20:29 -0500 (0:00:00.168) 0:07:06.262 ******* | |
| TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Create manifests] *************************************************************** | |
| Friday 16 November 2018 05:20:30 -0500 (0:00:00.177) 0:07:06.439 ******* | |
| TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Apply manifests] **************************************************************** | |
| Friday 16 November 2018 05:20:30 -0500 (0:00:00.362) 0:07:06.801 ******* | |
| TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Ensure base dir is created on all hosts] ************** | |
| Friday 16 November 2018 05:20:30 -0500 (0:00:00.454) 0:07:07.256 ******* | |
| TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create addon dir] ************************************* | |
| Friday 16 November 2018 05:20:31 -0500 (0:00:00.327) 0:07:07.583 ******* | |
| TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create manifests] ************************************* | |
| Friday 16 November 2018 05:20:31 -0500 (0:00:00.157) 0:07:07.741 ******* | |
| TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Apply manifests] ************************************** | |
| Friday 16 November 2018 05:20:31 -0500 (0:00:00.276) 0:07:08.017 ******* | |
| TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy addon dir and manifests] **************************** | |
| Friday 16 November 2018 05:20:31 -0500 (0:00:00.272) 0:07:08.290 ******* | |
| TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy namespace] ****************************************** | |
| Friday 16 November 2018 05:20:32 -0500 (0:00:00.163) 0:07:08.454 ******* | |
| TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy storageclass] *************************************** | |
| Friday 16 November 2018 05:20:32 -0500 (0:00:00.172) 0:07:08.626 ******* | |
| TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Create addon dir] ************************************************* | |
| Friday 16 November 2018 05:20:32 -0500 (0:00:00.161) 0:07:08.788 ******* | |
| TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Create manifests] ************************************************* | |
| Friday 16 November 2018 05:20:32 -0500 (0:00:00.165) 0:07:08.954 ******* | |
| TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Apply manifests] ************************************************** | |
| Friday 16 November 2018 05:20:32 -0500 (0:00:00.324) 0:07:09.278 ******* | |
| PLAY [calico-rr] *************************************************************************************************************************************** | |
| skipping: no hosts matched | |
| PLAY [k8s-cluster] ************************************************************************************************************************************* | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:20:33 -0500 (0:00:00.486) 0:07:09.764 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:20:33 -0500 (0:00:00.163) 0:07:09.928 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:20:34 -0500 (0:00:01.392) 0:07:11.320 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:20:36 -0500 (0:00:01.382) 0:07:12.703 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| ok: [node2] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [dnsmasq : ensure dnsmasq.d directory exists] ***************************************************************************************************** | |
| Friday 16 November 2018 05:20:36 -0500 (0:00:00.564) 0:07:13.267 ******* | |
| TASK [dnsmasq : ensure dnsmasq.d-available directory exists] ******************************************************************************************* | |
| Friday 16 November 2018 05:20:37 -0500 (0:00:00.157) 0:07:13.425 ******* | |
| TASK [dnsmasq : check system nameservers] ************************************************************************************************************** | |
| Friday 16 November 2018 05:20:37 -0500 (0:00:00.166) 0:07:13.591 ******* | |
| TASK [dnsmasq : init system_and_upstream_dns_servers] ************************************************************************************************** | |
| Friday 16 November 2018 05:20:37 -0500 (0:00:00.178) 0:07:13.770 ******* | |
| TASK [dnsmasq : combine upstream_dns_servers and system nameservers (only for docker_dns)] ************************************************************* | |
| Friday 16 November 2018 05:20:37 -0500 (0:00:00.160) 0:07:13.930 ******* | |
| TASK [dnsmasq : Write dnsmasq configuration] *********************************************************************************************************** | |
| Friday 16 November 2018 05:20:37 -0500 (0:00:00.169) 0:07:14.100 ******* | |
| TASK [dnsmasq : Stat dnsmasq link] ********************************************************************************************************************* | |
| Friday 16 November 2018 05:20:37 -0500 (0:00:00.153) 0:07:14.254 ******* | |
| TASK [dnsmasq : Stat dnsmasq link] ********************************************************************************************************************* | |
| Friday 16 November 2018 05:20:38 -0500 (0:00:00.152) 0:07:14.406 ******* | |
| TASK [dnsmasq : Move previous configuration] *********************************************************************************************************** | |
| Friday 16 November 2018 05:20:38 -0500 (0:00:00.160) 0:07:14.567 ******* | |
| TASK [dnsmasq : Enable dnsmasq configuration] ********************************************************************************************************** | |
| Friday 16 November 2018 05:20:38 -0500 (0:00:00.161) 0:07:14.728 ******* | |
| TASK [dnsmasq : Create dnsmasq RBAC manifests] ********************************************************************************************************* | |
| Friday 16 November 2018 05:20:38 -0500 (0:00:00.224) 0:07:14.953 ******* | |
| TASK [dnsmasq : Apply dnsmasq RBAC manifests] ********************************************************************************************************** | |
| Friday 16 November 2018 05:20:38 -0500 (0:00:00.201) 0:07:15.154 ******* | |
| TASK [dnsmasq : Create dnsmasq manifests] ************************************************************************************************************** | |
| Friday 16 November 2018 05:20:38 -0500 (0:00:00.190) 0:07:15.345 ******* | |
| TASK [dnsmasq : Start Resources] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:20:39 -0500 (0:00:00.229) 0:07:15.575 ******* | |
| TASK [dnsmasq : Check for dnsmasq port (pulling image and running container)] ************************************************************************** | |
| Friday 16 November 2018 05:20:39 -0500 (0:00:00.157) 0:07:15.732 ******* | |
| TASK [adduser : User | Create User Group] ************************************************************************************************************** | |
| Friday 16 November 2018 05:20:39 -0500 (0:00:00.165) 0:07:15.898 ******* | |
| TASK [adduser : User | Create User] ******************************************************************************************************************** | |
| Friday 16 November 2018 05:20:39 -0500 (0:00:00.167) 0:07:16.065 ******* | |
| TASK [kubernetes/preinstall : Remove swapfile from /etc/fstab] ***************************************************************************************** | |
| Friday 16 November 2018 05:20:39 -0500 (0:00:00.162) 0:07:16.228 ******* | |
| TASK [kubernetes/preinstall : Disable swap] ************************************************************************************************************ | |
| Friday 16 November 2018 05:20:40 -0500 (0:00:00.161) 0:07:16.389 ******* | |
| TASK [kubernetes/preinstall : Stop if ansible version is too low] ************************************************************************************** | |
| Friday 16 November 2018 05:20:40 -0500 (0:00:00.159) 0:07:16.549 ******* | |
| TASK [kubernetes/preinstall : Stop if non systemd OS type] ********************************************************************************************* | |
| Friday 16 November 2018 05:20:40 -0500 (0:00:00.109) 0:07:16.659 ******* | |
| TASK [kubernetes/preinstall : Stop if unknown OS] ****************************************************************************************************** | |
| Friday 16 November 2018 05:20:40 -0500 (0:00:00.162) 0:07:16.822 ******* | |
| TASK [kubernetes/preinstall : Stop if unknown network plugin] ****************************************************************************************** | |
| Friday 16 November 2018 05:20:40 -0500 (0:00:00.166) 0:07:16.989 ******* | |
| TASK [kubernetes/preinstall : Stop if incompatible network plugin and cloudprovider] ******************************************************************* | |
| Friday 16 November 2018 05:20:40 -0500 (0:00:00.163) 0:07:17.152 ******* | |
| TASK [kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }")] ********************************* | |
| Friday 16 November 2018 05:20:40 -0500 (0:00:00.162) 0:07:17.315 ******* | |
| TASK [kubernetes/preinstall : Stop if even number of etcd hosts] *************************************************************************************** | |
| Friday 16 November 2018 05:20:41 -0500 (0:00:00.256) 0:07:17.571 ******* | |
| TASK [kubernetes/preinstall : Stop if memory is too small for masters] ********************************************************************************* | |
| Friday 16 November 2018 05:20:41 -0500 (0:00:00.172) 0:07:17.744 ******* | |
| TASK [kubernetes/preinstall : Stop if memory is too small for nodes] *********************************************************************************** | |
| Friday 16 November 2018 05:20:41 -0500 (0:00:00.170) 0:07:17.914 ******* | |
| TASK [kubernetes/preinstall : Guarantee that enough network address space is available for all pods] *************************************************** | |
| Friday 16 November 2018 05:20:41 -0500 (0:00:00.165) 0:07:18.080 ******* | |
| TASK [kubernetes/preinstall : Stop if ip var does not match local ips] ********************************************************************************* | |
| Friday 16 November 2018 05:20:41 -0500 (0:00:00.169) 0:07:18.249 ******* | |
| TASK [kubernetes/preinstall : Stop if access_ip is not pingable] *************************************************************************************** | |
| Friday 16 November 2018 05:20:42 -0500 (0:00:00.166) 0:07:18.416 ******* | |
| TASK [kubernetes/preinstall : Stop if RBAC is not enabled when dashboard is enabled] ******************************************************************* | |
| Friday 16 November 2018 05:20:42 -0500 (0:00:00.175) 0:07:18.592 ******* | |
| TASK [kubernetes/preinstall : Stop if RBAC and anonymous-auth are not enabled when insecure port is disabled] ****************************************** | |
| Friday 16 November 2018 05:20:42 -0500 (0:00:00.161) 0:07:18.753 ******* | |
| TASK [kubernetes/preinstall : Stop if kernel version is too low] *************************************************************************************** | |
| Friday 16 November 2018 05:20:42 -0500 (0:00:00.161) 0:07:18.914 ******* | |
| TASK [kubernetes/preinstall : Pre-upgrade | check if old credential dir exists] ************************************************************************ | |
| Friday 16 November 2018 05:20:42 -0500 (0:00:00.175) 0:07:19.090 ******* | |
| TASK [kubernetes/preinstall : Pre-upgrade | check if new credential dir exists] ************************************************************************ | |
| Friday 16 November 2018 05:20:42 -0500 (0:00:00.102) 0:07:19.192 ******* | |
| TASK [kubernetes/preinstall : Pre-upgrade | move data from old credential dir to new] ****************************************************************** | |
| Friday 16 November 2018 05:20:42 -0500 (0:00:00.111) 0:07:19.304 ******* | |
| TASK [kubernetes/preinstall : Force binaries directory for Container Linux by CoreOS] ****************************************************************** | |
| Friday 16 November 2018 05:20:43 -0500 (0:00:00.096) 0:07:19.400 ******* | |
| TASK [kubernetes/preinstall : check bin dir exists] **************************************************************************************************** | |
| Friday 16 November 2018 05:20:43 -0500 (0:00:00.162) 0:07:19.563 ******* | |
| TASK [kubernetes/preinstall : check if atomic host] **************************************************************************************************** | |
| Friday 16 November 2018 05:20:43 -0500 (0:00:00.165) 0:07:19.729 ******* | |
| TASK [kubernetes/preinstall : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:20:43 -0500 (0:00:00.168) 0:07:19.897 ******* | |
| TASK [kubernetes/preinstall : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:20:43 -0500 (0:00:00.161) 0:07:20.059 ******* | |
| TASK [kubernetes/preinstall : check resolvconf] ******************************************************************************************************** | |
| Friday 16 November 2018 05:20:43 -0500 (0:00:00.165) 0:07:20.225 ******* | |
| TASK [kubernetes/preinstall : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:20:44 -0500 (0:00:00.163) 0:07:20.389 ******* | |
| TASK [kubernetes/preinstall : set_fact] **************************************************************************************************************** | |
| Friday 16 November 2018 05:20:44 -0500 (0:00:00.165) 0:07:20.555 ******* | |
| TASK [kubernetes/preinstall : check if kubelet is configured] ****************************************************************************************** | |
| Friday 16 November 2018 05:20:44 -0500 (0:00:00.160) 0:07:20.715 ******* | |
| TASK [kubernetes/preinstall : check if early DNS configuration stage] ********************************************************************************** | |
| Friday 16 November 2018 05:20:44 -0500 (0:00:00.162) 0:07:20.877 ******* | |
| TASK [kubernetes/preinstall : target resolv.conf files] ************************************************************************************************ | |
| Friday 16 November 2018 05:20:44 -0500 (0:00:00.175) 0:07:21.053 ******* | |
| TASK [kubernetes/preinstall : target temporary resolvconf cloud init file (Container Linux by CoreOS)] ************************************************* | |
| Friday 16 November 2018 05:20:44 -0500 (0:00:00.158) 0:07:21.212 ******* | |
| TASK [kubernetes/preinstall : check if /etc/dhclient.conf exists] ************************************************************************************** | |
| Friday 16 November 2018 05:20:44 -0500 (0:00:00.165) 0:07:21.378 ******* | |
| TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhclient.conf] ************************************************************************ | |
| Friday 16 November 2018 05:20:45 -0500 (0:00:00.177) 0:07:21.556 ******* | |
| TASK [kubernetes/preinstall : check if /etc/dhcp/dhclient.conf exists] ********************************************************************************* | |
| Friday 16 November 2018 05:20:45 -0500 (0:00:00.170) 0:07:21.726 ******* | |
| TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhcp/dhclient.conf] ******************************************************************* | |
| Friday 16 November 2018 05:20:45 -0500 (0:00:00.180) 0:07:21.907 ******* | |
| TASK [kubernetes/preinstall : target dhclient hook file for Red Hat family] **************************************************************************** | |
| Friday 16 November 2018 05:20:45 -0500 (0:00:00.267) 0:07:22.174 ******* | |
| TASK [kubernetes/preinstall : target dhclient hook file for Debian family] ***************************************************************************** | |
| Friday 16 November 2018 05:20:45 -0500 (0:00:00.169) 0:07:22.344 ******* | |
| TASK [kubernetes/preinstall : generate search domains to resolvconf] *********************************************************************************** | |
| Friday 16 November 2018 05:20:46 -0500 (0:00:00.163) 0:07:22.508 ******* | |
| TASK [kubernetes/preinstall : pick dnsmasq cluster IP or default resolver] ***************************************************************************** | |
| Friday 16 November 2018 05:20:46 -0500 (0:00:00.163) 0:07:22.671 ******* | |
| TASK [kubernetes/preinstall : generate nameservers to resolvconf] ************************************************************************************** | |
| Friday 16 November 2018 05:20:46 -0500 (0:00:00.162) 0:07:22.834 ******* | |
| TASK [kubernetes/preinstall : gather os specific variables] ******************************************************************************************** | |
| Friday 16 November 2018 05:20:46 -0500 (0:00:00.169) 0:07:23.004 ******* | |
| TASK [kubernetes/preinstall : Create kubernetes directories] ******************************************************************************************* | |
| Friday 16 November 2018 05:20:46 -0500 (0:00:00.202) 0:07:23.207 ******* | |
| TASK [kubernetes/preinstall : check cloud_provider value] ********************************************************************************************** | |
| Friday 16 November 2018 05:20:47 -0500 (0:00:00.250) 0:07:23.457 ******* | |
| TASK [kubernetes/preinstall : Create cni directories] ************************************************************************************************** | |
| Friday 16 November 2018 05:20:47 -0500 (0:00:00.165) 0:07:23.623 ******* | |
| TASK [kubernetes/preinstall : Create local volume provisioner directories] ***************************************************************************** | |
| Friday 16 November 2018 05:20:47 -0500 (0:00:00.205) 0:07:23.829 ******* | |
| TASK [kubernetes/preinstall : create temporary resolveconf cloud init file] **************************************************************************** | |
| Friday 16 November 2018 05:20:47 -0500 (0:00:00.214) 0:07:24.044 ******* | |
| TASK [kubernetes/preinstall : Add domain/search/nameservers/options to resolv.conf] ******************************************************************** | |
| Friday 16 November 2018 05:20:47 -0500 (0:00:00.156) 0:07:24.200 ******* | |
| TASK [kubernetes/preinstall : Remove search/domain/nameserver options before block] ******************************************************************** | |
| Friday 16 November 2018 05:20:47 -0500 (0:00:00.178) 0:07:24.378 ******* | |
| TASK [kubernetes/preinstall : Remove search/domain/nameserver options after block] ********************************************************************* | |
| Friday 16 November 2018 05:20:48 -0500 (0:00:00.258) 0:07:24.636 ******* | |
| TASK [kubernetes/preinstall : get temporary resolveconf cloud init file content] *********************************************************************** | |
| Friday 16 November 2018 05:20:48 -0500 (0:00:00.259) 0:07:24.896 ******* | |
| TASK [kubernetes/preinstall : persist resolvconf cloud init file] ************************************************************************************** | |
| Friday 16 November 2018 05:20:48 -0500 (0:00:00.164) 0:07:25.060 ******* | |
| TASK [kubernetes/preinstall : Update package management cache (YUM)] *********************************************************************************** | |
| Friday 16 November 2018 05:20:48 -0500 (0:00:00.164) 0:07:25.224 ******* | |
| TASK [kubernetes/preinstall : Expire management cache (YUM) for Updation - Redhat] ********************************************************************* | |
| Friday 16 November 2018 05:20:48 -0500 (0:00:00.159) 0:07:25.384 ******* | |
| TASK [kubernetes/preinstall : Update package management cache (YUM) - Redhat] ************************************************************************** | |
| Friday 16 November 2018 05:20:49 -0500 (0:00:00.172) 0:07:25.556 ******* | |
| TASK [kubernetes/preinstall : Update package management cache (zypper) - SUSE] ************************************************************************* | |
| Friday 16 November 2018 05:20:49 -0500 (0:00:00.164) 0:07:25.721 ******* | |
| TASK [kubernetes/preinstall : Update package management cache (APT)] *********************************************************************************** | |
| Friday 16 November 2018 05:20:49 -0500 (0:00:00.172) 0:07:25.894 ******* | |
| TASK [kubernetes/preinstall : Install python-dnf for latest RedHat versions] *************************************************************************** | |
| Friday 16 November 2018 05:20:49 -0500 (0:00:00.171) 0:07:26.065 ******* | |
| TASK [kubernetes/preinstall : Install epel-release on RedHat/CentOS] *********************************************************************************** | |
| Friday 16 November 2018 05:20:49 -0500 (0:00:00.165) 0:07:26.231 ******* | |
| TASK [kubernetes/preinstall : Install packages requirements] ******************************************************************************************* | |
| Friday 16 November 2018 05:20:50 -0500 (0:00:00.167) 0:07:26.398 ******* | |
| TASK [kubernetes/preinstall : Confirm selinux deployed] ************************************************************************************************ | |
| Friday 16 November 2018 05:20:50 -0500 (0:00:00.258) 0:07:26.656 ******* | |
| TASK [kubernetes/preinstall : Set selinux policy] ****************************************************************************************************** | |
| Friday 16 November 2018 05:20:50 -0500 (0:00:00.173) 0:07:26.830 ******* | |
| TASK [kubernetes/preinstall : Disable IPv6 DNS lookup] ************************************************************************************************* | |
| Friday 16 November 2018 05:20:50 -0500 (0:00:00.162) 0:07:26.993 ******* | |
| TASK [kubernetes/preinstall : Stat sysctl file configuration] ****************************************************************************************** | |
| Friday 16 November 2018 05:20:50 -0500 (0:00:00.160) 0:07:27.153 ******* | |
| TASK [kubernetes/preinstall : Change sysctl file path to link source if linked] ************************************************************************ | |
| Friday 16 November 2018 05:20:50 -0500 (0:00:00.172) 0:07:27.326 ******* | |
| TASK [kubernetes/preinstall : Enable ip forwarding] **************************************************************************************************** | |
| Friday 16 November 2018 05:20:51 -0500 (0:00:00.174) 0:07:27.501 ******* | |
| TASK [kubernetes/preinstall : Hosts | populate inventory into hosts file] ****************************************************************************** | |
| Friday 16 November 2018 05:20:51 -0500 (0:00:00.159) 0:07:27.661 ******* | |
| TASK [kubernetes/preinstall : Hosts | populate kubernetes loadbalancer address into hosts file] ******************************************************** | |
| Friday 16 November 2018 05:20:51 -0500 (0:00:00.171) 0:07:27.833 ******* | |
| TASK [kubernetes/preinstall : Hosts | localhost ipv4 in hosts file] ************************************************************************************ | |
| Friday 16 November 2018 05:20:51 -0500 (0:00:00.162) 0:07:27.995 ******* | |
| TASK [kubernetes/preinstall : Hosts | localhost ipv6 in hosts file] ************************************************************************************ | |
| Friday 16 November 2018 05:20:51 -0500 (0:00:00.160) 0:07:28.155 ******* | |
| TASK [kubernetes/preinstall : Configure dhclient to supersede search/domain/nameservers] *************************************************************** | |
| Friday 16 November 2018 05:20:51 -0500 (0:00:00.162) 0:07:28.318 ******* | |
| TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (non-RH)] *********************************************************************** | |
| Friday 16 November 2018 05:20:52 -0500 (0:00:00.166) 0:07:28.485 ******* | |
| TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (RH-only)] ********************************************************************** | |
| Friday 16 November 2018 05:20:52 -0500 (0:00:00.164) 0:07:28.650 ******* | |
| TASK [kubernetes/preinstall : Remove kubespray specific config from dhclient config] ******************************************************************* | |
| Friday 16 November 2018 05:20:52 -0500 (0:00:00.166) 0:07:28.817 ******* | |
| TASK [kubernetes/preinstall : Remove kubespray specific dhclient hook] ********************************************************************************* | |
| Friday 16 November 2018 05:20:52 -0500 (0:00:00.173) 0:07:28.991 ******* | |
| TASK [kubernetes/preinstall : Check if we are running inside a Azure VM] ******************************************************************************* | |
| Friday 16 November 2018 05:20:52 -0500 (0:00:00.172) 0:07:29.163 ******* | |
| TASK [kubernetes/preinstall : install growpart] ******************************************************************************************************** | |
| Friday 16 November 2018 05:20:52 -0500 (0:00:00.171) 0:07:29.335 ******* | |
| TASK [kubernetes/preinstall : check if growpart needs to be run] *************************************************************************************** | |
| Friday 16 November 2018 05:20:53 -0500 (0:00:00.167) 0:07:29.502 ******* | |
| TASK [kubernetes/preinstall : check fs type] *********************************************************************************************************** | |
| Friday 16 November 2018 05:20:53 -0500 (0:00:00.161) 0:07:29.664 ******* | |
| TASK [kubernetes/preinstall : run growpart] ************************************************************************************************************ | |
| Friday 16 November 2018 05:20:53 -0500 (0:00:00.175) 0:07:29.839 ******* | |
| TASK [kubernetes/preinstall : run xfs_growfs] ********************************************************************************************************** | |
| Friday 16 November 2018 05:20:53 -0500 (0:00:00.165) 0:07:30.005 ******* | |
| TASK [kubernetes/preinstall : Write cacert file] ******************************************************************************************************* | |
| Friday 16 November 2018 05:20:53 -0500 (0:00:00.161) 0:07:30.167 ******* | |
| TASK [kubernetes/preinstall : Write cloud-config] ****************************************************************************************************** | |
| Friday 16 November 2018 05:20:53 -0500 (0:00:00.158) 0:07:30.325 ******* | |
| PLAY [kube-master[0]] ********************************************************************************************************************************** | |
| TASK [download : include_tasks] ************************************************************************************************************************ | |
| Friday 16 November 2018 05:20:54 -0500 (0:00:00.234) 0:07:30.560 ******* | |
| TASK [download : Download items] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:20:54 -0500 (0:00:00.096) 0:07:30.657 ******* | |
| TASK [download : Sync container] *********************************************************************************************************************** | |
| Friday 16 November 2018 05:20:55 -0500 (0:00:01.282) 0:07:31.939 ******* | |
| TASK [kubespray-defaults : Configure defaults] ********************************************************************************************************* | |
| Friday 16 November 2018 05:20:56 -0500 (0:00:01.360) 0:07:33.299 ******* | |
| ok: [node1] => { | |
| "msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
| } | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Wait for kube-apiserver] ***************************************************************************** | |
| Friday 16 November 2018 05:20:57 -0500 (0:00:00.359) 0:07:33.658 ******* | |
| ok: [node1] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Fri, 16 Nov 2018 10:20:58 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "https://127.0.0.1:6443/healthz"} | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old CoreDNS resources] ************************************************************************ | |
| Friday 16 November 2018 05:20:58 -0500 (0:00:01.034) 0:07:34.693 ******* | |
| ok: [node1] => (item=deploy) => {"changed": false, "item": "deploy", "msg": "success: "} | |
| ok: [node1] => (item=configmap) => {"changed": false, "item": "configmap", "msg": "success: "} | |
| ok: [node1] => (item=svc) => {"changed": false, "item": "svc", "msg": "success: "} | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm CoreDNS] ****************************************************************************** | |
| Friday 16 November 2018 05:21:00 -0500 (0:00:02.161) 0:07:36.855 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old KubeDNS resources] ************************************************************************ | |
| Friday 16 November 2018 05:21:00 -0500 (0:00:00.137) 0:07:36.993 ******* | |
| ok: [node1] => (item=deploy) => {"changed": false, "item": "deploy", "msg": "success: "} | |
| ok: [node1] => (item=svc) => {"changed": false, "item": "svc", "msg": "success: "} | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm KubeDNS] ****************************************************************************** | |
| Friday 16 November 2018 05:21:02 -0500 (0:00:01.553) 0:07:38.546 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down CoreDNS Template] *************************************************************************** | |
| Friday 16 November 2018 05:21:02 -0500 (0:00:00.148) 0:07:38.695 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down Secondary CoreDNS Template] ***************************************************************** | |
| Friday 16 November 2018 05:21:02 -0500 (0:00:00.267) 0:07:38.963 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down KubeDNS Template] *************************************************************************** | |
| Friday 16 November 2018 05:21:02 -0500 (0:00:00.169) 0:07:39.132 ******* | |
| changed: [node1] => (item={u'type': u'sa', u'name': u'kube-dns', u'file': u'kubedns-sa.yml'}) => {"changed": true, "checksum": "090ec24dba5333079b3856d1954b4cbe37f21e2e", "dest": "/etc/kubernetes/kubedns-sa.yml", "gid": 0, "group": "root", "item": {"file": "kubedns-sa.yml", "name": "kube-dns", "type": "sa"}, "md5sum": "cf37dd08d3bf998ece6a191bfc10dba5", "mode": "0644", "owner": "root", "size": 144, "src": "/root/.ansible/tmp/ansible-tmp-1542363663.07-110510850747387/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'deployment', u'name': u'kube-dns', u'file': u'kubedns-deploy.yml'}) => {"changed": true, "checksum": "172d88166fb5b093b9747ed9e35c39a6cf2db775", "dest": "/etc/kubernetes/kubedns-deploy.yml", "gid": 0, "group": "root", "item": {"file": "kubedns-deploy.yml", "name": "kube-dns", "type": "deployment"}, "md5sum": "df1795f57e704c30dbd2e4d04629d424", "mode": "0644", "owner": "root", "size": 5261, "src": "/root/.ansible/tmp/ansible-tmp-1542363663.85-116135521685840/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'svc', u'name': u'kube-dns', u'file': u'kubedns-svc.yml'}) => {"changed": true, "checksum": "d6c6fc50a12c7581992fee3b3c175498cf22ff25", "dest": "/etc/kubernetes/kubedns-svc.yml", "gid": 0, "group": "root", "item": {"file": "kubedns-svc.yml", "name": "kube-dns", "type": "svc"}, "md5sum": "a38024811281a06c24e395c194d625cd", "mode": "0644", "owner": "root", "size": 407, "src": "/root/.ansible/tmp/ansible-tmp-1542363664.57-78354163236499/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'sa', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler-sa.yml'}) => {"changed": true, "checksum": "7f28c881d124340601ef9037a39cf79066eff284", "dest": "/etc/kubernetes/kubedns-autoscaler-sa.yml", "gid": 0, "group": "root", "item": {"file": "kubedns-autoscaler-sa.yml", "name": "kubedns-autoscaler", "type": "sa"}, "md5sum": "ff9154e7cba8bbee71838f23b668a92b", "mode": "0644", "owner": "root", "size": 723, "src": "/root/.ansible/tmp/ansible-tmp-1542363665.28-134194894123120/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'clusterrole', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler-clusterrole.yml'}) => {"changed": true, "checksum": "34c1f5fa3e61efa83bda80aec25e9ab3fb30e324", "dest": "/etc/kubernetes/kubedns-autoscaler-clusterrole.yml", "gid": 0, "group": "root", "item": {"file": "kubedns-autoscaler-clusterrole.yml", "name": "kubedns-autoscaler", "type": "clusterrole"}, "md5sum": "0536717669d067d9a483825eacc680fb", "mode": "0644", "owner": "root", "size": 1116, "src": "/root/.ansible/tmp/ansible-tmp-1542363666.11-272358866892669/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'clusterrolebinding', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler-clusterrolebinding.yml'}) => {"changed": true, "checksum": "4bc4723df84365cd686b081021b684ae75837db8", "dest": "/etc/kubernetes/kubedns-autoscaler-clusterrolebinding.yml", "gid": 0, "group": "root", "item": {"file": "kubedns-autoscaler-clusterrolebinding.yml", "name": "kubedns-autoscaler", "type": "clusterrolebinding"}, "md5sum": "523e5403d398e2757cf064b16fc9ec06", "mode": "0644", "owner": "root", "size": 969, "src": "/root/.ansible/tmp/ansible-tmp-1542363666.93-63404704280060/source", "state": "file", "uid": 0} | |
| changed: [node1] => (item={u'type': u'deployment', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler.yml'}) => {"changed": true, "checksum": "4be9ce597d28b3f99fd31006c12104e2006e4cbb", "dest": "/etc/kubernetes/kubedns-autoscaler.yml", "gid": 0, "group": "root", "item": {"file": "kubedns-autoscaler.yml", "name": "kubedns-autoscaler", "type": "deployment"}, "md5sum": "a7bd8d482fffc6fef4721895a4297c1c", "mode": "0644", "owner": "root", "size": 2237, "src": "/root/.ansible/tmp/ansible-tmp-1542363667.68-226049579097132/source", "state": "file", "uid": 0} | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Patch system:kube-dns ClusterRole] ******************************************************************* | |
| Friday 16 November 2018 05:21:08 -0500 (0:00:05.677) 0:07:44.810 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Start Resources] ************************************************************************************* | |
| Friday 16 November 2018 05:21:08 -0500 (0:00:00.155) 0:07:44.965 ******* | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'cf37dd08d3bf998ece6a191bfc10dba5', u'uid': 0, u'dest': u'/etc/kubernetes/kubedns-sa.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363663.07-110510850747387/source', u'group': u'root', '_ansible_item_label': {u'type': u'sa', u'name': u'kube-dns', u'file': u'kubedns-sa.yml'}, 'item': {u'type': u'sa', u'name': u'kube-dns', u'file': u'kubedns-sa.yml'}, u'checksum': u'090ec24dba5333079b3856d1954b4cbe37f21e2e', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/kubedns-sa.yml', u'selevel': None, u'_original_basename': u'kubedns-sa.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363663.07-110510850747387/source', u'group': None, u'unsafe_writes': None, u'checksum': u'090ec24dba5333079b3856d1954b4cbe37f21e2e', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 144, '_ansible_ignore_errors': None}) => {"attempts": 1, "changed": false, "item": {"changed": true, "checksum": "090ec24dba5333079b3856d1954b4cbe37f21e2e", "dest": "/etc/kubernetes/kubedns-sa.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "kubedns-sa.yml.j2", "attributes": null, "backup": false, "checksum": "090ec24dba5333079b3856d1954b4cbe37f21e2e", "content": null, "delimiter": null, "dest": "/etc/kubernetes/kubedns-sa.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363663.07-110510850747387/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "kubedns-sa.yml", "name": "kube-dns", "type": "sa"}, "md5sum": "cf37dd08d3bf998ece6a191bfc10dba5", "mode": "0644", "owner": "root", "size": 144, "src": "/root/.ansible/tmp/ansible-tmp-1542363663.07-110510850747387/source", "state": "file", "uid": 0}, "msg": "success: serviceaccount \"kube-dns\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'df1795f57e704c30dbd2e4d04629d424', u'uid': 0, u'dest': u'/etc/kubernetes/kubedns-deploy.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363663.85-116135521685840/source', u'group': u'root', '_ansible_item_label': {u'type': u'deployment', u'name': u'kube-dns', u'file': u'kubedns-deploy.yml'}, 'item': {u'type': u'deployment', u'name': u'kube-dns', u'file': u'kubedns-deploy.yml'}, u'checksum': u'172d88166fb5b093b9747ed9e35c39a6cf2db775', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/kubedns-deploy.yml', u'selevel': None, u'_original_basename': u'kubedns-deploy.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363663.85-116135521685840/source', u'group': None, u'unsafe_writes': None, u'checksum': u'172d88166fb5b093b9747ed9e35c39a6cf2db775', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 5261, '_ansible_ignore_errors': None}) => {"attempts": 1, "changed": false, "item": {"changed": true, "checksum": "172d88166fb5b093b9747ed9e35c39a6cf2db775", "dest": "/etc/kubernetes/kubedns-deploy.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "kubedns-deploy.yml.j2", "attributes": null, "backup": false, "checksum": "172d88166fb5b093b9747ed9e35c39a6cf2db775", "content": null, "delimiter": null, "dest": "/etc/kubernetes/kubedns-deploy.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363663.85-116135521685840/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "kubedns-deploy.yml", "name": "kube-dns", "type": "deployment"}, "md5sum": "df1795f57e704c30dbd2e4d04629d424", "mode": "0644", "owner": "root", "size": 5261, "src": "/root/.ansible/tmp/ansible-tmp-1542363663.85-116135521685840/source", "state": "file", "uid": 0}, "msg": "success: deployment.extensions \"kube-dns\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'a38024811281a06c24e395c194d625cd', u'uid': 0, u'dest': u'/etc/kubernetes/kubedns-svc.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363664.57-78354163236499/source', u'group': u'root', '_ansible_item_label': {u'type': u'svc', u'name': u'kube-dns', u'file': u'kubedns-svc.yml'}, 'item': {u'type': u'svc', u'name': u'kube-dns', u'file': u'kubedns-svc.yml'}, u'checksum': u'd6c6fc50a12c7581992fee3b3c175498cf22ff25', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/kubedns-svc.yml', u'selevel': None, u'_original_basename': u'kubedns-svc.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363664.57-78354163236499/source', u'group': None, u'unsafe_writes': None, u'checksum': u'd6c6fc50a12c7581992fee3b3c175498cf22ff25', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 407, '_ansible_ignore_errors': None}) => {"attempts": 1, "changed": false, "item": {"changed": true, "checksum": "d6c6fc50a12c7581992fee3b3c175498cf22ff25", "dest": "/etc/kubernetes/kubedns-svc.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "kubedns-svc.yml.j2", "attributes": null, "backup": false, "checksum": "d6c6fc50a12c7581992fee3b3c175498cf22ff25", "content": null, "delimiter": null, "dest": "/etc/kubernetes/kubedns-svc.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363664.57-78354163236499/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "kubedns-svc.yml", "name": "kube-dns", "type": "svc"}, "md5sum": "a38024811281a06c24e395c194d625cd", "mode": "0644", "owner": "root", "size": 407, "src": "/root/.ansible/tmp/ansible-tmp-1542363664.57-78354163236499/source", "state": "file", "uid": 0}, "msg": "success: service \"kube-dns\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'ff9154e7cba8bbee71838f23b668a92b', u'uid': 0, u'dest': u'/etc/kubernetes/kubedns-autoscaler-sa.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363665.28-134194894123120/source', u'group': u'root', '_ansible_item_label': {u'type': u'sa', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler-sa.yml'}, 'item': {u'type': u'sa', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler-sa.yml'}, u'checksum': u'7f28c881d124340601ef9037a39cf79066eff284', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/kubedns-autoscaler-sa.yml', u'selevel': None, u'_original_basename': u'kubedns-autoscaler-sa.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363665.28-134194894123120/source', u'group': None, u'unsafe_writes': None, u'checksum': u'7f28c881d124340601ef9037a39cf79066eff284', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 723, '_ansible_ignore_errors': None}) => {"attempts": 1, "changed": false, "item": {"changed": true, "checksum": "7f28c881d124340601ef9037a39cf79066eff284", "dest": "/etc/kubernetes/kubedns-autoscaler-sa.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "kubedns-autoscaler-sa.yml.j2", "attributes": null, "backup": false, "checksum": "7f28c881d124340601ef9037a39cf79066eff284", "content": null, "delimiter": null, "dest": "/etc/kubernetes/kubedns-autoscaler-sa.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363665.28-134194894123120/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "kubedns-autoscaler-sa.yml", "name": "kubedns-autoscaler", "type": "sa"}, "md5sum": "ff9154e7cba8bbee71838f23b668a92b", "mode": "0644", "owner": "root", "size": 723, "src": "/root/.ansible/tmp/ansible-tmp-1542363665.28-134194894123120/source", "state": "file", "uid": 0}, "msg": "success: serviceaccount \"cluster-proportional-autoscaler\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'0536717669d067d9a483825eacc680fb', u'uid': 0, u'dest': u'/etc/kubernetes/kubedns-autoscaler-clusterrole.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363666.11-272358866892669/source', u'group': u'root', '_ansible_item_label': {u'type': u'clusterrole', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler-clusterrole.yml'}, 'item': {u'type': u'clusterrole', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler-clusterrole.yml'}, u'checksum': u'34c1f5fa3e61efa83bda80aec25e9ab3fb30e324', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/kubedns-autoscaler-clusterrole.yml', u'selevel': None, u'_original_basename': u'kubedns-autoscaler-clusterrole.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363666.11-272358866892669/source', u'group': None, u'unsafe_writes': None, u'checksum': u'34c1f5fa3e61efa83bda80aec25e9ab3fb30e324', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 1116, '_ansible_ignore_errors': None}) => {"attempts": 1, "changed": false, "item": {"changed": true, "checksum": "34c1f5fa3e61efa83bda80aec25e9ab3fb30e324", "dest": "/etc/kubernetes/kubedns-autoscaler-clusterrole.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "kubedns-autoscaler-clusterrole.yml.j2", "attributes": null, "backup": false, "checksum": "34c1f5fa3e61efa83bda80aec25e9ab3fb30e324", "content": null, "delimiter": null, "dest": "/etc/kubernetes/kubedns-autoscaler-clusterrole.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363666.11-272358866892669/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "kubedns-autoscaler-clusterrole.yml", "name": "kubedns-autoscaler", "type": "clusterrole"}, "md5sum": "0536717669d067d9a483825eacc680fb", "mode": "0644", "owner": "root", "size": 1116, "src": "/root/.ansible/tmp/ansible-tmp-1542363666.11-272358866892669/source", "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io \"cluster-proportional-autoscaler\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'523e5403d398e2757cf064b16fc9ec06', u'uid': 0, u'dest': u'/etc/kubernetes/kubedns-autoscaler-clusterrolebinding.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363666.93-63404704280060/source', u'group': u'root', '_ansible_item_label': {u'type': u'clusterrolebinding', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler-clusterrolebinding.yml'}, 'item': {u'type': u'clusterrolebinding', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler-clusterrolebinding.yml'}, u'checksum': u'4bc4723df84365cd686b081021b684ae75837db8', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/kubedns-autoscaler-clusterrolebinding.yml', u'selevel': None, u'_original_basename': u'kubedns-autoscaler-clusterrolebinding.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363666.93-63404704280060/source', u'group': None, u'unsafe_writes': None, u'checksum': u'4bc4723df84365cd686b081021b684ae75837db8', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 969, '_ansible_ignore_errors': None}) => {"attempts": 1, "changed": false, "item": {"changed": true, "checksum": "4bc4723df84365cd686b081021b684ae75837db8", "dest": "/etc/kubernetes/kubedns-autoscaler-clusterrolebinding.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "kubedns-autoscaler-clusterrolebinding.yml.j2", "attributes": null, "backup": false, "checksum": "4bc4723df84365cd686b081021b684ae75837db8", "content": null, "delimiter": null, "dest": "/etc/kubernetes/kubedns-autoscaler-clusterrolebinding.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363666.93-63404704280060/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "kubedns-autoscaler-clusterrolebinding.yml", "name": "kubedns-autoscaler", "type": "clusterrolebinding"}, "md5sum": "523e5403d398e2757cf064b16fc9ec06", "mode": "0644", "owner": "root", "size": 969, "src": "/root/.ansible/tmp/ansible-tmp-1542363666.93-63404704280060/source", "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io \"cluster-proportional-autoscaler\" created"} | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'a7bd8d482fffc6fef4721895a4297c1c', u'uid': 0, u'dest': u'/etc/kubernetes/kubedns-autoscaler.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363667.68-226049579097132/source', u'group': u'root', '_ansible_item_label': {u'type': u'deployment', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler.yml'}, 'item': {u'type': u'deployment', u'name': u'kubedns-autoscaler', u'file': u'kubedns-autoscaler.yml'}, u'checksum': u'4be9ce597d28b3f99fd31006c12104e2006e4cbb', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/kubedns-autoscaler.yml', u'selevel': None, u'_original_basename': u'kubedns-autoscaler.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363667.68-226049579097132/source', u'group': None, u'unsafe_writes': None, u'checksum': u'4be9ce597d28b3f99fd31006c12104e2006e4cbb', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 2237, '_ansible_ignore_errors': None}) => {"attempts": 1, "changed": false, "item": {"changed": true, "checksum": "4be9ce597d28b3f99fd31006c12104e2006e4cbb", "dest": "/etc/kubernetes/kubedns-autoscaler.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "kubedns-autoscaler.yml.j2", "attributes": null, "backup": false, "checksum": "4be9ce597d28b3f99fd31006c12104e2006e4cbb", "content": null, "delimiter": null, "dest": "/etc/kubernetes/kubedns-autoscaler.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363667.68-226049579097132/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "kubedns-autoscaler.yml", "name": "kubedns-autoscaler", "type": "deployment"}, "md5sum": "a7bd8d482fffc6fef4721895a4297c1c", "mode": "0644", "owner": "root", "size": 2237, "src": "/root/.ansible/tmp/ansible-tmp-1542363667.68-226049579097132/source", "state": "file", "uid": 0}, "msg": "success: deployment.extensions \"kubedns-autoscaler\" created"} | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Check if netchecker-server manifest already exists] ************************************************** | |
| Friday 16 November 2018 05:21:14 -0500 (0:00:05.424) 0:07:50.390 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Apply netchecker-server manifest to update annotations] ********************************************** | |
| Friday 16 November 2018 05:21:14 -0500 (0:00:00.102) 0:07:50.492 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down Netchecker Template] ************************************************************************ | |
| Friday 16 November 2018 05:21:14 -0500 (0:00:00.095) 0:07:50.588 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Purge old Netchecker server] ************************************************************************* | |
| Friday 16 November 2018 05:21:14 -0500 (0:00:00.239) 0:07:50.828 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Start Netchecker Resources] ************************************************************************** | |
| Friday 16 November 2018 05:21:14 -0500 (0:00:00.108) 0:07:50.936 ******* | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old kubernetes-dashboard resources] *********************************************************** | |
| Friday 16 November 2018 05:21:14 -0500 (0:00:00.254) 0:07:51.191 ******* | |
| ok: [node1] => (item=ClusterRoleBinding) => {"changed": false, "item": "ClusterRoleBinding", "msg": "success: "} | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay down dashboard template] ************************************************************************* | |
| Friday 16 November 2018 05:21:15 -0500 (0:00:00.781) 0:07:51.972 ******* | |
| changed: [node1] => (item={u'type': u'deploy', u'name': u'kubernetes-dashboard', u'file': u'dashboard.yml'}) => {"changed": true, "checksum": "5d6b22f61717008058bf5e7e37ec98f0d029e9b3", "dest": "/etc/kubernetes/dashboard.yml", "gid": 0, "group": "root", "item": {"file": "dashboard.yml", "name": "kubernetes-dashboard", "type": "deploy"}, "md5sum": "97451bd2c23652fc1a7875dcf9e3b3c8", "mode": "0644", "owner": "root", "size": 5951, "src": "/root/.ansible/tmp/ansible-tmp-1542363675.88-121392398392901/source", "state": "file", "uid": 0} | |
| TASK [kubernetes-apps/ansible : Kubernetes Apps | Start dashboard] ************************************************************************************* | |
| Friday 16 November 2018 05:21:16 -0500 (0:00:00.978) 0:07:52.950 ******* | |
| ok: [node1] => (item={'_ansible_parsed': True, u'md5sum': u'97451bd2c23652fc1a7875dcf9e3b3c8', u'uid': 0, u'dest': u'/etc/kubernetes/dashboard.yml', '_ansible_item_result': True, u'owner': u'root', 'diff': [], '_ansible_no_log': False, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363675.88-121392398392901/source', u'group': u'root', '_ansible_item_label': {u'type': u'deploy', u'name': u'kubernetes-dashboard', u'file': u'dashboard.yml'}, 'item': {u'type': u'deploy', u'name': u'kubernetes-dashboard', u'file': u'dashboard.yml'}, u'checksum': u'5d6b22f61717008058bf5e7e37ec98f0d029e9b3', u'changed': True, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': True, u'remote_src': None, u'dest': u'/etc/kubernetes/dashboard.yml', u'selevel': None, u'_original_basename': u'dashboard.yml.j2', u'delimiter': None, u'regexp': None, u'owner': None, u'follow': False, u'validate': None, u'local_follow': None, u'src': u'/root/.ansible/tmp/ansible-tmp-1542363675.88-121392398392901/source', u'group': None, u'unsafe_writes': None, u'checksum': u'5d6b22f61717008058bf5e7e37ec98f0d029e9b3', u'seuser': None, u'serole': None, u'content': None, u'setype': None, u'mode': None, u'attributes': None, u'backup': False}}, u'size': 5951, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": true, "checksum": "5d6b22f61717008058bf5e7e37ec98f0d029e9b3", "dest": "/etc/kubernetes/dashboard.yml", "diff": [], "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_original_basename": "dashboard.yml.j2", "attributes": null, "backup": false, "checksum": "5d6b22f61717008058bf5e7e37ec98f0d029e9b3", "content": null, "delimiter": null, "dest": "/etc/kubernetes/dashboard.yml", "directory_mode": null, "follow": false, "force": true, "group": null, "local_follow": null, "mode": null, "owner": null, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": "/root/.ansible/tmp/ansible-tmp-1542363675.88-121392398392901/source", "unsafe_writes": null, "validate": null}}, "item": {"file": "dashboard.yml", "name": "kubernetes-dashboard", "type": "deploy"}, "md5sum": "97451bd2c23652fc1a7875dcf9e3b3c8", "mode": "0644", "owner": "root", "size": 5951, "src": "/root/.ansible/tmp/ansible-tmp-1542363675.88-121392398392901/source", "state": "file", "uid": 0}, "msg": "success: secret \"kubernetes-dashboard-certs\" created serviceaccount \"kubernetes-dashboard\" created role.rbac.authorization.k8s.io \"kubernetes-dashboard-minimal\" created rolebinding.rbac.authorization.k8s.io \"kubernetes-dashboard-minimal\" created clusterrole.rbac.authorization.k8s.io \"kubernetes-dashboard-anonymous\" created clusterrolebinding.rbac.authorization.k8s.io \"kubernetes-dashboard-anonymous\" created deployment.apps \"kubernetes-dashboard\" created service \"kubernetes-dashboard\" created"} | |
| TASK [kubernetes-apps/efk/elasticsearch : ElasticSearch | Write efk manifests (RBAC)] ****************************************************************** | |
| Friday 16 November 2018 05:21:17 -0500 (0:00:01.215) 0:07:54.166 ******* | |
| TASK [kubernetes-apps/efk/elasticsearch : ElasticSearch | Create Serviceaccount and Clusterrolebinding (RBAC)] ***************************************** | |
| Friday 16 November 2018 05:21:17 -0500 (0:00:00.122) 0:07:54.288 ******* | |
| TASK [kubernetes-apps/efk/elasticsearch : ElasticSearch | Write ES deployment] ************************************************************************* | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.125) 0:07:54.414 ******* | |
| TASK [kubernetes-apps/efk/elasticsearch : ElasticSearch | Create ES deployment] ************************************************************************ | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.100) 0:07:54.514 ******* | |
| TASK [kubernetes-apps/efk/elasticsearch : ElasticSearch | Write ES service] **************************************************************************** | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.102) 0:07:54.617 ******* | |
| TASK [kubernetes-apps/efk/elasticsearch : ElasticSearch | Create ES service] *************************************************************************** | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.092) 0:07:54.709 ******* | |
| TASK [kubernetes-apps/efk/fluentd : Fluentd | copy config file] **************************************************************************************** | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.096) 0:07:54.806 ******* | |
| TASK [kubernetes-apps/efk/fluentd : Fluentd | create configMap] **************************************************************************************** | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.114) 0:07:54.920 ******* | |
| TASK [kubernetes-apps/efk/fluentd : Fluentd | Write fluentd daemonset] ********************************************************************************* | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.104) 0:07:55.025 ******* | |
| TASK [kubernetes-apps/efk/fluentd : Fluentd | Create fluentd daemonset] ******************************************************************************** | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.087) 0:07:55.113 ******* | |
| TASK [kubernetes-apps/efk/kibana : Kibana | Write Kibana deployment] *********************************************************************************** | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.099) 0:07:55.212 ******* | |
| TASK [kubernetes-apps/efk/kibana : Kibana | Create Kibana deployment] ********************************************************************************** | |
| Friday 16 November 2018 05:21:18 -0500 (0:00:00.102) 0:07:55.315 ******* | |
| TASK [kubernetes-apps/efk/kibana : Kibana | Write Kibana service] ************************************************************************************** | |
| Friday 16 November 2018 05:21:19 -0500 (0:00:00.108) 0:07:55.424 ******* | |
| TASK [kubernetes-apps/efk/kibana : Kibana | Create Kibana service] ************************************************************************************* | |
| Friday 16 November 2018 05:21:19 -0500 (0:00:00.089) 0:07:55.513 ******* | |
| TASK [kubernetes-apps/helm : Helm | Make sure HELM_HOME directory exists] ****************************************************************************** | |
| Friday 16 November 2018 05:21:19 -0500 (0:00:00.095) 0:07:55.608 ******* | |
| TASK [kubernetes-apps/helm : Helm | Set up helm launcher] ********************************************************************************************** | |
| Friday 16 November 2018 05:21:19 -0500 (0:00:00.096) 0:07:55.705 ******* | |
| TASK [kubernetes-apps/helm : Helm | Lay Down Helm Manifests (RBAC)] ************************************************************************************ | |
| Friday 16 November 2018 05:21:19 -0500 (0:00:00.096) 0:07:55.801 ******* | |
| TASK [kubernetes-apps/helm : Helm | Apply Helm Manifests (RBAC)] *************************************************************************************** | |
| Friday 16 November 2018 05:21:19 -0500 (0:00:00.140) 0:07:55.942 ******* | |
| TASK [kubernetes-apps/helm : Helm | Install/upgrade helm] ********************************************************************************************** | |
| Friday 16 November 2018 05:21:19 -0500 (0:00:00.165) 0:07:56.107 ******* | |
| TASK [kubernetes-apps/helm : Helm | Set up bash completion] ******************************************************************************************** | |
| Friday 16 November 2018 05:21:19 -0500 (0:00:00.114) 0:07:56.222 ******* | |
| TASK [kubernetes-apps/registry : Registry | Create addon dir] ****************************************************************************************** | |
| Friday 16 November 2018 05:21:19 -0500 (0:00:00.116) 0:07:56.338 ******* | |
| TASK [kubernetes-apps/registry : Registry | Create manifests] ****************************************************************************************** | |
| Friday 16 November 2018 05:21:20 -0500 (0:00:00.098) 0:07:56.437 ******* | |
| TASK [kubernetes-apps/registry : Registry | Apply manifests] ******************************************************************************************* | |
| Friday 16 November 2018 05:21:20 -0500 (0:00:00.217) 0:07:56.654 ******* | |
| TASK [kubernetes-apps/registry : Registry | Create PVC manifests] ************************************************************************************** | |
| Friday 16 November 2018 05:21:20 -0500 (0:00:00.176) 0:07:56.830 ******* | |
| TASK [kubernetes-apps/registry : Registry | Apply PVC manifests] *************************************************************************************** | |
| Friday 16 November 2018 05:21:20 -0500 (0:00:00.110) 0:07:56.941 ******* | |
| TASK [kubernetes-apps/persistent_volumes/openstack : Kubernetes Persistent Volumes | Lay down OpenStack Cinder Storage Class template] ***************** | |
| Friday 16 November 2018 05:21:20 -0500 (0:00:00.134) 0:07:57.076 ******* | |
| TASK [kubernetes-apps/persistent_volumes/openstack : Kubernetes Persistent Volumes | Add OpenStack Cinder Storage Class] ******************************* | |
| Friday 16 November 2018 05:21:20 -0500 (0:00:00.118) 0:07:57.195 ******* | |
| PLAY RECAP ********************************************************************************************************************************************* | |
| localhost : ok=2 changed=0 unreachable=0 failed=0 | |
| node1 : ok=357 changed=88 unreachable=0 failed=0 | |
| node2 : ok=256 changed=57 unreachable=0 failed=0 | |
| Friday 16 November 2018 05:21:20 -0500 (0:00:00.033) 0:07:57.228 ******* | |
| =============================================================================== | |
| kubernetes/master : Master | wait for the apiserver to be running ------------------------------------------------------------------------------ 28.99s | |
| docker : Docker | pause while Docker restarts -------------------------------------------------------------------------------------------------- 10.71s | |
| etcd : Configure | Check if etcd cluster is healthy --------------------------------------------------------------------------------------------- 9.34s | |
| etcd : wait for etcd up ------------------------------------------------------------------------------------------------------------------------- 7.09s | |
| kubernetes/master : Master | wait for kube-scheduler -------------------------------------------------------------------------------------------- 6.31s | |
| kubernetes-apps/ansible : Kubernetes Apps | Lay Down KubeDNS Template --------------------------------------------------------------------------- 5.68s | |
| kubernetes-apps/ansible : Kubernetes Apps | Start Resources ------------------------------------------------------------------------------------- 5.42s | |
| network_plugin/calico : Calico | Create calico manifests ---------------------------------------------------------------------------------------- 3.86s | |
| kubernetes-apps/network_plugin/calico : Start Calico resources ---------------------------------------------------------------------------------- 3.57s | |
| download : Download items ----------------------------------------------------------------------------------------------------------------------- 3.14s | |
| docker : Ensure old versions of Docker are not installed. | RedHat ------------------------------------------------------------------------------ 3.08s | |
| docker : Docker | reload docker ----------------------------------------------------------------------------------------------------------------- 2.96s | |
| kubernetes/secrets : Check_certs | Set 'sync_certs' to true on masters -------------------------------------------------------------------------- 2.94s | |
| kubernetes/preinstall : Update package management cache (YUM) ----------------------------------------------------------------------------------- 2.88s | |
| gather facts from all instances ----------------------------------------------------------------------------------------------------------------- 2.63s | |
| kubernetes/secrets : Gen_certs | run cert generation script ------------------------------------------------------------------------------------- 2.58s | |
| kubernetes/node : write the kubecfg (auth) file for kubelet ------------------------------------------------------------------------------------- 2.36s | |
| kubernetes/preinstall : Install packages requirements ------------------------------------------------------------------------------------------- 2.26s | |
| kubernetes/secrets : Check_certs | Set 'gen_certs' to true -------------------------------------------------------------------------------------- 2.21s | |
| kubernetes-apps/ansible : Kubernetes Apps | Delete old CoreDNS resources ------------------------------------------------------------------------ 2.16s | |
| [root@node1 kubespray-2.6.0]# |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment