Created
April 27, 2017 14:31
-
-
Save php-coder/0eba2c926d31777389087c462ebdc64b to your computer and use it in GitHub Desktop.
vagrant/etcd/openshift panic
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
I0425 11:11:58.985791 27972 start_master.go:221] Generating master configuration | |
I0425 11:11:58.986444 27972 create_mastercerts.go:181] Creating all certs with: admin.CreateMasterCertsOptions{CertDir:"openshift.local.config/master", Sign | |
erName:"openshift-signer@1493118718", ExpireDays:730, SignerExpireDays:1825, APIServerCAFiles:[]string(nil), CABundleFile:"openshift.local.config/master/ca-bu | |
ndle.crt", Hostnames:[]string{"10.0.2.15", "127.0.0.1", "172.17.0.1", "172.30.0.1", "kubernetes", "kubernetes.default", "kubernetes.default.svc", "kubernetes. | |
default.svc.cluster.local", "localhost", "openshift", "openshift.default", "openshift.default.svc", "openshift.default.svc.cluster.local"}, APIServerURL:"http | |
s://10.0.2.15:8443", PublicAPIServerURL:"https://localhost:8443", Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} | |
I0425 11:11:58.986531 27972 create_signercert.go:99] Creating a signer cert with: admin.CreateSignerCertOptions{CertFile:"openshift.local.config/master/ca.c | |
rt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", ExpireDays:1825, Name:"openshift-signer@1493118 | |
718", Output:(*util.gLogWriter)(0xc4213f731c), Overwrite:false} | |
I0425 11:11:58.989169 27972 create_signercert.go:111] Keeping existing CA cert at openshift.local.config/master/ca.crt and key at openshift.local.config/mas | |
ter/ca.key | |
I0425 11:11:58.989533 27972 create_signercert.go:99] Creating a signer cert with: admin.CreateSignerCertOptions{CertFile:"openshift.local.config/master/serv | |
ice-signer.crt", KeyFile:"openshift.local.config/master/service-signer.key", SerialFile:"", ExpireDays:1825, Name:"openshift-service-serving-signer@1493118718 | |
", Output:(*util.gLogWriter)(0xc4213f731c), Overwrite:false} | |
I0425 11:11:58.990352 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions) | |
(0xc42142d1c0), CertFile:"openshift.local.config/master/master.etcd-client.crt", KeyFile:"openshift.local.config/master/master.etcd-client.key", ExpireDays:73 | |
0, User:"system:master", Groups:[]string{}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.SignerCertOptions{CertFile:"openshift.local.c | |
onfig/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", lock:sync.Mutex{state:0, sema: | |
0x0}, ca:(*crypto.CA)(nil)} | |
I0425 11:11:58.992722 27972 create_signercert.go:111] Keeping existing CA cert at openshift.local.config/master/service-signer.crt and key at openshift.loca | |
l.config/master/service-signer.key | |
I0425 11:11:58.993660 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions) | |
(0xc42142d1c0), CertFile:"openshift.local.config/master/master.kubelet-client.crt", KeyFile:"openshift.local.config/master/master.kubelet-client.key", ExpireD | |
ays:730, User:"system:openshift-node-admin", Groups:[]string{"system:node-admins"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.Signe | |
rCertOptions{CertFile:"openshift.local.config/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.ser | |
ial.txt", lock:sync.Mutex{state:0, sema:0x0}, ca:(*crypto.CA)(0xc4214ab480)} | |
I0425 11:11:58.994735 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/master.etcd-client.crt and key at openshi | |
ft.local.config/master/master.etcd-client.key | |
I0425 11:11:58.995939 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/master.kubelet-client.crt and key at open | |
shift.local.config/master/master.kubelet-client.key | |
I0425 11:11:58.996803 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions) | |
(0xc42142d1c0), CertFile:"openshift.local.config/master/master.proxy-client.crt", KeyFile:"openshift.local.config/master/master.proxy-client.key", ExpireDays: | |
730, User:"system:master-proxy", Groups:[]string{}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.SignerCertOptions{CertFile:"openshift | |
.local.config/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", lock:sync.Mutex{state: | |
0, sema:0x0}, ca:(*crypto.CA)(0xc4214ab480)} | |
I0425 11:11:58.997413 27972 create_servercert.go:119] Creating a server cert with: admin.CreateServerCertOptions{SignerCertOptions:(*admin.SignerCertOptions | |
)(0xc42142d1c0), CertFile:"openshift.local.config/master/master.server.crt", KeyFile:"openshift.local.config/master/master.server.key", ExpireDays:730, Hostna | |
mes:[]string{"10.0.2.15", "127.0.0.1", "172.17.0.1", "172.30.0.1", "kubernetes", "kubernetes.default", "kubernetes.default.svc", "kubernetes.default.svc.clust | |
er.local", "localhost", "openshift", "openshift.default", "openshift.default.svc", "openshift.default.svc.cluster.local"}, Overwrite:false, Output:(*util.gLog | |
Writer)(0xc4213f731c)} | |
I0425 11:11:58.998810 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/master.proxy-client.crt and key at openshift.local.config/master/master.proxy-client.key | |
I0425 11:11:58.998981 27972 create_keypair.go:91] Creating a key pair with: admin.CreateKeyPairOptions{PublicKeyFile:"openshift.local.config/master/serviceaccounts.public.key", PrivateKeyFile:"openshift.local.config/master/serviceaccounts.private.key", Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} | |
I0425 11:11:58.999270 27972 create_keypair.go:95] Keeping existing private key file openshift.local.config/master/serviceaccounts.private.key | |
I0425 11:11:58.999415 27972 crypto.go:440] Found existing server certificate in openshift.local.config/master/master.server.crt | |
I0425 11:11:58.999428 27972 create_servercert.go:136] Keeping existing server certificate at openshift.local.config/master/master.server.crt, key at openshift.local.config/master/master.server.key | |
I0425 11:11:59.000296 27972 create_servercert.go:119] Creating a server cert with: admin.CreateServerCertOptions{SignerCertOptions:(*admin.SignerCertOptions)(0xc42142d1c0), CertFile:"openshift.local.config/master/master.server.crt", KeyFile:"openshift.local.config/master/master.server.key", ExpireDays:730, Hostnames:[]string{"10.0.2.15", "127.0.0.1", "172.17.0.1", "172.30.0.1", "kubernetes", "kubernetes.default", "kubernetes.default.svc", "kubernetes.default.svc.cluster.local", "localhost", "openshift", "openshift.default", "openshift.default.svc", "openshift.default.svc.cluster.local"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} | |
I0425 11:11:59.000287 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions)(0xc42142d1c0), CertFile:"openshift.local.config/master/openshift-master.crt", KeyFile:"openshift.local.config/master/openshift-master.key", ExpireDays:730, User:"system:openshift-master", Groups:[]string{"system:masters"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.SignerCertOptions{CertFile:"openshift.local.config/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", lock:sync.Mutex{state:0, sema:0x0}, ca:(*crypto.CA)(0xc4214ab480)} | |
I0425 11:11:59.001898 27972 crypto.go:440] Found existing server certificate in openshift.local.config/master/master.server.crt | |
I0425 11:11:59.001912 27972 create_servercert.go:136] Keeping existing server certificate at openshift.local.config/master/master.server.crt, key at openshift.local.config/master/master.server.key | |
I0425 11:11:59.002131 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/openshift-master.crt and key at openshift.local.config/master/openshift-master.key | |
I0425 11:11:59.002862 27972 create_servercert.go:119] Creating a server cert with: admin.CreateServerCertOptions{SignerCertOptions:(*admin.SignerCertOptions)(0xc42142d1c0), CertFile:"openshift.local.config/master/etcd.server.crt", KeyFile:"openshift.local.config/master/etcd.server.key", ExpireDays:730, Hostnames:[]string{"10.0.2.15", "127.0.0.1", "172.17.0.1", "172.30.0.1", "kubernetes", "kubernetes.default", "kubernetes.default.svc", "kubernetes.default.svc.cluster.local", "localhost", "openshift", "openshift.default", "openshift.default.svc", "openshift.default.svc.cluster.local"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} | |
I0425 11:11:59.003066 27972 create_kubeconfig.go:143] creating a .kubeconfig with: admin.CreateKubeConfigOptions{APIServerURL:"https://10.0.2.15:8443", PublicAPIServerURL:"https://localhost:8443", APIServerCAFiles:[]string{"openshift.local.config/master/ca.crt"}, CertFile:"openshift.local.config/master/openshift-master.crt", KeyFile:"openshift.local.config/master/openshift-master.key", ContextNamespace:"default", KubeConfigFile:"openshift.local.config/master/openshift-master.kubeconfig", Output:(*util.gLogWriter)(0xc4213f731c)} | |
I0425 11:11:59.004643 27972 crypto.go:440] Found existing server certificate in openshift.local.config/master/etcd.server.crt | |
I0425 11:11:59.004657 27972 create_servercert.go:136] Keeping existing server certificate at openshift.local.config/master/etcd.server.crt, key at openshift.local.config/master/etcd.server.key | |
I0425 11:11:59.006033 27972 create_kubeconfig.go:217] Generating 'system:openshift-master/10-0-2-15:8443' API client config as openshift.local.config/master/openshift-master.kubeconfig | |
I0425 11:11:59.012115 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions)(0xc42142d1c0), CertFile:"openshift.local.config/master/admin.crt", KeyFile:"openshift.local.config/master/admin.key", ExpireDays:730, User:"system:admin", Groups:[]string{"system:cluster-admins"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.SignerCertOptions{CertFile:"openshift.local.config/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", lock:sync.Mutex{state:0, sema:0x0}, ca:(*crypto.CA)(0xc4214ab480)} | |
I0425 11:11:59.013385 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/admin.crt and key at openshift.local.config/master/admin.key | |
I0425 11:11:59.013791 27972 create_kubeconfig.go:143] creating a .kubeconfig with: admin.CreateKubeConfigOptions{APIServerURL:"https://10.0.2.15:8443", PublicAPIServerURL:"https://localhost:8443", APIServerCAFiles:[]string{"openshift.local.config/master/ca.crt"}, CertFile:"openshift.local.config/master/admin.crt", KeyFile:"openshift.local.config/master/admin.key", ContextNamespace:"default", KubeConfigFile:"openshift.local.config/master/admin.kubeconfig", Output:(*util.gLogWriter)(0xc4213f731c)} | |
I0425 11:11:59.015829 27972 create_kubeconfig.go:217] Generating 'system:admin/10-0-2-15:8443' API client config as openshift.local.config/master/admin.kubeconfig | |
W0425 11:11:59.054743 27972 start_master.go:291] Warning: assetConfig.loggingPublicURL: Invalid value: "": required to view aggregated container logs in the console, master start will continue. | |
W0425 11:11:59.054844 27972 start_master.go:291] Warning: assetConfig.metricsPublicURL: Invalid value: "": required to view cluster metrics in the console, master start will continue. | |
W0425 11:11:59.054856 27972 start_master.go:291] Warning: auditConfig.auditFilePath: Required value: audit can now be logged to a separate file, master start will continue. | |
I0425 11:11:59.067391 27972 storage_factory.go:241] storing {authorization.openshift.io clusterpolicies} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
I0425 11:11:59.070343 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
I0425 11:11:59.074343 27972 storage_factory.go:241] storing {authorization.openshift.io clusterpolicybindings} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
2017-04-25 11:11:59.075106 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.076569 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
I0425 11:11:59.076745 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
I0425 11:11:59.076989 27972 storage_factory.go:241] storing {authorization.openshift.io policies} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
I0425 11:11:59.077244 27972 reflector.go:234] Listing and watching *api.ClusterPolicy from pkg/storage/cacher.go:201 | |
I0425 11:11:59.079009 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
2017-04-25 11:11:59.079005 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.079077 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
I0425 11:11:59.079087 27972 reflector.go:234] Listing and watching *api.ClusterPolicyBinding from pkg/storage/cacher.go:201 | |
2017-04-25 11:11:59.079428 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.079634 27972 storage_factory.go:241] storing {authorization.openshift.io policybindings} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
I0425 11:11:59.079745 27972 reflector.go:234] Listing and watching *api.Policy from pkg/storage/cacher.go:201 | |
I0425 11:11:59.081393 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
I0425 11:11:59.081479 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
2017-04-25 11:11:59.081699 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.081844 27972 storage_factory.go:241] storing {user.openshift.io groups} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
I0425 11:11:59.082018 27972 reflector.go:234] Listing and watching *api.PolicyBinding from pkg/storage/cacher.go:201 | |
I0425 11:11:59.084082 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
I0425 11:11:59.084161 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
2017-04-25 11:11:59.084411 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.084757 27972 reflector.go:234] Listing and watching *api.Group from pkg/storage/cacher.go:201 | |
I0425 11:11:59.087882 27972 admission.go:107] Admission plugin ProjectRequestLimit is not enabled. It will not be started. | |
I0425 11:11:59.087911 27972 admission.go:107] Admission plugin openshift.io/RestrictSubjectBindings is not enabled. It will not be started. | |
I0425 11:11:59.087920 27972 admission.go:107] Admission plugin PodNodeConstraints is not enabled. It will not be started. | |
I0425 11:11:59.087997 27972 admission.go:107] Admission plugin RunOnceDuration is not enabled. It will not be started. | |
I0425 11:11:59.088006 27972 admission.go:107] Admission plugin PodNodeConstraints is not enabled. It will not be started. | |
I0425 11:11:59.088015 27972 admission.go:107] Admission plugin ClusterResourceOverride is not enabled. It will not be started. | |
I0425 11:11:59.089900 27972 admission.go:107] Admission plugin ImagePolicyWebhook is not enabled. It will not be started. | |
I0425 11:11:59.090217 27972 reflector.go:196] Starting reflector *api.ServiceAccount (0s) from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:103 | |
I0425 11:11:59.090321 27972 reflector.go:196] Starting reflector *api.Secret (0s) from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:119 | |
I0425 11:11:59.090359 27972 reflector.go:234] Listing and watching *api.ServiceAccount from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:103 | |
I0425 11:11:59.090485 27972 reflector.go:196] Starting reflector *storage.StorageClass (0s) from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/storageclass/default/admission.go:75 | |
I0425 11:11:59.090501 27972 admission.go:107] Admission plugin AlwaysPullImages is not enabled. It will not be started. | |
I0425 11:11:59.090507 27972 admission.go:107] Admission plugin LimitPodHardAntiAffinityTopology is not enabled. It will not be started. | |
I0425 11:11:59.092116 27972 storage_factory.go:241] storing { serviceaccounts} in v1, reading as __internal from {etcd3 kubernetes.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
E0425 11:11:59.093747 27972 reflector.go:199] github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:103: Failed to list *api.ServiceAccount: Get https://10.0.2.15:8443/api/v1/serviceaccounts?resourceVersion=0: dial tcp 10.0.2.15:8443: getsockopt: connection refused | |
I0425 11:11:59.093812 27972 reflector.go:234] Listing and watching *storage.StorageClass from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/storageclass/default/admission.go:75 | |
I0425 11:11:59.094199 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
I0425 11:11:59.094273 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
E0425 11:11:59.094506 27972 reflector.go:199] github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/storageclass/default/admission.go:75: Failed to list *storage.StorageClass: Get https://10.0.2.15:8443/apis/storage.k8s.io/v1beta1/storageclasses?resourceVersion=0: dial tcp 10.0.2.15:8443: getsockopt: connection refused | |
I0425 11:11:59.094561 27972 reflector.go:234] Listing and watching *api.Secret from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:119 | |
E0425 11:11:59.095377 27972 reflector.go:199] github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:119: Failed to list *api.Secret: Get https://10.0.2.15:8443/api/v1/secrets?fieldSelector=type%3Dkubernetes.io%2Fservice-account-token&resourceVersion=0: dial tcp 10.0.2.15:8443: getsockopt: connection refused | |
I0425 11:11:59.095437 27972 reflector.go:196] Starting reflector *api.ResourceQuota (0s) from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/resourcequota/resource_access.go:83 | |
I0425 11:11:59.095476 27972 reflector.go:234] Listing and watching *api.ResourceQuota from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/resourcequota/resource_access.go:83 | |
E0425 11:11:59.095936 27972 reflector.go:199] github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/resourcequota/resource_access.go:83: Failed to list *api.ResourceQuota: Get https://10.0.2.15:8443/api/v1/resourcequotas?resourceVersion=0: dial tcp 10.0.2.15:8443: getsockopt: connection refused | |
2017-04-25 11:11:59.096073 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.096690 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
I0425 11:11:59.096766 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
2017-04-25 11:11:59.097052 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.097514 27972 storage_factory.go:241] storing {oauth.openshift.io oauthaccesstokens} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
I0425 11:11:59.099501 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
I0425 11:11:59.099571 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
2017-04-25 11:11:59.099996 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.100016 27972 storage_factory.go:241] storing {user.openshift.io users} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
I0425 11:11:59.100269 27972 reflector.go:234] Listing and watching *api.OAuthAccessToken from pkg/storage/cacher.go:201 | |
I0425 11:11:59.102111 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
I0425 11:11:59.102203 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
2017-04-25 11:11:59.102455 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.102762 27972 reflector.go:234] Listing and watching *api.User from pkg/storage/cacher.go:201 | |
I0425 11:11:59.103238 27972 plugins.go:94] No cloud provider specified. | |
I0425 11:11:59.108335 27972 services.go:51] Setting service IP to "172.30.0.1" (read-write). | |
I0425 11:11:59.108533 27972 master_config.go:386] Using the lease endpoint reconciler | |
I0425 11:11:59.108566 27972 storage_factory.go:241] storing { apiServerIPInfo} in v1, reading as __internal from {etcd3 kubernetes.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
I0425 11:11:59.110682 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
2017-04-25 11:11:59.111216 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.111319 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
I0425 11:11:59.111359 27972 storage_factory.go:241] storing { endpoints} in v1, reading as __internal from {etcd3 kubernetes.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>} | |
I0425 11:11:59.113573 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated | |
I0425 11:11:59.114006 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001] | |
2017-04-25 11:11:59.114133 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>} | |
I0425 11:11:59.114250 27972 start_master.go:417] Starting master on 0.0.0.0:8443 (v3.6.0-alpha.1+decce00-130-dirty) | |
I0425 11:11:59.114262 27972 start_master.go:418] Public master address is https://localhost:8443 | |
I0425 11:11:59.114330 27972 start_master.go:422] Using images from "openshift/origin-<component>:v3.6.0-alpha.1" | |
I0425 11:11:59.114330 27972 start_master.go:422] Using images from "openshift/origin-<component>:v3.6.0-alpha.1" | |
2017-04-25 11:11:59.114831 I | embed: peerTLS: cert = openshift.local.config/master/etcd.server.crt, key = openshift.local.config/master/etcd.server.key, ca = openshift.local.config/master/ca.crt, trusted-ca = , client-cert-auth = true | |
2017-04-25 11:11:59.118207 I | embed: listening for peers on https://0.0.0.0:7001 | |
2017-04-25 11:11:59.118402 I | embed: listening for client requests on 0.0.0.0:4001 | |
2017-04-25 11:11:59.121915 C | mvcc/backend: cannot open database at openshift.local.etcd/member/snap/db (invalid argument) | |
panic: cannot open database at openshift.local.etcd/member/snap/db (invalid argument) | |
goroutine 262 [running]: | |
panic(0x3a606e0, 0xc4215f0bf0) | |
/opt/go1.7/src/runtime/panic.go:500 +0x1a1 | |
github.com/openshift/origin/vendor/github.com/coreos/pkg/capnslog.(*PackageLogger).Panicf(0xc420194a00, 0x43f1a9f, 0x1f, 0xc42001ff08, 0x2, 0x2) | |
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/pkg/capnslog/pkg_logger.go:75 +0x16a | |
github.com/openshift/origin/vendor/github.com/coreos/etcd/mvcc/backend.newBackend(0xc4215990e0, 0x23, 0x5f5e100, 0x2710, 0x0) | |
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/etcd/mvcc/backend/backend.go:106 +0x341 | |
github.com/openshift/origin/vendor/github.com/coreos/etcd/mvcc/backend.NewDefaultBackend(0xc4215990e0, 0x23, 0x0, 0x0) | |
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/etcd/mvcc/backend/backend.go:100 +0x4d | |
github.com/openshift/origin/vendor/github.com/coreos/etcd/etcdserver.NewServer.func1(0xc4215f0b50, 0xc4215990e0, 0x23, 0xc4215a25a0) | |
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/etcd/etcdserver/server.go:272 +0x39 | |
created by github.com/openshift/origin/vendor/github.com/coreos/etcd/etcdserver.NewServer | |
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/etcd/etcdserver/server.go:274 +0x345 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment