>>> kops: Building testing/kops 1.28.4-r6 (using abuild 3.14.1-r5) started Sat, 18 Jan 2025 08:53:17 +0000 >>> kops: Validating /home/buildozer/aports/testing/kops/APKBUILD... >>> kops: Analyzing dependencies... >>> kops: Installing for build: build-base kubernetes go bash (1/4) Installing kubernetes (1.32.0-r1) (2/4) Installing go (1.23.5-r0) (3/4) Installing bash (5.2.37-r0) Executing bash-5.2.37-r0.post-install (4/4) Installing .makedepends-kops (20250118.085318) Executing busybox-1.37.0-r13.trigger OK: 583 MiB in 110 packages >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Cleaning up tmpdir >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 >>> kops: Fetching kops-1.28.4.tar.gz::https://github.com/kubernetes/kops/archive/v1.28.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 12953 0 12953 0 0 26837 0 --:--:-- --:--:-- --:--:-- 26837 100 10.9M 0 10.9M 0 0 8170k 0 --:--:-- 0:00:01 --:--:-- 12.2M 100 17.1M 0 17.1M 0 0 7363k 0 --:--:-- 0:00:02 --:--:-- 9227k 100 23.8M 0 23.8M 0 0 7203k 0 --:--:-- 0:00:03 --:--:-- 8391k 100 29.4M 0 29.4M 0 0 6884k 0 --:--:-- 0:00:04 --:--:-- 7733k 100 32.7M 0 32.7M 0 0 6712k 0 --:--:-- 0:00:04 --:--:-- 7428k >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz >>> kops: Checking sha512sums... kops-1.28.4.tar.gz: OK >>> kops: Unpacking /var/cache/distfiles/edge/kops-1.28.4.tar.gz... fatal: not a git repository (or any of the parent directories): .git mkdir -p /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64 GOOS=linux GOARCH=amd64 go build "-trimpath" -o /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64/kops -ldflags=all=" -X k8s.io/kops.Version=1.28.4 -X k8s.io/kops.GitVersion=" k8s.io/kops/cmd/kops go: downloading k8s.io/apimachinery v0.28.1 go: downloading k8s.io/client-go v0.28.1 go: downloading k8s.io/cli-runtime v0.28.1 go: downloading k8s.io/klog/v2 v2.100.1 go: downloading github.com/aws/aws-sdk-go v1.49.24 go: downloading github.com/aws/amazon-ec2-instance-selector/v2 v2.4.1 go: downloading github.com/google/go-containerregistry v0.16.1 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading golang.org/x/crypto v0.14.0 go: downloading k8s.io/kubectl v0.28.1 go: downloading k8s.io/api v0.28.1 go: downloading sigs.k8s.io/yaml v1.3.0 go: downloading github.com/spf13/pflag v1.0.5 go: downloading helm.sh/helm/v3 v3.12.3 go: downloading github.com/spf13/cobra v1.7.0 go: downloading go.uber.org/multierr v1.11.0 go: downloading github.com/spf13/viper v1.16.0 go: downloading github.com/cert-manager/cert-manager v1.12.3 go: downloading github.com/MakeNowJust/heredoc/v2 v2.0.1 go: downloading github.com/Masterminds/sprig/v3 v3.2.3 go: downloading github.com/scaleway/scaleway-sdk-go v1.0.0-beta.20.0.20230829075301-d16b548612e4 go: downloading k8s.io/klog v1.0.0 go: downloading github.com/MakeNowJust/heredoc v1.0.0 go: downloading github.com/apparentlymart/go-cidr v1.1.0 go: downloading golang.org/x/sync v0.3.0 go: downloading k8s.io/cloud-provider-aws v1.28.1 go: downloading google.golang.org/api v0.138.0 go: downloading golang.org/x/net v0.17.0 go: downloading github.com/sergi/go-diff v1.3.1 go: downloading github.com/Azure/azure-pipeline-go v0.2.3 go: downloading github.com/Azure/azure-storage-blob-go v0.15.0 go: downloading github.com/go-ini/ini v1.67.0 go: downloading github.com/gophercloud/gophercloud v1.6.0 go: downloading github.com/pkg/sftp v1.13.6 go: downloading golang.org/x/oauth2 v0.11.0 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/Masterminds/goutils v1.1.1 go: downloading github.com/Masterminds/semver/v3 v3.2.1 go: downloading github.com/google/uuid v1.3.1 go: downloading github.com/huandu/xstrings v1.4.0 go: downloading github.com/imdario/mergo v0.3.15 go: downloading github.com/shopspring/decimal v1.3.1 go: downloading github.com/mitchellh/copystructure v1.2.0 go: downloading github.com/spf13/cast v1.5.1 go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/fsnotify/fsnotify v1.6.0 go: downloading github.com/mitchellh/mapstructure v1.5.0 go: downloading github.com/spf13/afero v1.9.5 go: downloading github.com/spf13/jwalterweatherman v1.1.0 go: downloading github.com/go-logr/logr v1.2.4 go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/evanphx/json-patch v5.6.0+incompatible go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.3.0 go: downloading github.com/google/gofuzz v1.2.0 go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/docker/cli v24.0.5+incompatible go: downloading github.com/digitalocean/godo v1.102.1 go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible go: downloading github.com/hetznercloud/hcloud-go v1.50.0 go: downloading github.com/Azure/go-autorest/autorest v0.11.29 go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.12 go: downloading k8s.io/mount-utils v0.28.1 go: downloading google.golang.org/grpc v1.57.0 go: downloading github.com/Azure/go-autorest v14.2.0+incompatible go: downloading github.com/spotinst/spotinst-sdk-go v1.145.0 go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading github.com/pkg/errors v0.9.1 go: downloading github.com/chai2010/gettext-go v1.0.2 go: downloading github.com/mitchellh/go-wordwrap v1.0.1 go: downloading github.com/russross/blackfriday/v2 v2.1.0 go: downloading github.com/pelletier/go-toml v1.9.5 go: downloading gopkg.in/gcfg.v1 v1.2.3 go: downloading k8s.io/cloud-provider v0.28.0 go: downloading k8s.io/component-base v0.28.1 go: downloading k8s.io/csi-translation-lib v0.28.0 go: downloading github.com/mattn/go-ieproxy v0.0.1 go: downloading golang.org/x/sys v0.13.0 go: downloading golang.org/x/term v0.13.0 go: downloading github.com/golang/protobuf v1.5.3 go: downloading github.com/google/gnostic-models v0.6.8 go: downloading golang.org/x/time v0.3.0 go: downloading golang.org/x/exp v0.0.0-20230817173708-d852ddb80c63 go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 go: downloading gopkg.in/square/go-jose.v2 v2.6.0 go: downloading github.com/mitchellh/reflectwalk v1.0.2 go: downloading github.com/kr/fs v0.1.0 go: downloading github.com/subosito/gotenv v1.4.2 go: downloading github.com/hashicorp/hcl v1.0.0 go: downloading gopkg.in/ini.v1 v1.67.0 go: downloading github.com/magiconair/properties v1.8.7 go: downloading github.com/pelletier/go-toml/v2 v2.0.8 go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible go: downloading github.com/charmbracelet/bubbles v0.13.0 go: downloading github.com/charmbracelet/bubbletea v0.21.0 go: downloading github.com/charmbracelet/lipgloss v0.5.0 go: downloading github.com/evertras/bubble-table v0.14.4 go: downloading github.com/muesli/termenv v0.11.1-0.20220212125758-44cd13922739 go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de go: downloading golang.org/x/text v0.13.0 go: downloading sigs.k8s.io/kustomize/api v0.13.5-0.20230601165947-6ce0bf390ce3 go: downloading sigs.k8s.io/kustomize/kyaml v0.14.3-0.20230601165947-6ce0bf390ce3 go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading github.com/docker/distribution v2.8.2+incompatible go: downloading github.com/containerd/stargz-snapshotter/estargz v0.14.3 go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/google/go-querystring v1.1.0 go: downloading github.com/hashicorp/go-retryablehttp v0.7.4 go: downloading github.com/prometheus/client_golang v1.16.0 go: downloading github.com/docker/docker v24.0.5+incompatible go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading cloud.google.com/go/compute/metadata v0.2.3 go: downloading k8s.io/cloud-provider-gcp/providers v0.27.1 go: downloading cloud.google.com/go/compute v1.23.0 go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.22 go: downloading github.com/Azure/go-autorest/logger v0.2.1 go: downloading github.com/Azure/go-autorest/tracing v0.6.0 go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.5 go: downloading github.com/dimchansky/utfbom v1.1.1 go: downloading github.com/moby/sys/mountinfo v0.6.2 go: downloading google.golang.org/protobuf v1.31.0 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20230807174057-1744710a1577 go: downloading github.com/moby/term v0.0.0-20221205130635-1aeaba878587 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading k8s.io/component-helpers v0.28.1 go: downloading github.com/prometheus/client_model v0.4.0 go: downloading github.com/prometheus/procfs v0.10.1 go: downloading k8s.io/apiextensions-apiserver v0.28.0 go: downloading sigs.k8s.io/gateway-api v0.7.0 go: downloading github.com/oliveagle/jsonpath v0.0.0-20180606110733-2e52cf6e6852 go: downloading github.com/muesli/reflow v0.3.0 go: downloading github.com/sahilm/fuzzy v0.1.0 go: downloading github.com/atotto/clipboard v0.1.4 go: downloading github.com/mattn/go-runewidth v0.0.13 go: downloading github.com/lucasb-eyer/go-colorful v1.2.0 go: downloading github.com/containerd/console v1.0.3 go: downloading github.com/mattn/go-isatty v0.0.17 go: downloading github.com/muesli/ansi v0.0.0-20211018074035-2e021307bc4b go: downloading github.com/muesli/cancelreader v0.2.0 go: downloading github.com/go-openapi/swag v0.22.3 go: downloading github.com/go-openapi/jsonreference v0.20.2 go: downloading github.com/google/go-cmp v0.5.9 go: downloading github.com/google/btree v1.0.1 go: downloading github.com/opencontainers/image-spec v1.1.0-rc4 go: downloading github.com/klauspost/compress v1.16.5 go: downloading github.com/vbatts/tar-split v0.11.3 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 go: downloading github.com/docker/docker-credential-helpers v0.8.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.2.0 go: downloading github.com/prometheus/common v0.44.0 go: downloading github.com/GoogleCloudPlatform/k8s-cloud-provider v1.18.1-0.20220218231025-f11817397a1b go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading github.com/containerd/containerd v1.7.5 go: downloading oras.land/oras-go v1.2.4-0.20230829103011-4d0bf161925b go: downloading github.com/exponent-io/jsonpath v0.0.0-20151013193312-d6023ce2651d go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/rivo/uniseg v0.2.0 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading github.com/go-errors/errors v1.4.2 go: downloading github.com/go-openapi/jsonpointer v0.19.6 go: downloading github.com/googleapis/gax-go/v2 v2.12.0 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 go: downloading github.com/emicklei/go-restful/v3 v3.10.2 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 go: downloading github.com/xlab/treeprint v1.2.0 go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading github.com/google/s2a-go v0.1.5 go: downloading go.opencensus.io v0.24.0 go: downloading github.com/moby/spdystream v0.2.0 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/docker/go-units v0.5.0 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.2.5 go: downloading github.com/morikuni/aec v1.0.0 go: downloading go.starlark.net v0.0.0-20230525235612-a134d8f9ddca go: downloading github.com/jmespath/go-jmespath v0.4.0 go: downloading github.com/gorilla/mux v1.8.0 go: downloading github.com/docker/go-metrics v0.0.1 go: downloading google.golang.org/appengine v1.6.7 go: downloading github.com/moby/locker v1.0.1 go: downloading go.opentelemetry.io/otel/trace v1.15.0 go: downloading go.opentelemetry.io/otel v1.15.0 go: downloading github.com/go-logr/stdr v1.2.2 go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.1 fatal: not a git repository (or any of the parent directories): .git go test -v ./... go: downloading sigs.k8s.io/controller-runtime v0.16.1 go: downloading k8s.io/kubelet v0.28.1 go: downloading github.com/stretchr/testify v1.8.4 go: downloading github.com/jacksontj/memberlistmesh v0.0.0-20190905163944-93462b9d2bb7 go: downloading github.com/weaveworks/mesh v0.0.0-20191105120815-58dbcc3e8e63 go: downloading github.com/google/go-tpm-tools v0.4.0 go: downloading github.com/google/go-tpm v0.9.0 go: downloading k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading github.com/hashicorp/go-sockaddr v1.0.2 go: downloading github.com/hashicorp/memberlist v0.3.1 go: downloading github.com/oklog/ulid v1.3.1 go: downloading golang.org/x/tools v0.12.1-0.20230815132531-74c255bcf846 go: downloading github.com/miekg/dns v1.1.50 go: downloading github.com/armon/go-metrics v0.4.0 go: downloading github.com/hashicorp/go-multierror v1.1.1 go: downloading github.com/hashicorp/go-msgpack v0.5.3 go: downloading github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529 go: downloading github.com/hashicorp/errwrap v1.1.0 go: downloading github.com/evanphx/json-patch/v5 v5.6.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading github.com/google/go-sev-guest v0.6.1 go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 go: downloading github.com/hashicorp/golang-lru v0.5.4 go: downloading github.com/pborman/uuid v1.2.0 go: downloading github.com/google/logger v1.1.1 go: downloading golang.org/x/mod v0.12.0 ? k8s.io/kops [no test files] ? k8s.io/kops/channels/cmd/channels [no test files] ? k8s.io/kops/channels/pkg/api [no test files] ? k8s.io/kops/cloudmock/aws/mockautoscaling [no test files] ? k8s.io/kops/cloudmock/aws/mockec2 [no test files] ? k8s.io/kops/cloudmock/aws/mockelb [no test files] ? k8s.io/kops/cloudmock/aws/mockelbv2 [no test files] ? k8s.io/kops/cloudmock/aws/mockeventbridge [no test files] ? k8s.io/kops/cloudmock/aws/mockiam [no test files] ? k8s.io/kops/cloudmock/aws/mockroute53 [no test files] ? k8s.io/kops/cloudmock/aws/mocksqs [no test files] ? k8s.io/kops/cloudmock/gce [no test files] ? k8s.io/kops/cloudmock/gce/gcphttp [no test files] ? k8s.io/kops/cloudmock/gce/mockcloudresourcemanager [no test files] ? k8s.io/kops/cloudmock/gce/mockcompute [no test files] ? k8s.io/kops/cloudmock/gce/mockdns [no test files] ? k8s.io/kops/cloudmock/gce/mockiam [no test files] ? k8s.io/kops/cloudmock/gce/mockstorage [no test files] ? k8s.io/kops/cloudmock/openstack [no test files] ? k8s.io/kops/cloudmock/openstack/mockblockstorage [no test files] ? k8s.io/kops/cloudmock/openstack/mockcompute [no test files] ? k8s.io/kops/cloudmock/openstack/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack/mockimage [no test files] ? k8s.io/kops/cloudmock/openstack/mockloadbalancer [no test files] ? k8s.io/kops/cloudmock/openstack/mocknetworking [no test files] ? k8s.io/kops/cloudmock/scaleway/mockdns [no test files] === RUN Test_Filtering --- PASS: Test_Filtering (0.00s) === RUN Test_Replacement --- PASS: Test_Replacement (0.00s) === RUN Test_GetRequiredUpdates --- PASS: Test_GetRequiredUpdates (0.00s) === RUN Test_NeedsRollingUpdate I0118 08:54:50.961470 41330 addon.go:250] addon test wants to update all nodes I0118 08:54:50.962644 41330 addon.go:250] addon test wants to update workers nodes I0118 08:54:50.962906 41330 addon.go:250] addon test wants to update control-plane nodes --- PASS: Test_NeedsRollingUpdate (0.00s) === RUN Test_InstallPKI I0118 08:54:50.963207 41330 addon.go:283] installing PKI for "test" I0118 08:54:51.161635 41330 addon.go:283] installing PKI for "test" --- PASS: Test_InstallPKI (0.49s) === RUN Test_IsPKIInstalled --- PASS: Test_IsPKIInstalled (0.00s) PASS ok k8s.io/kops/channels/pkg/channels 0.536s === RUN TestGetUpdates --- PASS: TestGetUpdates (0.00s) PASS ok k8s.io/kops/channels/pkg/cmd 0.039s ? k8s.io/kops/cmd/kops/util [no test files] ? k8s.io/kops/cmd/kops-controller [no test files] ? k8s.io/kops/cmd/nodeup [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/config [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/server [no test files] ? k8s.io/kops/cmd/kops-utils-cp [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53/stubs [no test files] ? k8s.io/kops/dns-controller/cmd/dns-controller [no test files] ? k8s.io/kops/cmd/kops-controller/controllers [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/interfaces [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/rrstype [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/tests [no test files] ? k8s.io/kops/examples/kops-api-example [no test files] ? k8s.io/kops/nodeup/pkg/model/networking [no test files] ? k8s.io/kops/pkg/acls [no test files] ? k8s.io/kops/pkg/acls/gce [no test files] ? k8s.io/kops/nodeup/pkg/model/resources [no test files] ? k8s.io/kops/pkg/apis/kops/registry [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/apis/nodeup [no test files] ? k8s.io/kops/pkg/applylib [no test files] ? k8s.io/kops/pkg/bootstrap [no test files] ? k8s.io/kops/pkg/applylib/mocks [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset [no test files] ? k8s.io/kops/pkg/applylib/mocks/mockkubeapiserver [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/scheme [no test files] ? k8s.io/kops/pkg/client/simple/api [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/simple [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/clouds [no test files] ? k8s.io/kops/pkg/clusteraddons [no test files] ? k8s.io/kops/pkg/commands/commandutils [no test files] ? k8s.io/kops/pkg/configserver [no test files] ? k8s.io/kops/pkg/dump [no test files] ? k8s.io/kops/pkg/kopscontrollerclient [no test files] ? k8s.io/kops/pkg/kubemanifest [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awscloudcontrollermanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsebscsidriver [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsloadbalancercontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/certmanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/clusterautoscaler [no test files] ? k8s.io/kops/pkg/model/domodel [no test files] ? k8s.io/kops/pkg/model/gcemodel [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/externaldns [no test files] ? k8s.io/kops/pkg/model/hetznermodel [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/nodeterminationhandler [no test files] ? k8s.io/kops/pkg/model/components/kopscontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/dnscontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/kuberouter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/karpenter [no test files] ? k8s.io/kops/pkg/model/scalewaymodel [no test files] ? k8s.io/kops/pkg/nodeidentity/do [no test files] ? k8s.io/kops/pkg/nodeidentity [no test files] ? k8s.io/kops/pkg/nodeidentity/aws [no test files] ? k8s.io/kops/pkg/nodeidentity/gce [no test files] ? k8s.io/kops/pkg/nodeidentity/scaleway [no test files] ? k8s.io/kops/pkg/nodeidentity/openstack [no test files] ? k8s.io/kops/pkg/mutexes [no test files] ? k8s.io/kops/pkg/nodeidentity/hetzner [no test files] ? k8s.io/kops/pkg/rbac [no test files] ? k8s.io/kops/pkg/resolver [no test files] ? k8s.io/kops/pkg/resources [no test files] ? k8s.io/kops/pkg/resources/digitalocean [no test files] ? k8s.io/kops/pkg/resources/scaleway [no test files] ? k8s.io/kops/pkg/sshcredentials [no test files] ? k8s.io/kops/pkg/resources/ops [no test files] ? k8s.io/kops/pkg/resources/openstack [no test files] ? k8s.io/kops/pkg/resources/spotinst [no test files] ? k8s.io/kops/pkg/resources/hetzner [no test files] ? k8s.io/kops/pkg/templates [no test files] ? k8s.io/kops/pkg/testutils [no test files] ? k8s.io/kops/pkg/testutils/golden [no test files] ? k8s.io/kops/pkg/testutils/testcontext [no test files] ? k8s.io/kops/pkg/tokens [no test files] ? k8s.io/kops/pkg/try [no test files] ? k8s.io/kops/pkg/values [no test files] ? k8s.io/kops/pkg/wellknownoperators [no test files] ? k8s.io/kops/pkg/wellknownports [no test files] ? k8s.io/kops/pkg/wellknownusers [no test files] ? k8s.io/kops/pkg/zones [no test files] ? k8s.io/kops/proto/kops/bootstrap/v1 [no test files] ? k8s.io/kops/protokube/cmd/protokube [no test files] ? k8s.io/kops/protokube/pkg/etcd [no test files] ? k8s.io/kops/protokube/pkg/gossip [no test files] ? k8s.io/kops/protokube/pkg/gossip/aws [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns/provider [no test files] ? k8s.io/kops/protokube/pkg/gossip/do [no test files] ? k8s.io/kops/protokube/pkg/gossip/hetzner [no test files] ? k8s.io/kops/protokube/pkg/gossip/memberlist [no test files] ? k8s.io/kops/protokube/pkg/gossip/openstack [no test files] ? k8s.io/kops/protokube/pkg/protokube [no test files] ? k8s.io/kops/protokube/pkg/gossip/mesh [no test files] ? k8s.io/kops/protokube/pkg/gossip/scaleway [no test files] ? k8s.io/kops/tests/fuzz [no test files] ? k8s.io/kops/tests/integration/channel/simple [no test files] ? k8s.io/kops/upup/models [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/bootstrapchannelbuilder [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetzner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/do [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcemetadata [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmsigner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmverifier [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcediscovery [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetznertasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/scalewaytasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/spotinsttasks [no test files] ? k8s.io/kops/upup/pkg/fi/loader [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/install [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/local [no test files] ? k8s.io/kops/upup/pkg/fi/secrets [no test files] ? k8s.io/kops/upup/tools/generators/fitask [no test files] ? k8s.io/kops/util/pkg/architectures [no test files] ? k8s.io/kops/util/pkg/env [no test files] ? k8s.io/kops/util/pkg/mirrors [no test files] ? k8s.io/kops/util/pkg/tables [no test files] ? k8s.io/kops/util/pkg/ui [no test files] === RUN TestCreateClusterMinimal I0118 08:54:54.240153 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:54.240415 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:54.240449 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:54.240480 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:54.240497 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:54.240538 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:54.240568 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:54.240578 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:54.240600 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:54.240619 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:54.244203 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.244278 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.268866 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:54.268992 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:54.269284 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:54.279412 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:54.279593 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:54.279618 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:54.279656 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:54.279678 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:54.279726 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:54.279754 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:54.279770 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:54.279792 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:54.279809 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:54.284927 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.284963 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.302015 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:54.302131 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:54.302359 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:54.306148 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:54.306308 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:54.306325 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:54.306346 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:54.306372 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:54.306394 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:54.306412 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:54.306423 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:54.306439 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:54.306450 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:54.608688 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.608729 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.630113 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:54.630257 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:54.630454 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:54.634043 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:54.634191 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:54.634207 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:54.634227 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:54.634241 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:54.634260 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:54.634277 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:54.634286 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:54.634300 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:54.634310 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:54.636430 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.636456 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.668337 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:54.668447 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:54.668692 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:54.674488 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:54.674652 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:54.674679 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:54.674700 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:54.674717 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:54.674737 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:54.674755 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:54.674765 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:54.674779 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:54.674790 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:54.677073 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.677102 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.711741 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:54.711824 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:54.711940 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:54.714925 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:54.715054 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:54.715070 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:54.715087 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:54.715101 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:54.715118 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:54.715133 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:54.715142 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:54.715156 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:54.715166 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:54.717327 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.717349 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.734557 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:54.734614 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:54.734735 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:54.737681 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:54.737761 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:54.737773 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:54.737784 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:54.737795 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:54.737813 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:54.737825 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:54.737833 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:54.737843 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:54.737850 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:54.967625 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.967676 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:54.996351 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:54.996484 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:54.996744 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterMinimal (0.76s) === RUN TestCreateClusterHetzner I0118 08:54:55.003647 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.003833 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.003853 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.003875 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.003890 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.003914 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.003932 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.003942 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.003955 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.003967 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.006575 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.006603 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0118 08:54:55.037360 42731 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0118 08:54:55.037397 42731 new_cluster.go:1373] Cloud Provider ID: "hetzner" I0118 08:54:55.041523 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.041677 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.041695 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.041715 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.041729 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.041754 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.041772 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.041781 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.041795 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.041806 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.044137 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.044164 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.063293 42731 new_cluster.go:1373] Cloud Provider ID: "hetzner" --- PASS: TestCreateClusterHetzner (0.06s) === RUN TestCreateClusterOpenStack I0118 08:54:55.066543 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.066723 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.066741 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.066759 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.066773 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.066802 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.066817 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.066826 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.066838 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.066848 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.068880 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.068905 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0118 08:54:55.091962 42731 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0118 08:54:55.091993 42731 new_cluster.go:1373] Cloud Provider ID: "openstack" I0118 08:54:55.093310 42731 subnets.go:224] Assigned CIDR 10.0.0.0/16 to subnet us-test1 --- PASS: TestCreateClusterOpenStack (0.03s) === RUN TestCreateClusterOpenStackOctavia I0118 08:54:55.101236 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.101343 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.101356 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.101373 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.101385 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.101401 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.101412 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.101421 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.101433 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.101441 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.104123 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.104148 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0118 08:54:55.130366 42731 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0118 08:54:55.130395 42731 new_cluster.go:1373] Cloud Provider ID: "openstack" I0118 08:54:55.132322 42731 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0118 08:54:55.132357 42731 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackOctavia (0.04s) === RUN TestCreateClusterOpenStackNoDNS I0118 08:54:55.143789 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.144082 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.144115 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.144155 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.144187 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.144226 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.144258 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.144283 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.144314 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.144335 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.147512 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.147534 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0118 08:54:55.193858 42731 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0118 08:54:55.193877 42731 new_cluster.go:1373] Cloud Provider ID: "openstack" I0118 08:54:55.193901 42731 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0118 08:54:55.193910 42731 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackNoDNS (0.05s) === RUN TestCreateClusterCilium I0118 08:54:55.198310 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.198445 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.198458 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.198474 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.198486 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.198505 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.198520 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.198536 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.198551 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.198561 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.201467 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.201536 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.233492 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:55.233685 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:55.234011 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterCilium (0.04s) === RUN TestCreateClusterOverride I0118 08:54:55.240458 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.240706 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.240732 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.240764 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.240790 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.240819 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.240846 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.240862 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.240884 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.240904 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.244529 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.244596 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.293527 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:55.293833 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:55.294026 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterOverride (0.06s) === RUN TestCreateClusterKubernetesFeatureGates I0118 08:54:55.297476 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.297624 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.297641 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.297659 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.297674 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.297691 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.297707 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.297716 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.297729 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.297739 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.300014 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.300040 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.332292 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:55.332392 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:55.332571 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKubernetesFeatureGates (0.04s) === RUN TestCreateClusterComplex I0118 08:54:55.336629 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.336791 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.336808 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.336828 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.336843 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.336862 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.336879 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.336889 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.336902 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.336913 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.597234 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.597311 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.647165 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:55.647568 42731 subnets.go:224] Assigned CIDR 10.0.0.0/18 to subnet us-test-1a I0118 08:54:55.647587 42731 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1b I0118 08:54:55.647596 42731 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1c I0118 08:54:55.648033 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplex (0.32s) === RUN TestCreateClusterComplexPrivate I0118 08:54:55.659083 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.659321 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.659348 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.659381 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.659406 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.659435 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.659464 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.659479 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.659504 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.659522 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.663456 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.663501 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.722202 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:55.722505 42731 subnets.go:205] Assigned CIDR 10.0.0.0/21 to subnet utility-us-test-1a I0118 08:54:55.722517 42731 subnets.go:205] Assigned CIDR 10.0.8.0/21 to subnet utility-us-test-1a-1 I0118 08:54:55.722524 42731 subnets.go:205] Assigned CIDR 10.0.16.0/21 to subnet utility-us-test-1a-4 I0118 08:54:55.722529 42731 subnets.go:205] Assigned CIDR 10.0.24.0/21 to subnet utility-us-test-1b I0118 08:54:55.722535 42731 subnets.go:205] Assigned CIDR 10.0.32.0/21 to subnet utility-us-test-1b-2 I0118 08:54:55.722540 42731 subnets.go:205] Assigned CIDR 10.0.40.0/21 to subnet utility-us-test-1c I0118 08:54:55.722549 42731 subnets.go:205] Assigned CIDR 10.0.48.0/21 to subnet utility-us-test-1c-3 I0118 08:54:55.722557 42731 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1a I0118 08:54:55.722565 42731 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1b I0118 08:54:55.722573 42731 subnets.go:224] Assigned CIDR 10.0.192.0/18 to subnet us-test-1c I0118 08:54:55.722979 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplexPrivate (0.07s) === RUN TestCreateClusterHA I0118 08:54:55.731217 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.731427 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.731449 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.731474 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.731504 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.731528 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.731550 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.731562 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.731581 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.731596 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.735585 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.735644 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.816882 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:55.817297 42731 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0118 08:54:55.817312 42731 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0118 08:54:55.817318 42731 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0118 08:54:55.817727 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:55.827024 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.827305 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.827335 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.827369 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.827394 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.827423 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.827451 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.827467 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.827492 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.827512 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.831556 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.831609 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.910931 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:55.911269 42731 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0118 08:54:55.911279 42731 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0118 08:54:55.911285 42731 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0118 08:54:55.911593 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHA (0.19s) === RUN TestCreateClusterMinimalGCE I0118 08:54:55.918969 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.919188 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.919211 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.919236 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.919256 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.919282 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.919306 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.919319 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.919338 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.919353 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.922317 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.922350 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.940554 42731 new_cluster.go:1373] Cloud Provider ID: "gce" I0118 08:54:55.940665 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 I0118 08:54:55.945072 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:55.945277 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:55.945299 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:55.945322 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:55.945341 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:55.945366 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:55.945389 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:55.945401 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:55.945420 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:55.945434 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:55.948350 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:55.948377 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.006926 42731 new_cluster.go:1373] Cloud Provider ID: "gce" I0118 08:54:56.006990 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterMinimalGCE (0.09s) === RUN TestCreateClusterHAGCE I0118 08:54:56.011250 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.011437 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.011459 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.011481 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.011498 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.011520 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.011540 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.011550 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.011566 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.011579 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.015604 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.015682 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.095961 42731 new_cluster.go:1373] Cloud Provider ID: "gce" I0118 08:54:56.096073 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterHAGCE (0.09s) === RUN TestCreateClusterGCE I0118 08:54:56.104614 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.104907 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.104939 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.104972 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.104998 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.105031 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.105061 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.105079 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.105105 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.105125 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.109297 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.109340 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.168224 42731 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0118 08:54:56.168270 42731 new_cluster.go:1373] Cloud Provider ID: "gce" I0118 08:54:56.168329 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterGCE (0.07s) === RUN TestCreateClusterHASharedZone I0118 08:54:56.175773 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.175998 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.176022 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.176048 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.176071 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.176097 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.176121 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.176136 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.176156 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.176173 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.179155 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.179207 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0118 08:54:56.269148 42731 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0118 08:54:56.269178 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.269337 42731 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0118 08:54:56.269565 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZone (0.10s) === RUN TestCreateClusterHASharedZones I0118 08:54:56.274147 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.274315 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.274333 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.274351 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.274367 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.274387 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.274404 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.274412 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.274427 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.274437 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.277384 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.277422 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0118 08:54:56.307987 42731 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0118 08:54:56.308020 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.308333 42731 subnets.go:224] Assigned CIDR 172.20.0.0/17 to subnet us-test-1a I0118 08:54:56.308347 42731 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1b I0118 08:54:56.308556 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZones (0.04s) === RUN TestCreateClusterPrivate I0118 08:54:56.316717 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.316862 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.316881 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.316901 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.316919 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.316940 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.316959 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.316972 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.316988 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.317000 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.320179 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.320228 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.345973 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.346207 42731 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0118 08:54:56.346223 42731 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0118 08:54:56.346518 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:56.346563 42731 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterPrivate (0.04s) === RUN TestCreateClusterPrivateGCE I0118 08:54:56.357426 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.357656 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.357687 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.357720 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.357749 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.357785 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.357813 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.357835 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.357862 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.357881 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.361934 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.361991 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.404002 42731 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0118 08:54:56.404080 42731 new_cluster.go:1373] Cloud Provider ID: "gce" I0118 08:54:56.404186 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterPrivateGCE (0.09s) === RUN TestCreateClusterWithNGWSpecified I0118 08:54:56.450306 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.450529 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.450558 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.450585 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.450610 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.450641 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.450667 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.450685 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.450707 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.450723 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.454816 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.454878 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.502432 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.502659 42731 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0118 08:54:56.502676 42731 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0118 08:54:56.502974 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:56.503006 42731 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithNGWSpecified (0.06s) === RUN TestCreateClusterWithINGWSpecified I0118 08:54:56.509148 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.509357 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.509383 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.509409 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.509432 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.509457 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.509484 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.509499 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.509521 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.509537 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.514148 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.514219 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.548126 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.548412 42731 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0118 08:54:56.548439 42731 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0118 08:54:56.548806 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:56.548849 42731 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithINGWSpecified (0.05s) === RUN TestCreateClusterSharedVPC I0118 08:54:56.558329 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.558571 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.558605 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.558637 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.558668 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.558706 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.558735 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.558758 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.558785 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.558806 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.563657 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.563713 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.618009 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.618133 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.618173 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.618205 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.618217 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.618243 42731 subnets.go:224] Assigned CIDR 10.0.0.0/12 to subnet us-test-1a I0118 08:54:56.618412 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedVPC (0.07s) === RUN TestCreateClusterSharedSubnets I0118 08:54:56.628134 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.628349 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.628379 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.628414 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.628442 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.628477 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.628504 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.628526 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.628555 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.628573 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.633506 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.633571 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.694019 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.694075 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.694177 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.694333 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.694351 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.694373 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.694391 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.694778 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnets (0.07s) === RUN TestCreateClusterSharedSubnetsVpcLookup I0118 08:54:56.701054 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.701340 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.701367 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.701406 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.701431 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.701459 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.701487 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.701507 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.701533 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.701552 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.715000 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.715084 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.742702 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:54:56.742755 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.742777 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.742871 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.743053 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.743076 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.743100 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.743116 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.743511 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnetsVpcLookup (0.05s) === RUN TestCreateClusterPrivateSharedSubnets I0118 08:54:56.749634 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.749935 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.749966 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.750004 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.750030 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.750062 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.750092 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.750111 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.750136 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.750157 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.753389 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.753438 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.780417 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.780457 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.780498 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.780508 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.780557 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.780666 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.780679 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.780693 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:54:56.780701 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:54:56.780951 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterPrivateSharedSubnets (0.04s) === RUN TestCreateClusterIPv6 I0118 08:54:56.784874 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.785048 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.785066 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.785085 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.785100 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.785120 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.785145 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.785155 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.785172 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.785185 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.787795 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.787843 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.811007 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.811141 42731 subnets.go:205] Assigned CIDR 172.20.0.0/21 to subnet utility-us-test-1a I0118 08:54:56.811151 42731 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet dualstack-us-test-1a I0118 08:54:56.811466 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterIPv6 (0.03s) === RUN TestCreateClusterDifferentAMIs I0118 08:54:56.819455 42731 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0118 08:54:56.819475 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.819760 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.819796 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.819836 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.819865 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.819901 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.819935 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.819957 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.819994 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.820017 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.824406 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.824474 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.865675 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.865738 42731 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0118 08:54:56.865751 42731 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0118 08:54:56.866005 42731 zones.go:93] ListHostedZonesPages { } I0118 08:54:56.871557 42731 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestCreateClusterDifferentAMIs (0.05s) === RUN TestCreateClusterKarpenter I0118 08:54:56.871617 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.871771 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.871790 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.871809 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.871832 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.871854 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.871874 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.871885 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.871901 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.871913 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.876157 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.876223 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0118 08:54:56.911949 42731 new_cluster.go:1373] Cloud Provider ID: "aws" I0118 08:54:56.912085 42731 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0118 08:54:56.912096 42731 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0118 08:54:56.912102 42731 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0118 08:54:56.912335 42731 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKarpenter (0.05s) === RUN TestParseCloudLabels --- PASS: TestParseCloudLabels (0.00s) === RUN TestConfirmation --- PASS: TestConfirmation (0.00s) === RUN TestEditInstanceGroup I0118 08:54:56.916914 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.917069 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.917087 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.917134 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.917151 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.917171 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.917189 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.917199 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.917215 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.917227 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.920935 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } --- PASS: TestEditInstanceGroup (0.00s) === RUN TestMinimal I0118 08:54:56.921797 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:56.921902 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:56.921917 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:56.921932 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:56.921946 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:56.921963 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:56.921976 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:56.921986 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:56.922000 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:56.922009 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:56.931504 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0118 08:54:56.932707 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:54:56.932745 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0118 08:55:02.315793 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:05.528703 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:55:05.532768 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:05.532800 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:05.532915 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:05.536332 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:55:05.540551 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:55:05.541173 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:05.541627 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:05.541889 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:05.542013 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:05.542106 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:55:05.542537 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:55:05.542969 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:55:05.547741 42731 target.go:111] Terraform output is in /tmp/test1248267155/out --- PASS: TestMinimal (8.63s) === RUN TestMinimal_v1_23 I0118 08:55:05.551370 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:05.551598 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:05.551627 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:05.551661 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:05.551687 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:05.551721 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:05.551747 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:05.551765 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:05.551790 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:05.551810 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:05.569957 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0118 08:55:05.572321 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:05.572383 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:07.654744 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:07.792528 42731 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0118 08:55:07.792856 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:07.792886 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:07.792962 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:07.798619 42731 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0118 08:55:07.803288 42731 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0118 08:55:07.803720 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:07.803900 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:07.804184 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:07.804395 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:07.804478 42731 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0118 08:55:07.804675 42731 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0118 08:55:07.804876 42731 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0118 08:55:07.810380 42731 target.go:111] Terraform output is in /tmp/test1638119284/out --- PASS: TestMinimal_v1_23 (2.26s) === RUN TestMinimal_v1_24 I0118 08:55:07.814436 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:07.814641 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:07.814673 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:07.814710 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:07.814743 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:07.814779 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:07.814808 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:07.814831 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:07.814858 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:07.814881 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:07.835303 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:55:07.837981 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:07.838067 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:09.873787 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:10.005482 42731 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0118 08:55:10.007248 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:10.007274 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:10.007328 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:10.008644 42731 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0118 08:55:10.011583 42731 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0118 08:55:10.011830 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:10.012644 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:10.013013 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:10.013601 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:10.013718 42731 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0118 08:55:10.014321 42731 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0118 08:55:10.015340 42731 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0118 08:55:10.019247 42731 target.go:111] Terraform output is in /tmp/test2110849785/out --- PASS: TestMinimal_v1_24 (2.21s) === RUN TestMinimal_v1_25 I0118 08:55:10.021801 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:10.021948 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:10.021972 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:10.021999 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:10.022017 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:10.022044 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:10.022066 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:10.022079 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:10.022105 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:10.022120 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:10.034461 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0118 08:55:10.036028 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:10.036072 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:12.175522 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:12.308295 42731 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0118 08:55:12.309017 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:12.309049 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:12.309128 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:12.310809 42731 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0118 08:55:12.313288 42731 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0118 08:55:12.313504 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:12.313671 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:12.313761 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:12.314069 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:12.314169 42731 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0118 08:55:12.314388 42731 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0118 08:55:12.314549 42731 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0118 08:55:12.318420 42731 target.go:111] Terraform output is in /tmp/test3494460284/out --- PASS: TestMinimal_v1_25 (2.30s) === RUN TestMinimal_v1_26 I0118 08:55:12.321589 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:12.321747 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:12.321772 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:12.321802 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:12.321826 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:12.321859 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:12.321884 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:12.321902 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:12.321925 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:12.321942 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:12.336478 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0118 08:55:12.337983 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:12.338026 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:14.043473 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:14.190389 42731 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0118 08:55:14.191077 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:14.191106 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:14.191179 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:14.193524 42731 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0118 08:55:14.198306 42731 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0118 08:55:14.198676 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:14.198810 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:14.199188 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:14.199247 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:14.199343 42731 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0118 08:55:14.199568 42731 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0118 08:55:14.199790 42731 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0118 08:55:14.205304 42731 target.go:111] Terraform output is in /tmp/test1515412543/out --- PASS: TestMinimal_v1_26 (1.89s) === RUN TestMinimal_v1_27 I0118 08:55:14.209677 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:14.209935 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:14.209971 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:14.210013 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:14.210046 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:14.210085 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:14.210120 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:14.210142 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:14.210174 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:14.210196 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:14.235564 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0118 08:55:14.238279 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:14.238356 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:17.009030 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:17.105681 42731 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0118 08:55:17.106972 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:17.106996 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:17.107067 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:17.108088 42731 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0118 08:55:17.111303 42731 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0118 08:55:17.111435 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:17.111591 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:17.111678 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:17.111909 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:17.111967 42731 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0118 08:55:17.112141 42731 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0118 08:55:17.112301 42731 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0118 08:55:17.117796 42731 target.go:111] Terraform output is in /tmp/test2544935031/out --- PASS: TestMinimal_v1_27 (2.91s) === RUN TestMinimal_NoneDNS I0118 08:55:17.120835 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:17.121072 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:17.121106 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:17.121145 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:17.121171 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:17.121203 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:17.121229 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:17.121245 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:17.121267 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:17.121284 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0118 08:55:17.141694 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:17.141797 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:18.516086 42731 executor.go:111] Tasks: 0 done / 110 total; 43 can run I0118 08:55:18.519399 42731 executor.go:111] Tasks: 43 done / 110 total; 24 can run I0118 08:55:18.521903 42731 executor.go:111] Tasks: 67 done / 110 total; 29 can run I0118 08:55:18.522479 42731 executor.go:111] Tasks: 96 done / 110 total; 2 can run I0118 08:55:18.522523 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:18.522569 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:18.522670 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:18.522757 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:18.527037 42731 executor.go:111] Tasks: 98 done / 110 total; 4 can run I0118 08:55:18.527189 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:18.527359 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:18.527721 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:18.527782 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:18.527848 42731 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0118 08:55:18.528104 42731 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0118 08:55:18.528342 42731 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0118 08:55:18.533866 42731 target.go:111] Terraform output is in /tmp/test1740228889/out --- PASS: TestMinimal_NoneDNS (1.42s) === RUN TestHetzner I0118 08:55:18.537957 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:55:20.464197 42731 executor.go:111] Tasks: 0 done / 46 total; 37 can run I0118 08:55:20.466737 42731 executor.go:111] Tasks: 37 done / 46 total; 3 can run I0118 08:55:20.466944 42731 executor.go:111] Tasks: 40 done / 46 total; 2 can run I0118 08:55:20.468955 42731 executor.go:111] Tasks: 42 done / 46 total; 4 can run I0118 08:55:20.469343 42731 executor.go:111] Tasks: 46 done / 46 total; 0 can run I0118 08:55:20.470792 42731 target.go:111] Terraform output is in /tmp/test1972947793/out --- PASS: TestHetzner (1.94s) === RUN TestNvidia I0118 08:55:20.474212 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:20.474362 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:20.474379 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:20.474401 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:20.474417 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:20.474434 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:20.474453 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:20.474461 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:20.474474 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:20.474485 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:20.482530 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:20.483649 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:20.483683 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:22.153585 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:22.252120 42731 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0118 08:55:22.253030 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:22.253048 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:22.253089 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:22.255911 42731 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0118 08:55:22.258300 42731 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0118 08:55:22.259098 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:22.259228 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:22.259536 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:22.259785 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:22.259873 42731 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0118 08:55:22.260085 42731 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0118 08:55:22.260310 42731 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0118 08:55:22.265643 42731 target.go:111] Terraform output is in /tmp/test2348987729/out --- PASS: TestNvidia (1.80s) === RUN TestMinimalGossip I0118 08:55:22.274096 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:22.274349 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:22.274383 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:22.274433 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:22.274511 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:22.274620 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:22.274698 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:22.274773 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:22.274857 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:22.274907 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:22.297541 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:22.297622 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:23.720512 42731 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0118 08:55:23.723142 42731 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0118 08:55:23.727789 42731 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0118 08:55:23.728193 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:23.728394 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:23.728600 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:23.728827 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:23.728925 42731 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0118 08:55:23.729170 42731 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0118 08:55:23.729385 42731 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0118 08:55:23.734740 42731 target.go:111] Terraform output is in /tmp/test1129966141/out --- PASS: TestMinimalGossip (1.47s) === RUN TestMinimalGossipIRSA I0118 08:55:23.742778 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:23.743106 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:23.743146 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:23.743189 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:23.743227 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:23.743279 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:23.743314 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:23.743336 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:23.743367 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:23.743390 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:23.767205 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:23.767271 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:25.180321 42731 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0118 08:55:25.186378 42731 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0118 08:55:25.190804 42731 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0118 08:55:25.190986 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:25.191187 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:25.191330 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:25.191553 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:25.191648 42731 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0118 08:55:25.191868 42731 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0118 08:55:25.192139 42731 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0118 08:55:25.198445 42731 target.go:111] Terraform output is in /tmp/test1943900132/out --- PASS: TestMinimalGossipIRSA (1.46s) === RUN TestMinimalGCE I0118 08:55:25.203509 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:25.205059 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:55:27.236380 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:55:27.236471 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:55:27.236594 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0118 08:55:27.236619 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0118 08:55:27.236639 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0118 08:55:27.236706 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0118 08:55:27.238047 42731 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0118 08:55:27.241656 42731 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0118 08:55:27.246273 42731 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0118 08:55:27.247341 42731 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0118 08:55:27.247661 42731 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0118 08:55:27.252290 42731 target.go:111] Terraform output is in /tmp/test130357090/out --- PASS: TestMinimalGCE (2.05s) === RUN TestMinimalGCEPrivate I0118 08:55:27.255744 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:27.257313 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:55:28.959671 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:55:28.959770 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:55:28.959880 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/main" W0118 08:55:28.959905 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/events" W0118 08:55:28.959924 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com" W0118 08:55:28.959982 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0118 08:55:28.961252 42731 executor.go:111] Tasks: 0 done / 65 total; 41 can run I0118 08:55:28.964859 42731 executor.go:111] Tasks: 41 done / 65 total; 17 can run I0118 08:55:28.969727 42731 executor.go:111] Tasks: 58 done / 65 total; 5 can run I0118 08:55:28.970644 42731 executor.go:111] Tasks: 63 done / 65 total; 2 can run I0118 08:55:28.970887 42731 executor.go:111] Tasks: 65 done / 65 total; 0 can run I0118 08:55:28.974785 42731 target.go:111] Terraform output is in /tmp/test1373503692/out --- PASS: TestMinimalGCEPrivate (1.72s) === RUN TestMinimalGCEInternalLoadBalancer I0118 08:55:28.978144 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:28.979887 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:55:30.602609 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:55:30.602671 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:55:30.602790 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/main" W0118 08:55:30.602809 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/events" W0118 08:55:30.602828 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com" W0118 08:55:30.602882 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0118 08:55:30.602919 42731 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0118 08:55:30.604356 42731 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0118 08:55:30.607654 42731 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0118 08:55:30.608101 42731 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0118 08:55:30.608396 42731 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0118 08:55:30.612594 42731 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0118 08:55:30.613440 42731 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0118 08:55:30.613675 42731 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0118 08:55:30.613917 42731 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0118 08:55:30.614150 42731 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0118 08:55:30.618241 42731 target.go:111] Terraform output is in /tmp/test1702672634/out --- PASS: TestMinimalGCEInternalLoadBalancer (1.64s) === RUN TestMinimalGCEPublicLoadBalancer I0118 08:55:30.621519 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:30.623194 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:55:32.239790 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:55:32.239843 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:55:32.239942 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/main" W0118 08:55:32.239958 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/events" W0118 08:55:32.239973 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com" W0118 08:55:32.240019 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0118 08:55:32.241161 42731 executor.go:111] Tasks: 0 done / 71 total; 43 can run I0118 08:55:32.244165 42731 executor.go:111] Tasks: 43 done / 71 total; 19 can run I0118 08:55:32.252916 42731 executor.go:111] Tasks: 62 done / 71 total; 7 can run I0118 08:55:32.254034 42731 executor.go:111] Tasks: 69 done / 71 total; 2 can run I0118 08:55:32.254334 42731 executor.go:111] Tasks: 71 done / 71 total; 0 can run I0118 08:55:32.258487 42731 target.go:111] Terraform output is in /tmp/test526523194/out --- PASS: TestMinimalGCEPublicLoadBalancer (1.64s) === RUN TestMinimalGCELongClusterName I0118 08:55:32.261979 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:32.263653 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:55:33.925785 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:55:33.925873 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:55:33.925971 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0118 08:55:33.925992 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0118 08:55:33.926010 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0118 08:55:33.926066 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0118 08:55:33.927114 42731 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0118 08:55:33.931363 42731 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0118 08:55:33.939810 42731 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0118 08:55:33.940681 42731 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0118 08:55:33.940866 42731 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0118 08:55:33.945105 42731 target.go:111] Terraform output is in /tmp/test1464142345/out --- PASS: TestMinimalGCELongClusterName (1.69s) === RUN TestMinimalGCEInternalLoadBalancerLongClusterName I0118 08:55:33.948518 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:33.950177 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:55:35.599741 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:55:35.599802 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:55:35.599919 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0118 08:55:35.599939 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0118 08:55:35.599957 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0118 08:55:35.600005 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0118 08:55:35.600041 42731 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0118 08:55:35.601084 42731 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0118 08:55:35.608014 42731 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0118 08:55:35.609228 42731 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0118 08:55:35.609418 42731 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0118 08:55:35.613988 42731 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0118 08:55:35.614959 42731 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0118 08:55:35.615109 42731 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0118 08:55:35.615243 42731 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0118 08:55:35.615377 42731 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0118 08:55:35.620347 42731 target.go:111] Terraform output is in /tmp/test3150762573/out --- PASS: TestMinimalGCEInternalLoadBalancerLongClusterName (1.68s) === RUN TestMinimalGCEDNSNone I0118 08:55:35.623773 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:35.625453 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:55:37.257137 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:55:37.257194 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:55:37.257296 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0118 08:55:37.257313 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0118 08:55:37.257329 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0118 08:55:37.257380 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0118 08:55:37.257412 42731 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0118 08:55:37.258680 42731 executor.go:111] Tasks: 0 done / 72 total; 41 can run I0118 08:55:37.261493 42731 executor.go:111] Tasks: 41 done / 72 total; 18 can run I0118 08:55:37.261952 42731 executor.go:111] Tasks: 59 done / 72 total; 2 can run I0118 08:55:37.262138 42731 executor.go:111] Tasks: 61 done / 72 total; 2 can run I0118 08:55:37.270953 42731 executor.go:111] Tasks: 63 done / 72 total; 4 can run I0118 08:55:37.271903 42731 executor.go:111] Tasks: 67 done / 72 total; 2 can run I0118 08:55:37.272109 42731 executor.go:111] Tasks: 69 done / 72 total; 1 can run I0118 08:55:37.272252 42731 executor.go:111] Tasks: 70 done / 72 total; 2 can run I0118 08:55:37.272420 42731 executor.go:111] Tasks: 72 done / 72 total; 0 can run I0118 08:55:37.278085 42731 target.go:111] Terraform output is in /tmp/test279590727/out --- PASS: TestMinimalGCEDNSNone (1.66s) === RUN TestMinimalScaleway I0118 08:55:37.280243 42731 featureflag.go:164] FeatureFlag "Scaleway"=true I0118 08:55:37.280253 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:55:39.127369 42731 executor.go:111] Tasks: 0 done / 49 total; 37 can run I0118 08:55:39.129991 42731 executor.go:111] Tasks: 37 done / 49 total; 6 can run I0118 08:55:39.136464 42731 executor.go:111] Tasks: 43 done / 49 total; 6 can run I0118 08:55:39.139479 42731 executor.go:111] Tasks: 49 done / 49 total; 0 can run I0118 08:55:39.142315 42731 target.go:111] Terraform output is in /tmp/test1586134167/out I0118 08:55:39.145963 42731 featureflag.go:164] FeatureFlag "Scaleway"=false --- PASS: TestMinimalScaleway (1.87s) === RUN TestHA I0118 08:55:39.146085 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:39.146330 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:39.146385 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:39.146430 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:39.146463 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:39.146504 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:39.146538 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:39.146560 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:39.146591 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:39.146614 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:39.173150 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:39.176509 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:39.176615 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:39.176691 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:39.176759 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:40.409454 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:40.566287 42731 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0118 08:55:40.570024 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:40.570066 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:40.570150 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:40.574586 42731 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0118 08:55:40.579441 42731 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0118 08:55:40.579819 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:40.580015 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:40.580247 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:40.580458 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:40.580656 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:40.580744 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:40.580791 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:40.580871 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:40.580971 42731 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0118 08:55:40.581322 42731 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0118 08:55:40.581694 42731 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0118 08:55:40.589232 42731 target.go:111] Terraform output is in /tmp/test1546707948/out --- PASS: TestHA (1.45s) === RUN TestHighAvailabilityGCE I0118 08:55:40.594872 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:40.596689 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:55:42.353776 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:55:42.353870 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:55:42.353979 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/main" W0118 08:55:42.354000 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/events" W0118 08:55:42.354019 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com" W0118 08:55:42.354079 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0118 08:55:42.354140 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0118 08:55:42.354190 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0118 08:55:42.355890 42731 executor.go:111] Tasks: 0 done / 82 total; 49 can run I0118 08:55:42.358285 42731 executor.go:111] Tasks: 49 done / 82 total; 19 can run I0118 08:55:42.363135 42731 executor.go:111] Tasks: 68 done / 82 total; 8 can run I0118 08:55:42.363943 42731 executor.go:111] Tasks: 76 done / 82 total; 6 can run I0118 08:55:42.364247 42731 executor.go:111] Tasks: 82 done / 82 total; 0 can run I0118 08:55:42.369026 42731 target.go:111] Terraform output is in /tmp/test1486211958/out --- PASS: TestHighAvailabilityGCE (1.78s) === RUN TestComplex I0118 08:55:42.373400 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:42.373667 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:42.373711 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:42.373816 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:42.373865 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:42.373912 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:42.373953 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:42.373984 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:42.374016 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:42.374054 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:42.407217 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:55:42.410792 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:42.410878 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:44.333767 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:44.502536 42731 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0118 08:55:44.503873 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:44.503921 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:44.504044 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:44.506156 42731 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0118 08:55:44.513008 42731 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0118 08:55:44.513991 42731 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0118 08:55:44.514152 42731 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0118 08:55:44.514194 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:44.514239 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:44.514399 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:44.514466 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:44.519397 42731 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0118 08:55:44.519561 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:44.519716 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:44.520159 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:44.520238 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:44.520341 42731 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0118 08:55:44.520628 42731 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0118 08:55:44.520889 42731 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0118 08:55:44.527949 42731 target.go:111] Terraform output is in /tmp/test608964103/out I0118 08:55:44.532628 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:44.532855 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:44.532892 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:44.532938 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:44.532976 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:44.533035 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:44.533077 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:44.533102 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:44.533136 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:44.533160 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:44.559821 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:55:44.562886 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:44.562953 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:45.833538 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:46.008065 42731 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0118 08:55:46.009868 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:46.009898 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:46.009974 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:46.011874 42731 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0118 08:55:46.014809 42731 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0118 08:55:46.015374 42731 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0118 08:55:46.015581 42731 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0118 08:55:46.015645 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:46.015707 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:46.015801 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:46.015871 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:46.020630 42731 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0118 08:55:46.020858 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:46.021078 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:46.021307 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:46.021806 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:46.021913 42731 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0118 08:55:46.022195 42731 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0118 08:55:46.022458 42731 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0118 08:55:46.029133 42731 target.go:111] Terraform output is in /tmp/test3424342604/out --- PASS: TestComplex (3.66s) === RUN TestCompress I0118 08:55:46.033705 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:46.033956 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:46.033998 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:46.034040 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:46.034074 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:46.034116 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:46.034151 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:46.034173 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:46.034202 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:46.034225 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:46.053542 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:46.057787 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:46.058030 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:47.358783 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:47.514476 42731 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0118 08:55:47.516013 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:47.516048 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:47.516167 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:47.518614 42731 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0118 08:55:47.523360 42731 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0118 08:55:47.523555 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:47.523858 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:47.525129 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:47.526061 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:47.526157 42731 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0118 08:55:47.526465 42731 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0118 08:55:47.526767 42731 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0118 08:55:47.532649 42731 target.go:111] Terraform output is in /tmp/test2139375529/out --- PASS: TestCompress (1.50s) === RUN TestExternalPolicies I0118 08:55:47.537069 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:47.537316 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:47.537355 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:47.537397 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:47.537431 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:47.537473 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:47.537508 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:47.537533 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:47.537564 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:47.537588 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:47.565340 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:47.569159 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:47.569238 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:48.855380 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:49.006892 42731 executor.go:111] Tasks: 0 done / 115 total; 47 can run I0118 08:55:49.007506 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:49.007545 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:49.007630 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:49.009705 42731 executor.go:111] Tasks: 47 done / 115 total; 22 can run I0118 08:55:49.012036 42731 executor.go:111] Tasks: 69 done / 115 total; 30 can run I0118 08:55:49.012807 42731 executor.go:111] Tasks: 99 done / 115 total; 4 can run W0118 08:55:49.012939 42731 api.go:53] PageSize not implemented W0118 08:55:49.013049 42731 api.go:53] PageSize not implemented I0118 08:55:49.017578 42731 executor.go:111] Tasks: 103 done / 115 total; 4 can run I0118 08:55:49.017741 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:49.017943 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:49.018750 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:49.018826 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:49.018892 42731 executor.go:111] Tasks: 107 done / 115 total; 2 can run I0118 08:55:49.019154 42731 executor.go:111] Tasks: 109 done / 115 total; 6 can run I0118 08:55:49.019404 42731 executor.go:111] Tasks: 115 done / 115 total; 0 can run I0118 08:55:49.026092 42731 target.go:111] Terraform output is in /tmp/test4278935659/out --- PASS: TestExternalPolicies (1.50s) === RUN TestMinimalIPv6 I0118 08:55:49.032667 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:49.033213 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:49.033606 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:49.034503 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:49.034571 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:49.034641 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:49.034701 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:49.034741 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:49.034794 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:49.034831 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:49.061237 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:55:49.064425 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:49.064506 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:50.323050 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:50.477459 42731 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0118 08:55:50.479863 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:50.479902 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:50.480018 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:50.482292 42731 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0118 08:55:50.484418 42731 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0118 08:55:50.485713 42731 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0118 08:55:50.486180 42731 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0118 08:55:50.486249 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:50.486308 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:50.486453 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:50.486533 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:50.492630 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:55:50.492811 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:50.493106 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:50.493514 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:50.495316 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:50.496133 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:55:50.496455 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:55:50.496929 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:55:50.503865 42731 target.go:111] Terraform output is in /tmp/test1014785455/out --- PASS: TestMinimalIPv6 (1.48s) === RUN TestMinimalIPv6Calico I0118 08:55:50.508831 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:50.509076 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:50.509114 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:50.509160 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:50.509193 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:50.509233 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:50.509304 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:50.509327 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:50.509358 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:50.509383 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:50.534190 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:55:50.537377 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:50.537445 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:51.791718 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:52.171909 42731 executor.go:111] Tasks: 0 done / 138 total; 47 can run I0118 08:55:52.172609 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:52.172648 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:52.172760 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:52.176964 42731 executor.go:111] Tasks: 47 done / 138 total; 25 can run I0118 08:55:52.181869 42731 executor.go:111] Tasks: 72 done / 138 total; 37 can run I0118 08:55:52.182571 42731 executor.go:111] Tasks: 109 done / 138 total; 9 can run I0118 08:55:52.182874 42731 executor.go:111] Tasks: 118 done / 138 total; 8 can run I0118 08:55:52.182955 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:52.183079 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:52.183187 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:52.183257 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:52.187644 42731 executor.go:111] Tasks: 126 done / 138 total; 4 can run I0118 08:55:52.187794 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:52.187991 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:52.188237 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:52.188591 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:52.188681 42731 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0118 08:55:52.188951 42731 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0118 08:55:52.189197 42731 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0118 08:55:52.196659 42731 target.go:111] Terraform output is in /tmp/test1008240925/out --- PASS: TestMinimalIPv6Calico (1.69s) === RUN TestMinimalIPv6Cilium I0118 08:55:52.202085 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:52.202325 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:52.202363 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:52.202409 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:52.202446 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:52.202490 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:52.202567 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:52.202592 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:52.202624 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:52.202649 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:52.227010 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:55:52.230244 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:52.230310 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:53.460931 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:53.656080 42731 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0118 08:55:53.656401 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:53.656436 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:53.656523 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:53.659185 42731 executor.go:111] Tasks: 47 done / 137 total; 25 can run I0118 08:55:53.661968 42731 executor.go:111] Tasks: 72 done / 137 total; 36 can run I0118 08:55:53.662734 42731 executor.go:111] Tasks: 108 done / 137 total; 9 can run I0118 08:55:53.663132 42731 executor.go:111] Tasks: 117 done / 137 total; 8 can run I0118 08:55:53.663237 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:53.663322 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:53.663432 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:53.663512 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:53.667974 42731 executor.go:111] Tasks: 125 done / 137 total; 4 can run I0118 08:55:53.668138 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:53.668354 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:53.668532 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:53.668956 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:53.669049 42731 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0118 08:55:53.669336 42731 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0118 08:55:53.669702 42731 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0118 08:55:53.681826 42731 target.go:111] Terraform output is in /tmp/test717024675/out --- PASS: TestMinimalIPv6Cilium (1.49s) === RUN TestMinimalIPv6NoSubnetPrefix I0118 08:55:53.687491 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:53.687739 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:53.687778 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:53.687824 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:53.687860 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:53.687904 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:53.687942 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:53.687967 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:53.688002 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:53.688028 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:53.712269 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:55:53.715894 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:53.715967 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:54.956108 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:55.111856 42731 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0118 08:55:55.114184 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:55.114214 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:55.114303 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:55.115380 42731 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0118 08:55:55.117471 42731 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0118 08:55:55.118269 42731 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0118 08:55:55.118650 42731 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0118 08:55:55.118950 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:55.119023 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:55.119131 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:55:55.119202 42731 loadbalancers.go:35] PageSize not implemented I0118 08:55:55.127807 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:55:55.128020 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:55.128247 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:55.128463 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:55.128912 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:55.129015 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:55:55.129376 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:55:55.129723 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:55:55.135593 42731 target.go:111] Terraform output is in /tmp/test606715154/out --- PASS: TestMinimalIPv6NoSubnetPrefix (1.45s) === RUN TestMinimalWarmPool I0118 08:55:55.139914 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:55.140128 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:55.140162 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:55.140201 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:55.140232 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:55.140269 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:55.140300 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:55.140320 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:55.140348 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:55.140369 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:55.157840 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:55.160353 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:55.160415 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:56.413596 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:56.593336 42731 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0118 08:55:56.593899 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:56.593930 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:56.594010 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:56.597250 42731 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0118 08:55:56.601938 42731 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0118 08:55:56.602327 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:56.602536 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:56.602964 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:56.603035 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:56.603149 42731 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0118 08:55:56.603425 42731 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0118 08:55:56.603700 42731 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0118 08:55:56.609746 42731 target.go:111] Terraform output is in /tmp/test431558498/out --- PASS: TestMinimalWarmPool (1.47s) === RUN TestMinimalEtcd I0118 08:55:56.614466 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:56.614714 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:56.614750 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:56.614793 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:56.614828 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:56.614874 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:56.614910 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:56.614933 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:56.614965 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:56.614989 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:56.636455 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:56.639141 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:56.639211 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:57.892020 42731 zones.go:93] ListHostedZonesPages { } W0118 08:55:58.026347 42731 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc W0118 08:55:58.026411 42731 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 10 W0118 08:55:58.028194 42731 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc I0118 08:55:58.036679 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:55:58.041366 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:58.041400 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:58.041477 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:58.044178 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:55:58.048953 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:55:58.049325 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:58.049441 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:58.050029 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:58.050239 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:58.050338 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:55:58.050583 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:55:58.050802 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:55:58.056810 42731 target.go:111] Terraform output is in /tmp/test3826478312/out --- PASS: TestMinimalEtcd (1.45s) === RUN TestMinimalGp3 I0118 08:55:58.061304 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:58.061559 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:58.061598 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:58.061656 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:58.061692 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:58.061734 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:58.061770 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:58.061794 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:58.061827 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:58.061853 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:58.082834 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:58.085656 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:58.085728 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:59.329759 42731 zones.go:93] ListHostedZonesPages { } I0118 08:55:59.488517 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:55:59.489310 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:55:59.489345 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:55:59.489430 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:55:59.491847 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:55:59.500571 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:55:59.502240 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:59.502488 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:59.502815 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:59.503206 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:59.503314 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:55:59.503695 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:55:59.504096 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:55:59.510341 42731 target.go:111] Terraform output is in /tmp/test2142187459/out --- PASS: TestMinimalGp3 (1.45s) === RUN TestMinimalLongClusterName I0118 08:55:59.514811 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:59.515060 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:59.515096 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:59.515138 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:59.515172 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:59.515214 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:59.515249 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:59.515273 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:59.515304 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:59.515329 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:59.535657 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:55:59.538327 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:55:59.538396 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0118 08:56:00.533206 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:00.680697 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:56:00.686561 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:00.686596 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:00.687194 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:00.689129 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:56:00.696159 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:56:00.696567 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:00.696812 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:00.697286 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:00.697368 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:00.697444 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:56:00.697715 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:56:00.697965 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:56:00.704115 42731 target.go:111] Terraform output is in /tmp/test2746617292/out --- PASS: TestMinimalLongClusterName (1.19s) === RUN TestExistingSG I0118 08:56:00.708890 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:00.709138 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:00.709184 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:00.709226 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:00.709261 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:00.709306 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:00.709344 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:00.709369 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:00.709401 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:00.709426 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:00.737416 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:00.740423 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:00.740488 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:00.740530 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:00.740571 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.017154 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:02.182448 42731 executor.go:111] Tasks: 0 done / 163 total; 53 can run I0118 08:56:02.187411 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:02.187456 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:02.187566 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:02.191856 42731 executor.go:111] Tasks: 53 done / 163 total; 26 can run I0118 08:56:02.194567 42731 executor.go:111] Tasks: 79 done / 163 total; 54 can run I0118 08:56:02.195653 42731 executor.go:111] Tasks: 133 done / 163 total; 6 can run W0118 08:56:02.195720 42731 api.go:53] PageSize not implemented W0118 08:56:02.195804 42731 api.go:53] PageSize not implemented W0118 08:56:02.195850 42731 api.go:53] PageSize not implemented W0118 08:56:02.195907 42731 api.go:53] PageSize not implemented I0118 08:56:02.200607 42731 executor.go:111] Tasks: 139 done / 163 total; 8 can run I0118 08:56:02.200809 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.200966 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.201168 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.201379 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.201567 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.201664 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.201717 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.201772 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.201861 42731 executor.go:111] Tasks: 147 done / 163 total; 4 can run I0118 08:56:02.202209 42731 executor.go:111] Tasks: 151 done / 163 total; 12 can run I0118 08:56:02.202537 42731 executor.go:111] Tasks: 163 done / 163 total; 0 can run I0118 08:56:02.211023 42731 target.go:111] Terraform output is in /tmp/test45847844/out --- PASS: TestExistingSG (1.51s) === RUN TestBastionAdditionalUserData I0118 08:56:02.216512 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:02.216760 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:02.216794 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:02.216833 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:02.216869 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:02.216910 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:02.216944 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:02.216966 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:02.216994 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:02.217016 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:02.246146 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:02.249073 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.249149 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:02.249195 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:03.484357 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:03.645655 42731 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0118 08:56:03.646153 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:03.646199 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:03.646318 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:03.648641 42731 executor.go:111] Tasks: 47 done / 137 total; 30 can run I0118 08:56:03.651325 42731 executor.go:111] Tasks: 77 done / 137 total; 35 can run I0118 08:56:03.651900 42731 executor.go:111] Tasks: 112 done / 137 total; 6 can run W0118 08:56:03.652000 42731 api.go:53] PageSize not implemented W0118 08:56:03.652102 42731 api.go:53] PageSize not implemented W0118 08:56:03.652221 42731 api.go:53] PageSize not implemented I0118 08:56:03.656332 42731 executor.go:111] Tasks: 118 done / 137 total; 7 can run I0118 08:56:03.656510 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:03.656697 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:03.656877 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:03.656960 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:03.657148 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:03.657557 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:03.657643 42731 executor.go:111] Tasks: 125 done / 137 total; 3 can run I0118 08:56:03.657992 42731 executor.go:111] Tasks: 128 done / 137 total; 9 can run I0118 08:56:03.658323 42731 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0118 08:56:03.665930 42731 target.go:111] Terraform output is in /tmp/test686575202/out --- PASS: TestBastionAdditionalUserData (1.45s) === RUN TestPrivateFlannel I0118 08:56:03.671126 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:03.671374 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:03.671413 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:03.671455 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:03.671487 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:03.671530 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:03.671605 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:03.671627 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:03.671658 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:03.671681 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:03.700526 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:56:03.703564 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:03.703649 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:03.703697 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:04.997619 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:05.170833 42731 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0118 08:56:05.173342 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:05.173377 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:05.173457 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:05.174100 42731 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0118 08:56:05.176318 42731 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0118 08:56:05.177770 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:05.178048 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:05.178553 42731 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0118 08:56:05.178721 42731 api.go:53] PageSize not implemented W0118 08:56:05.178912 42731 api.go:53] PageSize not implemented I0118 08:56:05.186855 42731 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0118 08:56:05.187132 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:05.187302 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:05.187526 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:05.187901 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:05.187994 42731 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0118 08:56:05.188296 42731 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0118 08:56:05.188578 42731 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0118 08:56:05.196024 42731 target.go:111] Terraform output is in /tmp/test20052168/out --- PASS: TestPrivateFlannel (1.53s) === RUN TestPrivateCalico I0118 08:56:05.201168 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:05.201410 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:05.201449 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:05.201493 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:05.201528 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:05.201568 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:05.201639 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:05.201666 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:05.201701 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:05.201725 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:05.225564 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:56:05.228691 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:05.228760 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:05.228808 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:06.513082 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:06.896152 42731 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0118 08:56:06.897033 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:06.897081 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:06.897208 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:06.899363 42731 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0118 08:56:06.902106 42731 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0118 08:56:06.902783 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:06.902926 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:06.903051 42731 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0118 08:56:06.903097 42731 api.go:53] PageSize not implemented W0118 08:56:06.903231 42731 api.go:53] PageSize not implemented I0118 08:56:06.907697 42731 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0118 08:56:06.907942 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:06.908158 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:06.908388 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:06.908760 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:06.908859 42731 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0118 08:56:06.909124 42731 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0118 08:56:06.909388 42731 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0118 08:56:06.917201 42731 target.go:111] Terraform output is in /tmp/test3883812468/out --- PASS: TestPrivateCalico (1.72s) === RUN TestPrivateCilium I0118 08:56:06.922834 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:06.923090 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:06.923130 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:06.923173 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:06.923205 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:06.923246 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:06.923279 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:06.923301 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:06.923333 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:06.923356 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:06.952323 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:06.955650 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:06.955727 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:06.955773 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:07.939248 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:08.115747 42731 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0118 08:56:08.124618 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:08.124655 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:08.124731 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:08.125558 42731 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0118 08:56:08.128091 42731 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0118 08:56:08.128277 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:08.128425 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:08.128753 42731 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0118 08:56:08.128888 42731 api.go:53] PageSize not implemented W0118 08:56:08.129002 42731 api.go:53] PageSize not implemented I0118 08:56:08.133535 42731 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0118 08:56:08.133867 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:08.134091 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:08.134535 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:08.134608 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:08.134702 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:56:08.134965 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:56:08.135276 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:56:08.142399 42731 target.go:111] Terraform output is in /tmp/test2282853064/out --- PASS: TestPrivateCilium (1.22s) === RUN TestPrivateCilium2 I0118 08:56:08.147783 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:08.148021 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:08.148058 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:08.148100 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:08.148139 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:08.148181 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:08.148254 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:08.148279 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:08.148312 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:08.148337 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:08.171971 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:56:08.174999 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:08.175066 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:08.175108 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:09.415932 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:09.966760 42731 executor.go:111] Tasks: 0 done / 138 total; 50 can run I0118 08:56:09.967534 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:09.967563 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:09.967639 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:09.974565 42731 executor.go:111] Tasks: 50 done / 138 total; 30 can run I0118 08:56:09.977159 42731 executor.go:111] Tasks: 80 done / 138 total; 36 can run I0118 08:56:09.977664 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:09.977774 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:09.977842 42731 executor.go:111] Tasks: 116 done / 138 total; 6 can run W0118 08:56:09.977907 42731 api.go:53] PageSize not implemented W0118 08:56:09.977949 42731 api.go:53] PageSize not implemented I0118 08:56:09.982393 42731 executor.go:111] Tasks: 122 done / 138 total; 8 can run I0118 08:56:09.982547 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:09.982755 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:09.983160 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:09.983233 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:09.983295 42731 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0118 08:56:09.983544 42731 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0118 08:56:09.983854 42731 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0118 08:56:09.991631 42731 target.go:111] Terraform output is in /tmp/test3475098562/out --- PASS: TestPrivateCilium2 (1.85s) === RUN TestPrivateCiliumAdvanced I0118 08:56:09.999231 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:09.999514 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:09.999554 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:09.999607 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:09.999646 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:09.999719 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:09.999774 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:09.999804 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:09.999836 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:09.999873 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:10.034225 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:10.038218 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:10.038300 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:10.038352 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:11.332829 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:11.537527 42731 executor.go:111] Tasks: 0 done / 142 total; 54 can run I0118 08:56:11.537990 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:11.538011 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:11.538076 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:11.544773 42731 executor.go:111] Tasks: 54 done / 142 total; 30 can run I0118 08:56:11.548914 42731 executor.go:111] Tasks: 84 done / 142 total; 36 can run I0118 08:56:11.549409 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:11.549544 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:11.549627 42731 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0118 08:56:11.549721 42731 api.go:53] PageSize not implemented W0118 08:56:11.549827 42731 api.go:53] PageSize not implemented I0118 08:56:11.554790 42731 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0118 08:56:11.554935 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:11.555123 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:11.555458 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:11.555579 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:11.555705 42731 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0118 08:56:11.556040 42731 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0118 08:56:11.556468 42731 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0118 08:56:11.564287 42731 target.go:111] Terraform output is in /tmp/test2471037975/out --- PASS: TestPrivateCiliumAdvanced (1.57s) === RUN TestPrivateCiliumENI I0118 08:56:11.569585 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:11.569847 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:11.569886 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:11.569928 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:11.569966 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:11.570011 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:11.570050 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:11.570074 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:11.570106 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:11.570130 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:11.592958 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:11.595664 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:11.595726 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:11.595766 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:12.845813 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:13.041249 42731 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0118 08:56:13.042048 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:13.042090 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:13.042174 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:13.043894 42731 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0118 08:56:13.046969 42731 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0118 08:56:13.047248 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:13.047403 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:13.048163 42731 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0118 08:56:13.048271 42731 api.go:53] PageSize not implemented W0118 08:56:13.048392 42731 api.go:53] PageSize not implemented I0118 08:56:13.052594 42731 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0118 08:56:13.052763 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:13.052985 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:13.053391 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:13.053470 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:13.053548 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:56:13.053795 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:56:13.054006 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:56:13.061374 42731 target.go:111] Terraform output is in /tmp/test2878351796/out --- PASS: TestPrivateCiliumENI (1.50s) === RUN TestPrivateCanal I0118 08:56:13.069273 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:13.069544 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:13.069582 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:13.069627 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:13.069664 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:13.069727 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:13.069806 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:13.069834 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:13.069867 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:13.069892 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:13.093791 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:56:13.096848 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:13.096919 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:13.096963 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:14.341348 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:14.699244 42731 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0118 08:56:14.705304 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:14.705336 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:14.705962 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:14.707984 42731 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0118 08:56:14.710767 42731 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0118 08:56:14.710973 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:14.711112 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:14.711512 42731 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0118 08:56:14.711590 42731 api.go:53] PageSize not implemented W0118 08:56:14.711691 42731 api.go:53] PageSize not implemented I0118 08:56:14.716581 42731 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0118 08:56:14.716738 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:14.716950 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:14.717137 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:14.717622 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:14.717713 42731 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0118 08:56:14.718004 42731 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0118 08:56:14.718254 42731 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0118 08:56:14.725650 42731 target.go:111] Terraform output is in /tmp/test2730561305/out --- PASS: TestPrivateCanal (1.66s) === RUN TestPrivateKopeio I0118 08:56:14.731073 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:14.731317 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:14.731355 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:14.731398 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:14.731435 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:14.731475 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:14.731507 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:14.731542 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:14.731572 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:14.731595 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:14.760704 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:14.764621 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:14.764764 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:14.764845 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:15.993511 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:16.161543 42731 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0118 08:56:16.162115 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:16.162157 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:16.162270 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:16.164608 42731 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0118 08:56:16.167607 42731 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0118 08:56:16.167965 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:16.168119 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:16.168393 42731 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0118 08:56:16.168527 42731 api.go:53] PageSize not implemented W0118 08:56:16.168653 42731 api.go:53] PageSize not implemented I0118 08:56:16.173051 42731 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0118 08:56:16.173320 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:16.173523 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:16.173718 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:16.174145 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:16.174241 42731 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0118 08:56:16.174510 42731 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0118 08:56:16.174768 42731 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0118 08:56:16.186196 42731 target.go:111] Terraform output is in /tmp/test1083846624/out --- PASS: TestPrivateKopeio (1.46s) === RUN TestUnmanaged I0118 08:56:16.191173 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:16.191451 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:16.191491 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:16.191535 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:16.191571 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:16.191615 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:16.191652 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:16.191676 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:16.191707 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:16.191732 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:16.217408 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:16.220495 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:16.220563 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:16.220609 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:17.439997 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:17.594144 42731 executor.go:111] Tasks: 0 done / 126 total; 46 can run I0118 08:56:17.594839 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:17.594870 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:17.594952 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:17.596855 42731 executor.go:111] Tasks: 46 done / 126 total; 27 can run I0118 08:56:17.599620 42731 executor.go:111] Tasks: 73 done / 126 total; 33 can run I0118 08:56:17.599976 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:17.600126 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:17.600285 42731 executor.go:111] Tasks: 106 done / 126 total; 5 can run W0118 08:56:17.600374 42731 api.go:53] PageSize not implemented W0118 08:56:17.600488 42731 api.go:53] PageSize not implemented I0118 08:56:17.609146 42731 executor.go:111] Tasks: 111 done / 126 total; 7 can run I0118 08:56:17.609330 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:17.609572 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:17.609978 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:17.610060 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:17.610124 42731 executor.go:111] Tasks: 118 done / 126 total; 2 can run I0118 08:56:17.610384 42731 executor.go:111] Tasks: 120 done / 126 total; 6 can run I0118 08:56:17.610622 42731 executor.go:111] Tasks: 126 done / 126 total; 0 can run I0118 08:56:17.618058 42731 target.go:111] Terraform output is in /tmp/test766902812/out --- PASS: TestUnmanaged (1.43s) === RUN TestPrivateSharedSubnet I0118 08:56:17.622786 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:17.623057 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:17.623096 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:17.623138 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:17.623172 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:17.623216 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:17.623251 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:17.623275 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:17.623308 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:17.623332 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:17.647096 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:17.649816 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:17.649882 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:17.649924 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:18.885391 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:19.035252 42731 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0118 08:56:19.037659 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:19.037691 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:19.037769 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:19.038520 42731 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0118 08:56:19.038994 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:56:19.045527 42731 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0118 08:56:19.045896 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:19.046060 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:19.047246 42731 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0118 08:56:19.047346 42731 api.go:53] PageSize not implemented W0118 08:56:19.047456 42731 api.go:53] PageSize not implemented I0118 08:56:19.052816 42731 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0118 08:56:19.053067 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:19.053281 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:19.053705 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:19.053803 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:19.053900 42731 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0118 08:56:19.054188 42731 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0118 08:56:19.054460 42731 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0118 08:56:19.061466 42731 target.go:111] Terraform output is in /tmp/test1994870825/out --- PASS: TestPrivateSharedSubnet (1.44s) === RUN TestPrivateSharedIP I0118 08:56:19.066343 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:19.066617 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:19.066655 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:19.066699 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:19.066732 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:19.066776 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:19.066810 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:19.066833 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:19.066863 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:19.066886 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:19.090294 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:19.093297 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:19.093369 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:19.093416 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:20.325291 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:20.472613 42731 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0118 08:56:20.473279 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:20.473332 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:20.473456 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:20.481083 42731 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0118 08:56:20.481437 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:56:20.484190 42731 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0118 08:56:20.484604 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:20.484755 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:20.484919 42731 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0118 08:56:20.484969 42731 api.go:53] PageSize not implemented W0118 08:56:20.485028 42731 api.go:53] PageSize not implemented I0118 08:56:20.489636 42731 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0118 08:56:20.489962 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:20.490233 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:20.490781 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:20.490922 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:20.491029 42731 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0118 08:56:20.491415 42731 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0118 08:56:20.491721 42731 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0118 08:56:20.498655 42731 target.go:111] Terraform output is in /tmp/test949210271/out --- PASS: TestPrivateSharedIP (1.44s) === RUN TestPrivateDns1 I0118 08:56:20.503475 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:20.503714 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:20.503753 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:20.503792 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:20.503825 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:20.503867 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:20.503904 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:20.503927 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:20.503957 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:20.503982 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0118 08:56:20.530340 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:20.530401 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:20.530439 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:22.006752 42731 executor.go:111] Tasks: 0 done / 135 total; 46 can run I0118 08:56:22.009840 42731 executor.go:111] Tasks: 46 done / 135 total; 28 can run I0118 08:56:22.010595 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "internal.example.com" I0118 08:56:22.010641 42731 zones.go:40] GetHostedZone { Id: "/hostedzone/Z2AFAKE1ZON3NO" } I0118 08:56:22.010746 42731 dnszone.go:248] Existing zone "internal.example.com." found; will configure TF to reuse I0118 08:56:22.010773 42731 dnszone.go:271] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding I0118 08:56:22.010982 42731 executor.go:111] Tasks: 74 done / 135 total; 39 can run I0118 08:56:22.011303 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:22.011470 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:22.018059 42731 executor.go:111] Tasks: 113 done / 135 total; 6 can run W0118 08:56:22.018136 42731 api.go:53] PageSize not implemented W0118 08:56:22.018215 42731 api.go:53] PageSize not implemented I0118 08:56:22.023706 42731 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0118 08:56:22.023988 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:22.024199 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:22.024421 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:22.024804 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:22.024904 42731 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0118 08:56:22.025264 42731 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0118 08:56:22.025627 42731 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0118 08:56:22.033012 42731 target.go:111] Terraform output is in /tmp/test25102955/out --- PASS: TestPrivateDns1 (1.53s) === RUN TestPrivateDns2 I0118 08:56:22.037820 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:22.038068 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:22.038105 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:22.038145 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:22.038179 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:22.038223 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:22.038258 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:22.038280 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:22.038311 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:22.038335 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:22.064396 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:22.064469 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:22.064517 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:23.443725 42731 executor.go:111] Tasks: 0 done / 132 total; 45 can run I0118 08:56:23.446802 42731 executor.go:111] Tasks: 45 done / 132 total; 26 can run I0118 08:56:23.446971 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:56:23.447266 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "private.example.com" I0118 08:56:23.447314 42731 zones.go:40] GetHostedZone { Id: "/hostedzone/Z3AFAKE1ZOMORE" } I0118 08:56:23.447395 42731 dnszone.go:248] Existing zone "private.example.com." found; will configure TF to reuse I0118 08:56:23.447411 42731 dnszone.go:262] VPC "vpc-12345678" already associated with zone "private.example.com." I0118 08:56:23.447472 42731 executor.go:111] Tasks: 71 done / 132 total; 39 can run I0118 08:56:23.448112 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:23.448290 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:23.450162 42731 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0118 08:56:23.450286 42731 api.go:53] PageSize not implemented W0118 08:56:23.450357 42731 api.go:53] PageSize not implemented I0118 08:56:23.454718 42731 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0118 08:56:23.454873 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:23.455027 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:23.455230 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:23.455628 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:23.455728 42731 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0118 08:56:23.456000 42731 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0118 08:56:23.456254 42731 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0118 08:56:23.463313 42731 target.go:111] Terraform output is in /tmp/test2881044639/out --- PASS: TestPrivateDns2 (1.43s) === RUN TestDiscoveryFeatureGate I0118 08:56:23.468161 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:23.468410 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:23.468450 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:23.468493 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:23.468526 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:23.468569 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:23.468650 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:23.468675 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:23.468710 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:23.468736 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:23.490311 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:56:23.493186 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:23.493259 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:24.796069 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:24.986515 42731 executor.go:111] Tasks: 0 done / 113 total; 52 can run I0118 08:56:24.987474 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:24.987510 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:24.987606 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:24.989429 42731 executor.go:111] Tasks: 52 done / 113 total; 28 can run I0118 08:56:25.000543 42731 executor.go:111] Tasks: 80 done / 113 total; 25 can run I0118 08:56:25.001160 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:25.001398 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:25.001875 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:25.002003 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:25.002116 42731 executor.go:111] Tasks: 105 done / 113 total; 2 can run I0118 08:56:25.002424 42731 executor.go:111] Tasks: 107 done / 113 total; 6 can run I0118 08:56:25.002663 42731 executor.go:111] Tasks: 113 done / 113 total; 0 can run I0118 08:56:25.009667 42731 target.go:111] Terraform output is in /tmp/test2279448721/out --- PASS: TestDiscoveryFeatureGate (1.55s) === RUN TestVFSServiceAccountIssuerDiscovery I0118 08:56:25.015547 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:25.015801 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:25.015839 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:25.015881 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:25.015915 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:25.015957 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:25.015996 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:25.016019 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:25.016050 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:25.016075 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:25.037225 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:25.040096 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:25.040193 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:26.276130 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:26.437632 42731 executor.go:111] Tasks: 0 done / 104 total; 47 can run I0118 08:56:26.438319 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:26.438350 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:26.438426 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:26.440129 42731 executor.go:111] Tasks: 47 done / 104 total; 24 can run I0118 08:56:26.444803 42731 executor.go:111] Tasks: 71 done / 104 total; 25 can run I0118 08:56:26.444993 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:26.445383 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:26.445609 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:26.445841 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:26.445953 42731 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0118 08:56:26.446207 42731 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0118 08:56:26.447693 42731 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0118 08:56:26.457052 42731 target.go:111] Terraform output is in /tmp/test31569155/out --- PASS: TestVFSServiceAccountIssuerDiscovery (1.45s) === RUN TestAWSLBController I0118 08:56:26.461861 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:26.462098 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:26.462138 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:26.462183 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:26.462220 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:26.462265 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:26.462305 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:26.462329 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:26.462363 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:26.462389 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:26.483911 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:26.486862 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:26.486939 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:27.752881 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:28.378749 42731 executor.go:111] Tasks: 0 done / 116 total; 54 can run I0118 08:56:28.379108 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:28.379146 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:28.379260 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:28.381793 42731 executor.go:111] Tasks: 54 done / 116 total; 29 can run I0118 08:56:28.386708 42731 executor.go:111] Tasks: 83 done / 116 total; 25 can run I0118 08:56:28.387173 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:28.387381 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:28.387565 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:28.388006 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:28.388105 42731 executor.go:111] Tasks: 108 done / 116 total; 2 can run I0118 08:56:28.388376 42731 executor.go:111] Tasks: 110 done / 116 total; 6 can run I0118 08:56:28.388645 42731 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0118 08:56:28.397140 42731 target.go:111] Terraform output is in /tmp/test172936671/out --- PASS: TestAWSLBController (1.95s) === RUN TestManyAddons I0118 08:56:28.410893 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:28.411218 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:28.411255 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:28.411295 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:28.411328 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:28.411370 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:28.411407 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:28.411430 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:28.411460 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:28.411484 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:28.434068 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:28.437305 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:28.437380 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:29.677570 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:30.374948 42731 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0118 08:56:30.375971 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:30.376005 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:30.376094 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:30.383856 42731 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0118 08:56:30.387427 42731 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0118 08:56:30.387805 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:30.387981 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:30.388200 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:30.388387 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:30.388602 42731 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0118 08:56:30.388808 42731 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0118 08:56:30.389010 42731 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0118 08:56:30.396793 42731 target.go:111] Terraform output is in /tmp/test2133288440/out --- PASS: TestManyAddons (1.99s) === RUN TestManyAddonsCCMIRSA I0118 08:56:30.404679 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:30.404933 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:30.404971 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:30.405010 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:30.405042 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:30.405089 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:30.405125 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:30.405149 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:30.405184 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:30.405209 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:30.428100 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:30.434867 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:30.435309 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:31.651836 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:32.409962 42731 executor.go:111] Tasks: 0 done / 123 total; 59 can run I0118 08:56:32.411411 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:32.411448 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:32.411531 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:32.420790 42731 executor.go:111] Tasks: 59 done / 123 total; 30 can run I0118 08:56:32.426030 42731 executor.go:111] Tasks: 89 done / 123 total; 26 can run I0118 08:56:32.426506 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:32.426734 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:32.427150 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:32.427230 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:32.427321 42731 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0118 08:56:32.427595 42731 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0118 08:56:32.427867 42731 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0118 08:56:32.436928 42731 target.go:111] Terraform output is in /tmp/test2851664262/out --- PASS: TestManyAddonsCCMIRSA (2.04s) === RUN TestManyAddonsCCMIRSA23 I0118 08:56:32.447683 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:32.447903 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:32.447933 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:32.447967 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:32.447990 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:32.448018 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:32.448043 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:32.448057 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:32.448078 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:32.448094 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:32.462923 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0118 08:56:32.464835 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:32.464882 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:33.695825 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:34.469378 42731 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0118 08:56:34.471727 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:34.471764 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:34.471852 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:34.474121 42731 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0118 08:56:34.480674 42731 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0118 08:56:34.480999 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:34.481198 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:34.481646 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:34.481729 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:34.481801 42731 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0118 08:56:34.482080 42731 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0118 08:56:34.482399 42731 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0118 08:56:34.491723 42731 target.go:111] Terraform output is in /tmp/test1159779289/out --- PASS: TestManyAddonsCCMIRSA23 (2.06s) === RUN TestManyAddonsCCMIRSA24 I0118 08:56:34.507059 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:34.507340 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:34.507376 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:34.507415 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:34.507447 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:34.507488 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:34.507523 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:34.507545 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:34.507577 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:34.507600 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:34.531489 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:56:34.534693 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:34.534763 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:35.757717 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:36.497396 42731 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0118 08:56:36.500873 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:36.500901 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:36.500975 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:36.503729 42731 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0118 08:56:36.506662 42731 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0118 08:56:36.507018 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:36.507218 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:36.507473 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:36.507763 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:36.507894 42731 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0118 08:56:36.508147 42731 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0118 08:56:36.508526 42731 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0118 08:56:36.517895 42731 target.go:111] Terraform output is in /tmp/test2344913056/out --- PASS: TestManyAddonsCCMIRSA24 (2.03s) === RUN TestManyAddonsCCMIRSA25 I0118 08:56:36.532658 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:36.532960 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:36.532998 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:36.533073 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:36.533111 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:36.533155 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:36.533191 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:36.533214 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:36.533245 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:36.533268 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:36.557906 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0118 08:56:36.561278 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:36.561359 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:37.796103 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:38.537473 42731 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0118 08:56:38.542064 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:38.542129 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:38.542279 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:38.546995 42731 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0118 08:56:38.551963 42731 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0118 08:56:38.552399 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:38.552597 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:38.552979 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:38.553148 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:38.553253 42731 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0118 08:56:38.553515 42731 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0118 08:56:38.553777 42731 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0118 08:56:38.563094 42731 target.go:111] Terraform output is in /tmp/test267307300/out --- PASS: TestManyAddonsCCMIRSA25 (2.05s) === RUN TestManyAddonsCCMIRSA26 I0118 08:56:38.579877 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:38.580387 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:38.580452 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:38.580531 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:38.580587 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:38.580632 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:38.580672 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:38.580695 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:38.580726 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:38.580752 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:38.604127 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0118 08:56:38.607388 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:38.607457 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:39.866986 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:40.648954 42731 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0118 08:56:40.649930 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:40.649966 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:40.650051 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:40.652929 42731 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0118 08:56:40.657820 42731 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0118 08:56:40.658292 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:40.658495 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:40.659590 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:40.660571 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:40.660855 42731 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0118 08:56:40.661530 42731 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0118 08:56:40.662487 42731 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0118 08:56:40.672889 42731 target.go:111] Terraform output is in /tmp/test2651929649/out --- PASS: TestManyAddonsCCMIRSA26 (2.10s) === RUN TestManyAddonsGCE I0118 08:56:40.684805 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:56:42.773319 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:56:42.773412 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:56:42.773519 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/main" W0118 08:56:42.773540 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/events" W0118 08:56:42.773560 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com" W0118 08:56:42.773618 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0118 08:56:42.774873 42731 executor.go:111] Tasks: 0 done / 67 total; 44 can run I0118 08:56:42.779022 42731 executor.go:111] Tasks: 44 done / 67 total; 17 can run I0118 08:56:42.783790 42731 executor.go:111] Tasks: 61 done / 67 total; 4 can run I0118 08:56:42.784571 42731 executor.go:111] Tasks: 65 done / 67 total; 2 can run I0118 08:56:42.784734 42731 executor.go:111] Tasks: 67 done / 67 total; 0 can run I0118 08:56:42.789711 42731 target.go:111] Terraform output is in /tmp/test1363970987/out --- PASS: TestManyAddonsGCE (2.11s) === RUN TestCCM I0118 08:56:42.797212 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:42.797475 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:42.797519 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:42.797565 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:42.797602 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:42.797645 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:42.797681 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:42.797704 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:42.797739 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:42.797765 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:42.827835 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:42.830845 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:42.830924 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:43.901996 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:44.595480 42731 executor.go:111] Tasks: 0 done / 110 total; 51 can run I0118 08:56:44.596560 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:44.596595 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:44.596689 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:44.604600 42731 executor.go:111] Tasks: 51 done / 110 total; 24 can run I0118 08:56:44.609463 42731 executor.go:111] Tasks: 75 done / 110 total; 27 can run I0118 08:56:44.609720 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:44.610003 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:44.610166 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:44.610607 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:44.610706 42731 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0118 08:56:44.610970 42731 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0118 08:56:44.611235 42731 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0118 08:56:44.618709 42731 target.go:111] Terraform output is in /tmp/test1544825374/out --- PASS: TestCCM (1.83s) === RUN TestExternalDNS I0118 08:56:44.626749 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:44.627004 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:44.627043 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:44.627086 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:44.627119 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:44.627163 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:44.627202 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:44.627224 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:44.627257 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:44.627281 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:44.652656 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:44.655501 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:44.655586 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:45.924199 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:46.091573 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:56:46.094132 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:46.094165 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:46.094245 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:46.095034 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:56:46.099929 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:56:46.100246 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:46.100543 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:46.100759 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:46.101170 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:46.101261 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:56:46.101521 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:56:46.101795 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:56:46.111628 42731 target.go:111] Terraform output is in /tmp/test3603777179/out --- PASS: TestExternalDNS (1.49s) === RUN TestExternalDNSIRSA I0118 08:56:46.116544 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:46.117042 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:46.117080 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:46.117123 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:46.117158 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:46.117199 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:46.117237 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:46.117261 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:46.117292 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:46.117317 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:46.138889 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:46.141829 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:46.141903 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:47.382587 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:47.574721 42731 executor.go:111] Tasks: 0 done / 112 total; 51 can run I0118 08:56:47.575939 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:47.575972 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:47.576055 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:47.578262 42731 executor.go:111] Tasks: 51 done / 112 total; 28 can run I0118 08:56:47.582937 42731 executor.go:111] Tasks: 79 done / 112 total; 25 can run I0118 08:56:47.583152 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:47.583432 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:47.583829 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:47.583913 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:47.583996 42731 executor.go:111] Tasks: 104 done / 112 total; 2 can run I0118 08:56:47.584282 42731 executor.go:111] Tasks: 106 done / 112 total; 6 can run I0118 08:56:47.584508 42731 executor.go:111] Tasks: 112 done / 112 total; 0 can run I0118 08:56:47.591571 42731 target.go:111] Terraform output is in /tmp/test132712182/out --- PASS: TestExternalDNSIRSA (1.48s) === RUN TestKarpenter I0118 08:56:47.597413 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:47.597660 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:47.597698 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:47.597740 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:47.597774 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:47.597818 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:47.597856 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:47.597880 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:47.597912 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:47.597937 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:47.629007 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:56:47.632163 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:47.632242 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:47.632293 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:48.860105 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:49.000314 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.000385 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.000435 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0118 08:56:49.122122 42731 pruning.go:115] manifest includes an object of GroupKind Secret, which will not be pruned W0118 08:56:49.122190 42731 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0118 08:56:49.122203 42731 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned W0118 08:56:49.122212 42731 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0118 08:56:49.122219 42731 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned I0118 08:56:49.142895 42731 executor.go:111] Tasks: 0 done / 122 total; 54 can run I0118 08:56:49.143597 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:49.143635 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:49.143723 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:49.151343 42731 executor.go:111] Tasks: 54 done / 122 total; 31 can run I0118 08:56:49.156145 42731 executor.go:111] Tasks: 85 done / 122 total; 29 can run I0118 08:56:49.156428 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.156606 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.156766 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.156986 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.157171 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.157269 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.157395 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.157562 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.157648 42731 executor.go:111] Tasks: 114 done / 122 total; 2 can run I0118 08:56:49.157889 42731 executor.go:111] Tasks: 116 done / 122 total; 6 can run I0118 08:56:49.158119 42731 executor.go:111] Tasks: 122 done / 122 total; 0 can run I0118 08:56:49.166521 42731 target.go:111] Terraform output is in /tmp/test2019320522/out --- PASS: TestKarpenter (1.58s) === RUN TestSharedSubnet I0118 08:56:49.173444 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:49.173716 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:49.173752 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:49.173802 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:49.173836 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:49.173882 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:49.173918 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:49.173939 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:49.173971 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:49.173995 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:49.198645 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:49.202336 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:49.202420 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:50.440451 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:50.598956 42731 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0118 08:56:50.599423 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:50.599450 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:50.599527 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:50.601974 42731 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0118 08:56:50.602130 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:56:50.606808 42731 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0118 08:56:50.607098 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:50.607325 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:50.607502 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:50.607912 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:50.608010 42731 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0118 08:56:50.608251 42731 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0118 08:56:50.608479 42731 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0118 08:56:50.614040 42731 target.go:111] Terraform output is in /tmp/test500255990/out --- PASS: TestSharedSubnet (1.45s) === RUN TestSharedVPC I0118 08:56:50.618631 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:50.618875 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:50.618911 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:50.618956 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:50.618990 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:50.619031 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:50.619068 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:50.619092 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:50.619124 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:50.619149 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:50.643797 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:50.646976 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:50.647057 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:51.885770 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:52.040765 42731 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0118 08:56:52.041190 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:52.041231 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:52.041356 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:52.046126 42731 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0118 08:56:52.047241 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:56:52.052963 42731 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0118 08:56:52.053266 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:52.053458 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:52.053639 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:52.054100 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:52.054204 42731 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0118 08:56:52.054461 42731 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0118 08:56:52.054666 42731 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0118 08:56:52.060438 42731 target.go:111] Terraform output is in /tmp/test1138993049/out --- PASS: TestSharedVPC (1.45s) === RUN TestSharedVPCIPv6 I0118 08:56:52.064848 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:52.065084 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:52.065121 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:52.065162 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:52.065196 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:52.065238 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:52.065273 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:52.065297 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:52.065329 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:52.065354 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:52.067107 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:56:52.067158 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:56:52.089911 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:56:52.089960 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0118 08:56:52.090046 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:56:52.093435 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:52.093507 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:53.319282 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:53.487198 42731 executor.go:111] Tasks: 0 done / 133 total; 45 can run I0118 08:56:53.488190 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:53.488224 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:53.488310 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:53.490541 42731 executor.go:111] Tasks: 45 done / 133 total; 29 can run I0118 08:56:53.490962 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:56:53.491107 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:56:53.493533 42731 executor.go:111] Tasks: 74 done / 133 total; 37 can run I0118 08:56:53.494229 42731 executor.go:111] Tasks: 111 done / 133 total; 6 can run I0118 08:56:53.494336 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:56:53.494423 42731 loadbalancers.go:35] PageSize not implemented I0118 08:56:53.494574 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:56:53.494628 42731 loadbalancers.go:35] PageSize not implemented I0118 08:56:53.498849 42731 executor.go:111] Tasks: 117 done / 133 total; 8 can run I0118 08:56:53.499022 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:53.499255 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:53.499382 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:53.499827 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:53.499918 42731 executor.go:111] Tasks: 125 done / 133 total; 2 can run I0118 08:56:53.500192 42731 executor.go:111] Tasks: 127 done / 133 total; 6 can run I0118 08:56:53.500446 42731 executor.go:111] Tasks: 133 done / 133 total; 0 can run I0118 08:56:53.507461 42731 target.go:111] Terraform output is in /tmp/test3708989077/out --- PASS: TestSharedVPCIPv6 (1.45s) === RUN TestExistingIAM I0118 08:56:53.515538 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:53.515805 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:53.515842 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:53.515886 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:53.515922 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:53.515965 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:53.516001 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:53.516024 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:53.516054 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:53.516082 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:53.544418 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:53.547661 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:53.547735 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:53.547785 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:53.547829 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:54.807382 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:54.967543 42731 executor.go:111] Tasks: 0 done / 117 total; 51 can run I0118 08:56:54.967847 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:54.967876 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:54.967962 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:54.975871 42731 executor.go:111] Tasks: 51 done / 117 total; 19 can run I0118 08:56:54.980748 42731 executor.go:111] Tasks: 70 done / 117 total; 31 can run I0118 08:56:54.981237 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:54.981395 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:54.981583 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:54.981794 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:54.981985 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:54.982108 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:54.982154 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:54.982229 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:54.982312 42731 executor.go:111] Tasks: 101 done / 117 total; 4 can run I0118 08:56:54.982657 42731 executor.go:111] Tasks: 105 done / 117 total; 12 can run I0118 08:56:54.982954 42731 executor.go:111] Tasks: 117 done / 117 total; 0 can run I0118 08:56:54.990257 42731 target.go:111] Terraform output is in /tmp/test3175176133/out --- PASS: TestExistingIAM (1.48s) === RUN TestPhaseNetwork I0118 08:56:54.995559 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:54.995814 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:54.995853 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:54.995895 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:54.995933 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:54.995976 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:54.996012 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:54.996035 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:54.996067 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:54.996091 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:55.024018 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:55.027434 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:55.027586 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:55.027636 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:56.282140 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:56.451870 42731 executor.go:111] Tasks: 0 done / 135 total; 47 can run I0118 08:56:56.452496 42731 executor.go:111] Tasks: 47 done / 135 total; 30 can run I0118 08:56:56.452901 42731 executor.go:111] Tasks: 77 done / 135 total; 36 can run I0118 08:56:56.453474 42731 executor.go:111] Tasks: 113 done / 135 total; 6 can run I0118 08:56:56.453640 42731 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0118 08:56:56.453832 42731 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0118 08:56:56.453955 42731 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0118 08:56:56.454065 42731 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0118 08:56:56.455180 42731 target.go:111] Terraform output is in /tmp/test1092713027/out --- PASS: TestPhaseNetwork (1.46s) === RUN TestExternalLoadBalancer I0118 08:56:56.455784 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:56.456032 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:56.456074 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:56.456121 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:56.456158 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:56.456201 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:56.456243 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:56.456271 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:56.456302 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:56.456328 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:56.477662 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:56.480524 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:56.480608 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.736670 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:57.891003 42731 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0118 08:56:57.892031 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:57.892066 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:57.892155 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:57.894001 42731 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0118 08:56:57.899177 42731 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0118 08:56:57.899417 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.899729 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.900082 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.900219 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.900345 42731 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0118 08:56:57.900610 42731 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0118 08:56:57.900841 42731 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0118 08:56:57.906800 42731 target.go:111] Terraform output is in /tmp/test44139510/out --- PASS: TestExternalLoadBalancer (1.46s) === RUN TestPhaseIAM integration_test.go:1062: unable to test w/o allowing failed validation --- SKIP: TestPhaseIAM (0.00s) === RUN TestPhaseCluster integration_test.go:1070: unable to test w/o allowing failed validation --- SKIP: TestPhaseCluster (0.00s) === RUN TestMixedInstancesASG I0118 08:56:57.915786 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:57.916100 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:57.916135 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:57.916178 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:57.916212 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:57.916255 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:57.916290 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:57.916313 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:57.916362 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:57.916388 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:57.943753 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:57.946822 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.946892 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.946936 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.946979 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.947016 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.947051 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:57.947090 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.179426 42731 zones.go:93] ListHostedZonesPages { } I0118 08:56:59.336492 42731 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0118 08:56:59.342090 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:56:59.342128 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:56:59.342223 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:56:59.345157 42731 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0118 08:56:59.350520 42731 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0118 08:56:59.350756 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.350986 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.351132 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.351315 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.351431 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.351501 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.351575 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.351866 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.351959 42731 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0118 08:56:59.352338 42731 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0118 08:56:59.352802 42731 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0118 08:56:59.360369 42731 target.go:111] Terraform output is in /tmp/test1161851717/out --- PASS: TestMixedInstancesASG (1.45s) === RUN TestMixedInstancesSpotASG I0118 08:56:59.370686 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:56:59.370984 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:56:59.371022 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:56:59.371063 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:56:59.371096 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:56:59.371140 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:56:59.371176 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:56:59.371199 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:56:59.371229 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:56:59.371254 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:56:59.401208 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:56:59.404503 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.404582 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.404632 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.404676 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.404717 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.404755 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:56:59.404792 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.639885 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:00.806697 42731 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0118 08:57:00.807455 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:00.807488 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:00.807575 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:00.810506 42731 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0118 08:57:00.819189 42731 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0118 08:57:00.819381 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.819731 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.819968 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.820183 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.820309 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.820548 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.820630 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.820700 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.820811 42731 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0118 08:57:00.821089 42731 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0118 08:57:00.821401 42731 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0118 08:57:00.829620 42731 target.go:111] Terraform output is in /tmp/test2133634401/out --- PASS: TestMixedInstancesSpotASG (1.46s) === RUN TestAdditionalObjects I0118 08:57:00.835599 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:00.835860 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:00.835899 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:00.835943 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:00.835978 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:00.836023 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:00.836063 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:00.836091 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:00.836126 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:00.836152 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:00.858822 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0118 08:57:00.861727 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:00.861802 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:02.195812 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:02.348352 42731 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0118 08:57:02.348904 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:02.348939 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:02.349024 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:02.351060 42731 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0118 08:57:02.360188 42731 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0118 08:57:02.360563 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:02.360693 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:02.361129 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:02.361184 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:02.361281 42731 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0118 08:57:02.361557 42731 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0118 08:57:02.361826 42731 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0118 08:57:02.368076 42731 target.go:111] Terraform output is in /tmp/test477998484/out --- PASS: TestAdditionalObjects (1.54s) === RUN TestContainerd I0118 08:57:02.372807 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:02.373070 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:02.373108 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:02.373152 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:02.373186 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:02.373228 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:02.373267 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:02.373290 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:02.373325 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:02.373351 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:02.393736 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:02.396925 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:02.396996 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:03.657296 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:03.813497 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:57:03.815031 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:03.815061 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:03.815141 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:03.816043 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:57:03.820885 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:57:03.821287 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:03.821473 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:03.822881 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:03.823046 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:03.823163 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:57:03.823740 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:57:03.824365 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:57:03.832442 42731 target.go:111] Terraform output is in /tmp/test4287939543/out --- PASS: TestContainerd (1.46s) === RUN TestContainerdCustom I0118 08:57:03.837283 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:03.837542 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:03.837580 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:03.837625 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:03.837661 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:03.837703 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:03.837742 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:03.837764 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:03.837796 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:03.837821 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:03.859423 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:03.862422 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:03.862495 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:04.346056 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:04.500548 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:57:04.501677 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:04.501719 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:04.501822 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:04.503426 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:57:04.508041 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:57:04.508265 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:04.508448 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:04.508839 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:04.508917 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:04.508985 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:57:04.509234 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:57:04.509476 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:57:04.515233 42731 target.go:111] Terraform output is in /tmp/test1933048790/out --- PASS: TestContainerdCustom (0.68s) === RUN TestDockerCustom I0118 08:57:04.519828 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:04.520477 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:04.520516 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:04.520554 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:04.520585 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:04.520627 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:04.520670 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:04.520693 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:04.520722 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:04.520747 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:04.541923 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0118 08:57:04.544949 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:04.545020 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:05.036401 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:05.188128 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:57:05.188852 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:05.188888 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:05.188971 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:05.191745 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:57:05.196778 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:57:05.197192 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:05.197498 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:05.197611 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:05.198145 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:05.198247 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:57:05.198590 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:57:05.198883 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:57:05.209101 42731 target.go:111] Terraform output is in /tmp/test2518702980/out --- PASS: TestDockerCustom (0.69s) === RUN TestAPIServerNodes I0118 08:57:05.213554 42731 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0118 08:57:05.213580 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:05.213822 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:05.213861 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:05.213908 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:05.213943 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:05.213987 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:05.214023 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:05.214046 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:05.214077 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:05.214101 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:05.236909 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0118 08:57:05.239745 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:05.239831 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:05.239878 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:06.587394 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:06.744668 42731 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0118 08:57:06.745699 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:06.745736 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:06.745857 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:06.748627 42731 executor.go:111] Tasks: 47 done / 114 total; 28 can run I0118 08:57:06.753153 42731 executor.go:111] Tasks: 75 done / 114 total; 27 can run I0118 08:57:06.753320 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:06.753729 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:06.753929 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:06.754120 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:06.754197 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:06.754335 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:06.754436 42731 executor.go:111] Tasks: 102 done / 114 total; 3 can run I0118 08:57:06.754683 42731 executor.go:111] Tasks: 105 done / 114 total; 9 can run I0118 08:57:06.754985 42731 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0118 08:57:06.761358 42731 target.go:111] Terraform output is in /tmp/test2187781850/out I0118 08:57:06.766193 42731 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestAPIServerNodes (1.55s) === RUN TestNTHIMDSProcessor I0118 08:57:06.766305 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:06.766560 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:06.766600 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:06.766643 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:06.766675 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:06.766715 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:06.766748 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:06.766772 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:06.766804 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:06.766827 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:06.792547 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:06.795341 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:06.795424 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:08.058439 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:08.206936 42731 executor.go:111] Tasks: 0 done / 90 total; 44 can run I0118 08:57:08.210376 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:08.210439 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:08.210586 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:08.214921 42731 executor.go:111] Tasks: 44 done / 90 total; 19 can run I0118 08:57:08.219904 42731 executor.go:111] Tasks: 63 done / 90 total; 21 can run I0118 08:57:08.220093 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:08.220359 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:08.220635 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:08.221016 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:08.221113 42731 executor.go:111] Tasks: 84 done / 90 total; 2 can run I0118 08:57:08.221381 42731 executor.go:111] Tasks: 86 done / 90 total; 4 can run I0118 08:57:08.221607 42731 executor.go:111] Tasks: 90 done / 90 total; 0 can run I0118 08:57:08.227287 42731 target.go:111] Terraform output is in /tmp/test3166821274/out --- PASS: TestNTHIMDSProcessor (1.46s) === RUN TestNTHIMDSProcessorIRSA I0118 08:57:08.231379 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:08.231633 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:08.231674 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:08.231716 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:08.231750 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:08.231793 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:08.231829 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:08.231854 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:08.231887 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:08.231911 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:08.253126 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:08.255960 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:08.256037 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:09.485582 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:09.681351 42731 executor.go:111] Tasks: 0 done / 101 total; 50 can run I0118 08:57:09.682095 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:09.682138 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:09.682256 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:09.686817 42731 executor.go:111] Tasks: 50 done / 101 total; 24 can run I0118 08:57:09.693914 42731 executor.go:111] Tasks: 74 done / 101 total; 21 can run I0118 08:57:09.694210 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:09.694480 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:09.694858 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:09.694915 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:09.695040 42731 executor.go:111] Tasks: 95 done / 101 total; 2 can run I0118 08:57:09.695288 42731 executor.go:111] Tasks: 97 done / 101 total; 4 can run I0118 08:57:09.695539 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:57:09.702297 42731 target.go:111] Terraform output is in /tmp/test3632947871/out --- PASS: TestNTHIMDSProcessorIRSA (1.48s) === RUN TestCustomIRSA I0118 08:57:09.707413 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:09.707655 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:09.707691 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:09.707740 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:09.707777 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:09.707818 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:09.707855 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:09.707879 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:09.707936 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:09.707961 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:09.731817 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:09.735156 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:09.735227 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:10.991018 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:11.551745 42731 executor.go:111] Tasks: 0 done / 114 total; 52 can run I0118 08:57:11.553395 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:11.553431 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:11.553520 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:11.555304 42731 executor.go:111] Tasks: 52 done / 114 total; 29 can run I0118 08:57:11.560104 42731 executor.go:111] Tasks: 81 done / 114 total; 25 can run I0118 08:57:11.560397 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:11.560578 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:11.560964 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:11.561045 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:11.561113 42731 executor.go:111] Tasks: 106 done / 114 total; 2 can run I0118 08:57:11.561350 42731 executor.go:111] Tasks: 108 done / 114 total; 6 can run I0118 08:57:11.561612 42731 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0118 08:57:11.569018 42731 target.go:111] Terraform output is in /tmp/test3815883808/out --- PASS: TestCustomIRSA (1.88s) === RUN TestClusterNameDigit I0118 08:57:11.583445 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:11.583706 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:11.583743 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:11.583786 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:11.583820 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:11.583863 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:11.583897 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:11.583920 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:11.583949 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:11.583973 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:11.605879 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:11.608935 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:11.609009 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:12.880718 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:13.034582 42731 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0118 08:57:13.036570 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:13.036615 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:13.037089 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:13.041011 42731 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0118 08:57:13.045567 42731 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0118 08:57:13.045787 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:13.046105 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:13.046601 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:13.046683 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:13.046777 42731 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0118 08:57:13.047060 42731 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0118 08:57:13.047340 42731 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0118 08:57:13.053584 42731 target.go:111] Terraform output is in /tmp/test1934669478/out --- PASS: TestClusterNameDigit (1.48s) === RUN TestCASPriorityExpander I0118 08:57:13.058776 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:13.059036 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:13.059074 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:13.059116 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:13.059148 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:13.059192 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:13.059227 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:13.059250 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:13.059279 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:13.059302 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:13.092192 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0118 08:57:13.095238 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:13.095352 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:13.095396 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:13.095435 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0118 08:57:14.724537 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:14.904352 42731 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0118 08:57:14.905802 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:14.905837 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:14.905919 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:14.909319 42731 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0118 08:57:14.917372 42731 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0118 08:57:14.917989 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.918173 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.918326 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.918456 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.918644 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.918817 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.918955 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.919054 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.919160 42731 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0118 08:57:14.919494 42731 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0118 08:57:14.919767 42731 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0118 08:57:14.926647 42731 target.go:111] Terraform output is in /tmp/test3123227118/out --- PASS: TestCASPriorityExpander (1.87s) === RUN TestCASPriorityExpanderCustom I0118 08:57:14.932005 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:14.932247 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:14.932284 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:14.932322 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:14.932355 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:14.932398 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:14.932433 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:14.932457 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:14.932488 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:14.932513 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:57:14.958601 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0118 08:57:14.961482 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.961546 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.961584 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:14.961621 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0118 08:57:16.194868 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:16.379091 42731 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0118 08:57:16.380388 42731 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0118 08:57:16.380423 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:16.380523 42731 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0118 08:57:16.382416 42731 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0118 08:57:16.391440 42731 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0118 08:57:16.391902 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:16.392034 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:16.392221 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:16.392417 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:16.392620 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:16.392698 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:16.392769 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:16.393135 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:16.393234 42731 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0118 08:57:16.393585 42731 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0118 08:57:16.393911 42731 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0118 08:57:16.401587 42731 target.go:111] Terraform output is in /tmp/test2552641811/out --- PASS: TestCASPriorityExpanderCustom (1.47s) === RUN TestLifecycleMinimalAWS I0118 08:57:16.406756 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:16.407009 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:16.407046 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:16.407112 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:16.407150 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:16.407193 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:16.407228 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:16.407250 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:16.407282 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:16.407305 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0118 08:57:16.426854 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0118 08:57:16.429271 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:16.429338 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0118 08:57:17.748250 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:17.906608 42731 iamrole.go:89] ListRoles: { } I0118 08:57:17.909747 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:57:17.910479 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0118 08:57:17.910725 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:17.910663 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0118 08:57:17.911517 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:17.912105 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:17.912367 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.912547 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] }] } I0118 08:57:17.912757 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:17.912904 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:17.912966 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:17.913044 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:17.913073 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:17.913296 42731 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.914025 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0118 08:57:17.914090 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0118 08:57:17.914120 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:17.914166 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:17.914052 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0118 08:57:17.914211 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0118 08:57:17.914552 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:17.914739 42731 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.914836 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:17.915410 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:57:17.915557 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0118 08:57:17.915615 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:17.915703 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0118 08:57:17.915702 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0118 08:57:17.915800 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0118 08:57:17.915832 42731 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0118 08:57:17.915813 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0118 08:57:17.915757 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0118 08:57:17.915933 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0118 08:57:17.916005 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:17.916179 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:17.916334 42731 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0118 08:57:17.916410 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:17.916576 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" } ] }], VpcId: "vpc-1" } I0118 08:57:17.916580 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0118 08:57:17.916758 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:17.916842 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:17.916887 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:17.916926 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:17.917109 42731 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" }] }] } I0118 08:57:17.917182 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:17.917224 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:17.917264 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0118 08:57:17.917342 42731 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0118 08:57:17.917414 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:17.917458 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:17.917495 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:17.917596 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:17.917380 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0118 08:57:17.917641 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:17.920527 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:57:17.920720 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:17.920840 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:17.920916 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:17.920986 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:57:17.921040 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:57:17.921172 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0118 08:57:17.921372 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.921578 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.921699 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.921889 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.922005 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0118 08:57:17.922041 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:17.922128 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0118 08:57:17.922259 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.922429 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:17.922523 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0118 08:57:17.922568 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.922679 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:17.922806 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" }] }] } I0118 08:57:17.922984 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.923121 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.923237 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0118 08:57:17.923344 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:57:17.923449 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" }] }] } I0118 08:57:17.923564 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:17.924149 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:57:17.924460 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:57:17.924720 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:57:17.924766 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:17.924800 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:17.924862 42731 dns.go:235] Pre-creating DNS records I0118 08:57:17.924888 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:17.929747 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0118 08:57:17.932422 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:17.932544 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0118 08:57:19.230303 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:19.386202 42731 iamrole.go:89] ListRoles: { } I0118 08:57:19.387353 42731 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0118 08:57:19.388966 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.389279 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:19.389339 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:19.389460 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:19.390962 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.391788 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:19.391814 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:19.392145 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.393174 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.395180 42731 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0118 08:57:19.395327 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:19.395841 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:19.395885 42731 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0118 08:57:19.395962 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0118 08:57:19.395916 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0118 08:57:19.396027 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0118 08:57:19.396160 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:19.396208 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.396311 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.396446 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:19.396478 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0118 08:57:19.396595 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:19.400645 42731 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0118 08:57:19.400866 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:19.401017 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:19.401166 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:19.401349 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:19.401514 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:19.401603 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:19.401721 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:19.402347 42731 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0118 08:57:19.402737 42731 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0118 08:57:19.403153 42731 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0118 08:57:19.405480 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:57:19.405536 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:19.405566 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:57:19.405588 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:57:19.405609 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:57:19.405635 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:57:19.405657 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:19.405681 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:57:19.405706 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:57:19.405734 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:57:19.405765 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:57:19.405787 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:57:19.405808 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:19.405837 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:57:19.405859 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:19.405880 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:19.405904 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:19.405929 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:57:19.405950 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:57:19.405970 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:57:19.405989 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:19.406015 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:19.406040 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:19.406063 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:57:19.407140 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:57:19.407212 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:57:19.407227 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:57:19.407273 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.407316 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0118 08:57:19.407359 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.407407 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.407446 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.407491 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.407525 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.407554 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0118 08:57:19.407593 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.407637 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:57:19.407666 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0118 08:57:19.407702 42731 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0118 08:57:19.407731 42731 api.go:53] PageSize not implemented I0118 08:57:19.407751 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:19.407773 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:19.407789 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:57:19.407812 42731 targetgroups.go:35] PageSize not implemented I0118 08:57:19.407828 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0118 08:57:19.407881 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:57:19.407922 42731 iamrole.go:89] ListRoles: { } I0118 08:57:19.407960 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:19.407983 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:19.408020 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:57:19.408059 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:57:19.408087 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-config:lt-2 ok I0118 08:57:19.408591 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-group:nodes.minimal.example.com ok autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0118 08:57:19.408679 42731 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0118 08:57:19.408661 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0118 08:57:19.408763 42731 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0118 08:57:19.408818 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0118 08:57:19.408843 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } I0118 08:57:19.408727 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } volume:vol-2 ok route53-record:Z1AFAKE1ZON3YO/A/api.minimal.example.com. ok I0118 08:57:19.408878 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0118 08:57:19.408932 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0118 08:57:19.408912 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0118 08:57:19.408969 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:19.409025 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0118 08:57:19.409177 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:19.409197 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-1 ok I0118 08:57:19.409250 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:19.409289 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0118 08:57:19.409450 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:19.409462 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0118 08:57:19.409534 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0118 08:57:19.409546 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0118 08:57:19.409598 42731 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0118 08:57:19.409616 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0118 08:57:19.409650 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0118 08:57:19.409705 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0118 08:57:19.409769 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0118 08:57:19.409783 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0118 08:57:19.409811 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0118 08:57:19.409879 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0118 08:57:19.409951 42731 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0118 08:57:19.410013 42731 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleMinimalAWS (3.00s) === RUN TestLifecycleMinimalOpenstack I0118 08:57:19.410606 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster minimal-openstack.k8s.local I0118 08:57:19.417361 42731 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:57:20.802869 42731 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0118 08:57:20.802901 42731 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0118 08:57:20.814596 42731 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2025/01/18 08:57:20 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:20 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0118 08:57:20.822810 42731 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0118 08:57:20.833749 42731 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0118 08:57:20.838815 42731 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2025/01/18 08:57:20 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:20 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:20 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0118 08:57:20.841229 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0118 08:57:20.841568 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0118 08:57:21.845663 42731 executor.go:111] Tasks: 92 done / 92 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:57:23.221249 42731 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0118 08:57:23.221289 42731 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0118 08:57:23.237912 42731 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2025/01/18 08:57:23 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:23 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0118 08:57:23.247019 42731 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0118 08:57:23.252483 42731 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0118 08:57:23.253823 42731 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2025/01/18 08:57:23 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:23 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:23 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0118 08:57:23.256409 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0118 08:57:23.256547 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0118 08:57:23.256651 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0118 08:57:23.256960 42731 executor.go:111] Tasks: 92 done / 92 total; 0 can run I0118 08:57:23.258243 42731 delete_cluster.go:128] Looking for cloud resources to delete 2025/01/18 08:57:23 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) SSHKey:kubernetes-minimal-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Instance:ba5689b9-25bc-4b8c-8d03-0405e5eaecb4 ok Network:be7c1978-5808-4d36-a14c-e1a4c25ea823 ok SecurityGroup:417278ce-be37-4916-b425-e8aa8ddec304 ok Instance:8568d9f0-92b7-43fe-94d2-57e9ebf71790 ok Instance:80d05da5-2d3a-4228-b0f5-7aef4745764c ok ServerGroup:298fcf76-edfc-40e9-827b-56ccf3f462fe ok Port:2a9aff1d-467c-4e21-8494-745720bdcdc2 ok SecurityGroup:e5232542-c759-44c5-be0b-8a40c1831d68 ok Port:29b76299-fac1-41cb-a51a-2bf5fda1c2ef ok Subnet:c7e74b00-858d-491f-b8ad-dda2ade27efc ok Port:64d732ff-9c65-4ac6-beb0-8948cf9be3a5 ok ServerGroup:c39435a3-65dc-40c2-a150-cb56956e1c82 ok SecurityGroup:a7dbe1d8-a714-4c2a-9087-67d63dfbaf64 ok --- PASS: TestLifecycleMinimalOpenstack (4.96s) === RUN TestLifecycleMinimalGCE I0118 08:57:24.367964 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:479: running lifecycle test for cluster minimal-gce.example.com I0118 08:57:24.369704 42731 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:57:26.056703 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:57:26.056788 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:57:26.056889 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0118 08:57:26.056914 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0118 08:57:26.056934 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0118 08:57:26.056997 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0118 08:57:26.058285 42731 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0118 08:57:26.062614 42731 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0118 08:57:26.067723 42731 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0118 08:57:26.068623 42731 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0118 08:57:26.068820 42731 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0118 08:57:26.068900 42731 dns.go:235] Pre-creating DNS records ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:57:27.716026 42731 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0118 08:57:27.716094 42731 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0118 08:57:27.716166 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0118 08:57:27.716183 42731 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0118 08:57:27.716197 42731 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0118 08:57:27.716246 42731 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0118 08:57:27.717284 42731 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0118 08:57:27.723181 42731 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0118 08:57:27.729376 42731 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0118 08:57:27.730234 42731 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0118 08:57:27.730354 42731 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0118 08:57:27.731678 42731 delete_cluster.go:128] Looking for cloud resources to delete I0118 08:57:27.731731 42731 gce.go:99] Scanning zones: [us-test1-a] I0118 08:57:27.732231 42731 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" I0118 08:57:27.732270 42731 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" FirewallRule:master-to-node-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/node-minimal-gce-example-com@testproject.iam.gserviceaccount.com ok InstanceGroupManager:us-test1-a/a-master-us-test1-a-minimal-gce-example-com ok FirewallRule:node-to-node-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-ipv6-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-nodes-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-minimal-gce-example-com ok FirewallRule:master-to-master-minimal-gce-example-com ok FirewallRule:node-to-master-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-minimal-gce-example-com ok Disk:a-etcd-events-minimal-gce-example-com ok Disk:a-etcd-main-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/control-plane-minimal-g-fu1mg6@testproject.iam.gserviceaccount.com ok FirewallRule:nodeport-external-to-node-ipv6-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-ipv6-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-ipv6-minimal-gce-example-com ok InstanceTemplate:master-us-test1-a-minimal-do16cp-1737190646 ok InstanceTemplate:nodes-minimal-gce-example-com-1737190646 ok Subnet:us-test1-minimal-gce-example-com ok Network:minimal-gce-example-com ok --- PASS: TestLifecycleMinimalGCE (3.37s) === RUN TestLifecycleFloatingIPOpenstack I0118 08:57:27.733846 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster floatingip-openstack.k8s.local I0118 08:57:27.740641 42731 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:57:29.132700 42731 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0118 08:57:29.132735 42731 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0118 08:57:29.148274 42731 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2025/01/18 08:57:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0118 08:57:29.152152 42731 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0118 08:57:29.164341 42731 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0118 08:57:29.167053 42731 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2025/01/18 08:57:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:29 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0118 08:57:29.168983 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0118 08:57:29.169309 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0118 08:57:30.173385 42731 executor.go:111] Tasks: 94 done / 94 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0118 08:57:31.549315 42731 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0118 08:57:31.549355 42731 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0118 08:57:31.565566 42731 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2025/01/18 08:57:31 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:31 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0118 08:57:31.574793 42731 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0118 08:57:31.581849 42731 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0118 08:57:31.583295 42731 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2025/01/18 08:57:31 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:31 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2025/01/18 08:57:31 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0118 08:57:31.586025 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0118 08:57:31.586404 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0118 08:57:31.586607 42731 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0118 08:57:31.586924 42731 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0118 08:57:31.588284 42731 delete_cluster.go:128] Looking for cloud resources to delete 2025/01/18 08:57:31 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) Router-IF:a4f4710a-8ed5-4513-9a49-5440633c1607 ok Port:19b40bc6-1605-439c-b930-fba7e2984784 ok ServerGroup:6b237b29-0d75-471e-9a9e-45d4acb0434a ok Network:b8d719c1-7f25-46e7-a195-96a16715bb7d ok Instance:c97bd873-b313-4faa-b9f9-b0d0fdbae763 ok ServerGroup:b8f64ee8-25eb-4d4e-b109-0277aa53a62b ok Subnet:a4f4710a-8ed5-4513-9a49-5440633c1607 ok Instance:c185a441-ee35-4108-bd5f-48fe82df7a61 ok Router:0d75f950-ed57-4737-88dc-bd17a3c157ab ok Instance:68fcf77b-0325-451b-8f2a-fb0415f1a142 ok SecurityGroup:44ee1c1e-aed4-47c4-ac1b-65ee3e20025b ok SSHKey:kubernetes-floatingip-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok SecurityGroup:387092b6-e773-49ec-a397-0887376c8701 ok Port:d22e0a3c-f70f-4249-95ca-89139fe91638 ok SecurityGroup:d438d31f-1a70-42bf-9791-130385de477f ok Port:ceea13ee-e7b8-4764-a436-b74ed011e202 ok Port:d8e9fc02-bc32-44a5-a708-9f7b9f87c198 ok --- PASS: TestLifecycleFloatingIPOpenstack (4.95s) === RUN TestLifecyclePrivateCalico I0118 08:57:32.687601 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:32.687964 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:32.688015 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:32.688084 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:32.688140 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:32.688210 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:32.688258 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:32.688303 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:32.688362 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:32.688405 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatecalico.example.com I0118 08:57:32.719450 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:57:32.722675 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:32.722772 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:32.722818 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:33.992271 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:34.378505 42731 iamrole.go:89] ListRoles: { } I0118 08:57:34.379820 42731 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0118 08:57:34.380183 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:34.380160 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:34.380238 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } I0118 08:57:34.380319 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0118 08:57:34.380348 42731 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.380456 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:34.380410 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } I0118 08:57:34.380522 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] } I0118 08:57:34.380597 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } I0118 08:57:34.380654 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0118 08:57:34.380792 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:34.380986 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:34.382514 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:34.382596 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:34.382940 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:34.383236 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:34.383324 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:34.383601 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:34.383955 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.383623 42731 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.384202 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0118 08:57:34.384251 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0118 08:57:34.384308 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:34.384377 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:34.387346 42731 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0118 08:57:34.387475 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:34.387522 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0118 08:57:34.387554 42731 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0118 08:57:34.387664 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:34.387698 42731 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatecalico-exa-hocohm", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatecalico-exa-hocohm" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0118 08:57:34.387675 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0118 08:57:34.387762 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0118 08:57:34.387782 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0118 08:57:34.387805 42731 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0118 08:57:34.387833 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0118 08:57:34.387876 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:34.387907 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0118 08:57:34.387979 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:34.388027 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0118 08:57:34.388113 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:34.388185 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:34.388251 42731 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0118 08:57:34.388288 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0118 08:57:34.388222 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0118 08:57:34.388389 42731 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0118 08:57:34.388369 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0118 08:57:34.388452 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0118 08:57:34.388448 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:34.388504 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0118 08:57:34.388603 42731 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0118 08:57:34.388681 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:34.388749 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:34.388831 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0118 08:57:34.389003 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:34.389079 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0118 08:57:34.389163 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:34.389238 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0118 08:57:34.389320 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:34.389302 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0118 08:57:34.389386 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:34.389427 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:34.389468 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:34.389502 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:34.389532 42731 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0118 08:57:34.389574 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:34.389620 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:34.389659 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:34.389761 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:57:34.389801 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:34.389845 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.privatecalico.example.com" }] }], VpcId: "vpc-1" } I0118 08:57:34.389941 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0118 08:57:34.389988 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:57:34.390019 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:34.390070 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0118 08:57:34.389949 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatecalico.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0118 08:57:34.390174 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0118 08:57:34.390246 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:57:34.390295 42731 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0118 08:57:34.390407 42731 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0118 08:57:34.390569 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.390659 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:34.390719 42731 loadbalancers.go:35] PageSize not implemented W0118 08:57:34.390785 42731 api.go:53] PageSize not implemented I0118 08:57:34.390714 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-udp-1to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.390828 42731 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatecalico-exa-hocohm", SubnetMappings: [{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }], Type: "network" } I0118 08:57:34.390836 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.390966 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:57:34.390935 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:34.391060 42731 tags.go:74] AddTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"], Tags: [{ Key: "Name", Value: "api.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0118 08:57:34.391149 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:34.391123 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0118 08:57:34.391241 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:34.391182 42731 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0118 08:57:34.391354 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:57:34.391327 42731 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0118 08:57:34.391471 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:34.391562 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:34.391720 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" }] }] } I0118 08:57:34.391867 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-4-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0118 08:57:34.392048 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0118 08:57:34.392156 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:34.392242 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:34.392298 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0118 08:57:34.392482 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-2382to4000-masters.privatecalico.example.com" }] }] } I0118 08:57:34.392607 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:34.392680 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:57:34.392760 42731 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.392756 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0118 08:57:34.392869 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:34.392931 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:34.392965 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0118 08:57:34.392994 42731 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1", Port: 22, Protocol: "TCP" } W0118 08:57:34.393090 42731 api.go:53] PageSize not implemented I0118 08:57:34.393112 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:34.393073 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-::/0" }] }] } I0118 08:57:34.393187 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.393284 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.393379 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.393481 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatecalico.example.com" }] }] } I0118 08:57:34.393581 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0118 08:57:34.393683 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:57:34.393722 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-masters.privatecalico.example.com" }] }] } I0118 08:57:34.393833 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0118 08:57:34.393932 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0118 08:57:34.394005 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.394101 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.394198 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-1to2379-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.394298 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0118 08:57:34.394397 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-4003to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0118 08:57:34.394510 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0118 08:57:34.394546 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0118 08:57:34.394650 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0118 08:57:34.394760 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0118 08:57:34.394872 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0118 08:57:34.394902 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0118 08:57:34.394959 42731 executor.go:111] Tasks: 120 done / 142 total; 6 can run I0118 08:57:34.395031 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0118 08:57:34.395078 42731 api.go:53] PageSize not implemented I0118 08:57:34.395091 42731 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:34.395135 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:34.395063 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0118 08:57:34.395263 42731 api.go:53] PageSize not implemented I0118 08:57:34.395318 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:34.395253 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:34.395379 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:34.395212 42731 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" }] }] } I0118 08:57:34.395450 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:34.395507 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0118 08:57:34.395557 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:34.395593 42731 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0118 08:57:34.400253 42731 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0118 08:57:34.400425 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:34.400574 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0118 08:57:34.400625 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:34.400720 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:34.400878 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:34.400984 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:34.401607 42731 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0118 08:57:34.401828 42731 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0118 08:57:34.402026 42731 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0118 08:57:34.402080 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:34.402112 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:34.402174 42731 dns.go:235] Pre-creating DNS records I0118 08:57:34.402196 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:34.407749 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:57:34.410832 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:34.410908 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:34.410954 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:35.650730 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:36.009591 42731 iamrole.go:89] ListRoles: { } I0118 08:57:36.011493 42731 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0118 08:57:36.011748 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:36.011775 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.011978 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:36.012406 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.012529 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] }] } I0118 08:57:36.012726 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.012846 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:36.012872 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:36.012916 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:36.014987 42731 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0118 08:57:36.015078 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:36.015168 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0118 08:57:36.015168 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.015249 42731 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0118 08:57:36.015339 42731 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0118 08:57:36.015278 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.015352 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0118 08:57:36.015431 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0118 08:57:36.015462 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0118 08:57:36.015437 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0118 08:57:36.015612 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:36.015669 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0118 08:57:36.015828 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:57:36.015873 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.015979 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0118 08:57:36.016089 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:36.016128 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:36.016198 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.016297 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:36.016325 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0118 08:57:36.016465 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:36.016508 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:36.016554 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.016692 42731 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0118 08:57:36.016818 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:36.016892 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:36.016909 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0118 08:57:36.016948 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0118 08:57:36.016869 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0118 08:57:36.016975 42731 api.go:53] PageSize not implemented I0118 08:57:36.016978 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0118 08:57:36.017010 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0118 08:57:36.017001 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:36.017021 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0118 08:57:36.017040 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0118 08:57:36.017069 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:36.017081 42731 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0118 08:57:36.017104 42731 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatecalico-example-0uch4k" } W0118 08:57:36.017157 42731 api.go:53] PageSize not implemented I0118 08:57:36.017159 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0118 08:57:36.017176 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:36.017239 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:36.017343 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:36.017448 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:36.017684 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:36.017835 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:36.017944 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:36.018203 42731 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0118 08:57:36.018257 42731 api.go:53] PageSize not implemented I0118 08:57:36.018289 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:36.018284 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:36.018357 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } W0118 08:57:36.018388 42731 api.go:53] PageSize not implemented I0118 08:57:36.018410 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:36.018431 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:36.018463 42731 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0118 08:57:36.018485 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:36.018556 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:36.018611 42731 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0118 08:57:36.018633 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:36.023836 42731 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0118 08:57:36.023955 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:36.024058 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:36.024167 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:36.024319 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:36.024447 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:36.024810 42731 executor.go:111] Tasks: 134 done / 142 total; 2 can run W0118 08:57:36.024885 42731 api.go:53] PageSize not implemented I0118 08:57:36.024900 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:36.025055 42731 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0118 08:57:36.025264 42731 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0118 08:57:36.028149 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:57:36.028203 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:36.028232 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:57:36.028257 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0118 08:57:36.028282 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:57:36.028307 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:57:36.028332 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:57:36.028356 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:36.028382 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:57:36.028405 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:57:36.028433 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:57:36.028465 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0118 08:57:36.028494 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0118 08:57:36.028520 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:57:36.028543 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:57:36.028565 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:36.028596 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:57:36.028621 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:57:36.028647 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:36.028672 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:36.028698 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:57:36.028726 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0118 08:57:36.028755 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:36.028781 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:57:36.028804 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:36.028831 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:57:36.028854 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:57:36.028877 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:36.028905 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:36.028932 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:36.028958 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:57:36.030269 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:57:36.030329 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:57:36.030347 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:57:36.030384 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.030431 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0118 08:57:36.030486 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.030541 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.030578 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.030618 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.030653 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.030687 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0118 08:57:36.030734 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.030779 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:57:36.030803 42731 natgateway.go:117] DescribeNatGateways: { } I0118 08:57:36.030835 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0118 08:57:36.030865 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } W0118 08:57:36.030908 42731 api.go:53] PageSize not implemented I0118 08:57:36.030922 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0118 08:57:36.030959 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:36.030980 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:36.030994 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0118 08:57:36.031026 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:57:36.031046 42731 targetgroups.go:35] PageSize not implemented I0118 08:57:36.031060 42731 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" ] } I0118 08:57:36.031106 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:57:36.031140 42731 iamrole.go:89] ListRoles: { } I0118 08:57:36.031184 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:36.031207 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:36.031240 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:57:36.031279 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:57:36.031312 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0118 08:57:36.031342 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0118 08:57:36.031370 42731 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0118 08:57:36.031916 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0118 08:57:36.031965 42731 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1 ok I0118 08:57:36.031986 42731 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0118 08:57:36.032011 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } autoscaling-config:lt-2 ok I0118 08:57:36.032082 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } iam-instance-profile:bastions.privatecalico.example.com ok I0118 08:57:36.032079 42731 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4 ok I0118 08:57:36.032088 42731 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0118 08:57:36.032120 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0118 08:57:36.032191 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } iam-instance-profile:nodes.privatecalico.example.com ok I0118 08:57:36.032157 42731 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } autoscaling-group:nodes.privatecalico.example.com ok internet-gateway:igw-2 ok I0118 08:57:36.032232 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0118 08:57:36.032270 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } iam-instance-profile:masters.privatecalico.example.com ok I0118 08:57:36.032251 42731 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatecalico-example-0uch4k" } load-balancer:api-privatecalico-example-0uch4k ok I0118 08:57:36.032115 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:36.032266 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.privatecalico.example.com. ok autoscaling-group:master-us-test-1a.masters.privatecalico.example.com ok autoscaling-group:bastion.privatecalico.example.com ok I0118 08:57:36.032338 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } W0118 08:57:36.032449 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:36.032472 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0118 08:57:36.032511 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-1 ok I0118 08:57:36.032576 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:36.032620 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0118 08:57:36.032791 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:36.032809 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok autoscaling-config:lt-3 ok I0118 08:57:36.032850 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0118 08:57:36.032893 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:36.032930 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 } ] } W0118 08:57:36.033088 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:36.033101 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0118 08:57:36.033190 42731 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0118 08:57:36.033223 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatecalico.example.com" } I0118 08:57:36.033243 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0118 08:57:36.033283 42731 iamrole.go:180] ListAttachedRolePolicies: masters.privatecalico.example.com I0118 08:57:36.033296 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0118 08:57:36.033325 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.privatecalico.example.com" } iam-role:masters.privatecalico.example.com ok I0118 08:57:36.033312 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } I0118 08:57:36.033355 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatecalico.example.com" } subnet:subnet-1 ok I0118 08:57:36.033387 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.privatecalico.example.com I0118 08:57:36.033398 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0118 08:57:36.033399 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:57:36.033424 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatecalico.example.com" } iam-role:nodes.privatecalico.example.com ok I0118 08:57:36.033447 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatecalico.example.com" } I0118 08:57:36.033478 42731 iamrole.go:180] ListAttachedRolePolicies: bastions.privatecalico.example.com I0118 08:57:36.033488 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0118 08:57:36.033507 42731 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatecalico.example.com" } iam-role:bastions.privatecalico.example.com ok I0118 08:57:36.033445 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 } ] } W0118 08:57:36.033565 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:36.033578 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0118 08:57:36.033647 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0118 08:57:36.033699 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0118 08:57:36.033766 42731 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0118 08:57:36.033826 42731 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateCalico (3.35s) === RUN TestLifecyclePrivateKopeio I0118 08:57:36.034357 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:36.034678 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:36.034713 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:36.034747 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:36.034778 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:36.034819 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:36.034852 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:36.034875 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:36.034906 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:36.034929 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatekopeio.example.com I0118 08:57:36.058592 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:36.061600 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:36.061670 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:36.061718 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:37.331059 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:37.482987 42731 iamrole.go:89] ListRoles: { } I0118 08:57:37.486586 42731 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0118 08:57:37.486807 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.487010 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:37.487138 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:37.487191 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.487206 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } I0118 08:57:37.487214 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:37.487305 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] } I0118 08:57:37.487346 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:37.487475 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:37.487505 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } I0118 08:57:37.487566 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "bastions.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0118 08:57:37.487536 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:37.487668 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } I0118 08:57:37.487744 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0118 08:57:37.487718 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.487921 42731 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0118 08:57:37.487919 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.488064 42731 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0118 08:57:37.488155 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:37.488200 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.488335 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0118 08:57:37.488369 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0118 08:57:37.488392 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:37.488426 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:37.489144 42731 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0118 08:57:37.489245 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.489340 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0118 08:57:37.489360 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0118 08:57:37.489415 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0118 08:57:37.489472 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0118 08:57:37.489529 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0118 08:57:37.489594 42731 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0118 08:57:37.489543 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.489582 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0118 08:57:37.489698 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0118 08:57:37.489747 42731 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0118 08:57:37.489812 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0118 08:57:37.489870 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.489790 42731 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatekopeio-exa-d8ef8e", Port: 22, Protocol: "TCP", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-privatekopeio-exa-d8ef8e" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0118 08:57:37.489968 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0118 08:57:37.490098 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0118 08:57:37.490085 42731 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0118 08:57:37.490164 42731 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0118 08:57:37.490172 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" } ] }], VpcId: "vpc-1" } I0118 08:57:37.490200 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.490479 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:37.490530 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:37.490526 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.8.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0118 08:57:37.490698 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.490841 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0118 08:57:37.490940 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0118 08:57:37.490992 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.491119 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0118 08:57:37.491223 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0118 08:57:37.491264 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:37.491378 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.privatekopeio.example.com" }] }], VpcId: "vpc-1" } I0118 08:57:37.491503 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.491633 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0118 08:57:37.491783 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:37.491910 42731 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0118 08:57:37.491958 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:37.492032 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0118 08:57:37.492128 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0118 08:57:37.492180 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:37.492229 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0118 08:57:37.492267 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0118 08:57:37.492295 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:37.492366 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:37.492408 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:37.492449 42731 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0118 08:57:37.492505 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:37.492563 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:37.492602 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0118 08:57:37.492388 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatekopeio.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0118 08:57:37.492718 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0118 08:57:37.492741 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:37.492856 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:57:37.492910 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:37.492953 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0118 08:57:37.493029 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.privatekopeio.example.com" }] }], VpcId: "vpc-1" } I0118 08:57:37.493100 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0118 08:57:37.493148 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:57:37.493192 42731 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0118 08:57:37.493284 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:37.493329 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:37.493370 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0118 08:57:37.493411 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:57:37.493448 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:37.493490 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:37.493525 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0118 08:57:37.493569 42731 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0118 08:57:37.493676 42731 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0118 08:57:37.493868 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:37.493943 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:37.493851 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.493996 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-2382to4000-masters.privatekopeio.example.com" }] }] } I0118 08:57:37.494043 42731 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatekopeio-exa-d8ef8e", SubnetMappings: [{ SubnetId: "subnet-1" },{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], Type: "network" } W0118 08:57:37.494130 42731 api.go:53] PageSize not implemented I0118 08:57:37.494119 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:37.494264 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0118 08:57:37.494246 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:37.494309 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-3" } I0118 08:57:37.494323 42731 tags.go:74] AddTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"], Tags: [{ Key: "Name", Value: "api.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0118 08:57:37.494378 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:37.494404 42731 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0118 08:57:37.494412 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0118 08:57:37.494455 42731 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0118 08:57:37.494580 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.494760 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.494873 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:37.494986 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-3" } I0118 08:57:37.495035 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0118 08:57:37.495102 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:37.495161 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0118 08:57:37.495277 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.495385 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0118 08:57:37.495446 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:37.495492 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.495649 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:37.495771 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-3" } I0118 08:57:37.495817 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:57:37.495913 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-4003to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.496028 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-1to2379-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.496138 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:37.496199 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:37.496251 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.496385 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.496497 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0118 08:57:37.496607 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:57:37.496644 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatekopeio.example.com" }] }] } I0118 08:57:37.496745 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0118 08:57:37.496851 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0118 08:57:37.496888 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:57:37.496962 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.497066 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0118 08:57:37.497169 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-::/0" }] }] } I0118 08:57:37.497272 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:37.497352 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-udp-1to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.497460 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.8.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0118 08:57:37.497567 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:37.497603 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-::/0" }] }] } I0118 08:57:37.497642 42731 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1", Port: 22, Protocol: "TCP" } I0118 08:57:37.497704 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } W0118 08:57:37.497734 42731 api.go:53] PageSize not implemented I0118 08:57:37.497751 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:37.497736 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0118 08:57:37.497860 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0118 08:57:37.497937 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0118 08:57:37.497969 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0118 08:57:37.497996 42731 tags.go:42] CreateTags { Resources: ["nat-a2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0118 08:57:37.498034 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-1" } I0118 08:57:37.498065 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:37.498149 42731 tags.go:42] CreateTags { Resources: ["nat-b2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0118 08:57:37.498188 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:37.498223 42731 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0118 08:57:37.498251 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:57:37.498286 42731 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0118 08:57:37.498320 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }] } I0118 08:57:37.498399 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-2" } I0118 08:57:37.498434 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-4" } I0118 08:57:37.498463 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:37.498501 42731 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0118 08:57:37.498529 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:37.498559 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0118 08:57:37.498620 42731 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0118 08:57:37.498683 42731 api.go:53] PageSize not implemented I0118 08:57:37.498693 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:37.498723 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } W0118 08:57:37.498763 42731 api.go:53] PageSize not implemented I0118 08:57:37.498813 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:37.498777 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:37.498885 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:37.498886 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:37.498960 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:37.499031 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:37.499242 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-a2345678", RouteTableId: "rtb-1" } I0118 08:57:37.499302 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-b2345678", RouteTableId: "rtb-2" } I0118 08:57:37.503327 42731 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0118 08:57:37.503629 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:37.503738 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:37.503904 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:37.504019 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:37.504394 42731 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0118 08:57:37.504635 42731 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0118 08:57:37.504863 42731 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0118 08:57:37.504905 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:37.504937 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:37.504996 42731 dns.go:235] Pre-creating DNS records I0118 08:57:37.505017 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:37.510424 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:37.513420 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:37.513498 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:37.513547 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:38.742935 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:38.901677 42731 iamrole.go:89] ListRoles: { } I0118 08:57:38.902988 42731 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0118 08:57:38.903572 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:38.904189 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:38.904600 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.904692 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] }] } I0118 08:57:38.904820 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.904999 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:38.905041 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:38.905116 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:38.905165 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.906417 42731 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0118 08:57:38.906542 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.906643 42731 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0118 08:57:38.906768 42731 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0118 08:57:38.906743 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0118 08:57:38.906833 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0118 08:57:38.906873 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0118 08:57:38.906698 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] }] } I0118 08:57:38.906973 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0118 08:57:38.906984 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:38.907050 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.907263 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.907387 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0118 08:57:38.907537 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:38.907573 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0118 08:57:38.907732 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:57:38.907790 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.907934 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:38.907971 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:38.908051 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.908157 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:38.908192 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0118 08:57:38.908313 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:38.908368 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0118 08:57:38.908523 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:38.908577 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:38.908680 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.908792 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.908903 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0118 08:57:38.909003 42731 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0118 08:57:38.909172 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } W0118 08:57:38.909216 42731 api.go:53] PageSize not implemented I0118 08:57:38.909251 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:38.909244 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:38.909311 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:38.909328 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0118 08:57:38.909337 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:38.909363 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0118 08:57:38.909298 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:38.909391 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0118 08:57:38.909409 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:38.909423 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0118 08:57:38.909441 42731 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0118 08:57:38.909452 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0118 08:57:38.909461 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } W0118 08:57:38.909524 42731 api.go:53] PageSize not implemented I0118 08:57:38.909542 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:38.909536 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0118 08:57:38.909594 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:38.909651 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:38.909711 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:38.909974 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:38.910114 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:38.910210 42731 executor.go:111] Tasks: 122 done / 144 total; 7 can run I0118 08:57:38.910280 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:38.910372 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:38.910377 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:38.910413 42731 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" W0118 08:57:38.910388 42731 api.go:53] PageSize not implemented I0118 08:57:38.910448 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:38.910510 42731 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0118 08:57:38.910468 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } W0118 08:57:38.910655 42731 api.go:53] PageSize not implemented I0118 08:57:38.910698 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:38.910776 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:38.910885 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:38.915070 42731 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0118 08:57:38.915191 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:38.915349 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:38.915480 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:38.915614 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:38.916026 42731 executor.go:111] Tasks: 136 done / 144 total; 2 can run W0118 08:57:38.916127 42731 api.go:53] PageSize not implemented I0118 08:57:38.916150 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:38.916325 42731 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0118 08:57:38.916554 42731 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0118 08:57:38.919143 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:57:38.919194 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:38.919222 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:57:38.919244 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:57:38.919265 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:57:38.919291 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:57:38.919313 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:38.919339 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:57:38.919366 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:57:38.919393 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:57:38.919422 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0118 08:57:38.919454 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:57:38.919479 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:57:38.919500 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:38.919528 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:57:38.919551 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:57:38.919575 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0118 08:57:38.919600 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:38.919626 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:38.919652 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:57:38.919699 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0118 08:57:38.919729 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:38.919757 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:57:38.919781 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:38.919805 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0118 08:57:38.919831 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0118 08:57:38.919856 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:57:38.919877 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:57:38.919897 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:38.919922 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:38.919948 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:38.919972 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:57:38.921202 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:57:38.921261 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:57:38.921275 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:57:38.921310 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.921355 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0118 08:57:38.921405 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.921453 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.921487 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.921526 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.921559 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.921598 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0118 08:57:38.921650 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.921697 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:57:38.921722 42731 natgateway.go:117] DescribeNatGateways: { } I0118 08:57:38.921750 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0118 08:57:38.921781 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } W0118 08:57:38.921821 42731 api.go:53] PageSize not implemented I0118 08:57:38.921835 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0118 08:57:38.921865 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:38.921885 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:38.921897 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0118 08:57:38.921925 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:57:38.921942 42731 targetgroups.go:35] PageSize not implemented I0118 08:57:38.921959 42731 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" ] } I0118 08:57:38.921999 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:57:38.922031 42731 iamrole.go:89] ListRoles: { } I0118 08:57:38.922066 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:38.922088 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:38.922119 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:57:38.922160 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:57:38.922197 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3","rtb-1","rtb-2"] } I0118 08:57:38.922229 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0118 08:57:38.922251 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } autoscaling-group:nodes.privatekopeio.example.com ok I0118 08:57:38.922777 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0118 08:57:38.922785 42731 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4 ok autoscaling-group:bastion.privatekopeio.example.com ok I0118 08:57:38.922829 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:57:38.922847 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0118 08:57:38.922917 42731 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1 ok I0118 08:57:38.922929 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } iam-instance-profile:nodes.privatekopeio.example.com ok I0118 08:57:38.922975 42731 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0118 08:57:38.922905 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } load-balancer:api-privatekopeio-example-tl2bv8 ok autoscaling-group:master-us-test-1a.masters.privatekopeio.example.com ok W0118 08:57:38.923043 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:38.923061 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0118 08:57:38.922978 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0118 08:57:38.923114 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } I0118 08:57:38.923127 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } volume:vol-2 ok iam-instance-profile:masters.privatekopeio.example.com ok I0118 08:57:38.922963 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.privatekopeio.example.com. ok I0118 08:57:38.923174 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0118 08:57:38.923164 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:38.923223 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } iam-instance-profile:bastions.privatekopeio.example.com ok I0118 08:57:38.923240 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0118 08:57:38.923435 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:38.923456 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-3 ok I0118 08:57:38.923493 42731 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0118 08:57:38.923545 42731 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-1 ok I0118 08:57:38.923580 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0118 08:57:38.923627 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:38.923670 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 } ] } W0118 08:57:38.923804 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:38.923821 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok autoscaling-config:lt-2 ok I0118 08:57:38.923902 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0118 08:57:38.923951 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0118 08:57:38.923935 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatekopeio.example.com" } I0118 08:57:38.923988 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:38.924000 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatekopeio.example.com" } I0118 08:57:38.924062 42731 iamrole.go:180] ListAttachedRolePolicies: masters.privatekopeio.example.com I0118 08:57:38.924025 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0118 08:57:38.924076 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } W0118 08:57:38.924101 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:38.924107 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.privatekopeio.example.com" } I0118 08:57:38.924114 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } iam-role:masters.privatekopeio.example.com ok security-group:sg-1 ok I0118 08:57:38.924139 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0118 08:57:38.924153 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatekopeio.example.com" } I0118 08:57:38.924188 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0118 08:57:38.924182 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0118 08:57:38.924198 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0118 08:57:38.924218 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatekopeio.example.com" } iam-role:nodes.privatekopeio.example.com ok I0118 08:57:38.924243 42731 iamrole.go:180] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0118 08:57:38.924254 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0118 08:57:38.924275 42731 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatekopeio.example.com" } iam-role:bastions.privatekopeio.example.com ok I0118 08:57:38.924348 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0118 08:57:38.924402 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0118 08:57:38.924445 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0118 08:57:38.924509 42731 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0118 08:57:38.924569 42731 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateKopeio (2.89s) === RUN TestLifecycleIPv6 I0118 08:57:38.925080 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:38.925390 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:38.925425 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:38.925459 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:38.925491 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:38.925529 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:38.925564 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:38.925588 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:38.925620 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:38.925643 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal-ipv6.example.com I0118 08:57:38.949860 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:57:38.953030 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:38.953104 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:40.208536 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:40.366918 42731 iamrole.go:89] ListRoles: { } I0118 08:57:40.368664 42731 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0118 08:57:40.369209 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } I0118 08:57:40.369309 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] } I0118 08:57:40.369222 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.369506 42731 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0118 08:57:40.369561 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.369798 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] }] } I0118 08:57:40.369954 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:40.370059 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.370214 42731 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "minimal-ipv6.example.com" }] }] } I0118 08:57:40.370311 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:40.370270 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } I0118 08:57:40.370385 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:40.370359 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:40.370403 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", Tags: [{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] } I0118 08:57:40.370483 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:40.370529 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.370666 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:40.370774 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:40.370824 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0118 08:57:40.370854 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0118 08:57:40.370878 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:40.370914 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:40.371712 42731 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0118 08:57:40.371819 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0118 08:57:40.371908 42731 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0118 08:57:40.371963 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0118 08:57:40.371966 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0118 08:57:40.372072 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0118 08:57:40.372114 42731 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-minimal-ipv6-example--bne5ih", Port: 443, Protocol: "TCP", Tags: [{ Key: "Name", Value: "tcp-minimal-ipv6-example--bne5ih" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0118 08:57:40.372168 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0118 08:57:40.372152 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.372213 42731 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0118 08:57:40.372253 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0118 08:57:40.372256 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0118 08:57:40.372354 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0118 08:57:40.372342 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.372415 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0118 08:57:40.372449 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0118 08:57:40.372584 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0118 08:57:40.372628 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:40.372758 42731 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0118 08:57:40.372803 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.372950 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:40.373053 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" }] }], VpcId: "vpc-1" } I0118 08:57:40.373134 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:40.373177 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:40.373217 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] }] } I0118 08:57:40.373314 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0118 08:57:40.373392 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0118 08:57:40.373416 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0118 08:57:40.373565 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:40.373629 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:40.373663 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:40.373732 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0118 08:57:40.373768 42731 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0118 08:57:40.373828 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.373904 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:57:40.373744 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal-ipv6.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0118 08:57:40.373988 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:57:40.374061 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:40.374096 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:40.374128 42731 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0118 08:57:40.374163 42731 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.374234 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:40.374272 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:57:40.374313 42731 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal-ipv6.example.com" } ] } I0118 08:57:40.374387 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:40.374439 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0118 08:57:40.374557 42731 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0118 08:57:40.374726 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0118 08:57:40.374826 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.374987 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.4.0/22", Ipv6CidrBlock: "2001:db8:0:116::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0118 08:57:40.374941 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.375125 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.375294 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", Ipv6CidrBlock: "2001:db8:0:114::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "dualstack-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0118 08:57:40.375370 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0118 08:57:40.375499 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0118 08:57:40.375650 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-udp-1to65535-masters.minimal-ipv6.example.com" }] }] } I0118 08:57:40.375831 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0118 08:57:40.375945 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:40.376010 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.376083 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:57:40.376153 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", Ipv6CidrBlock: "2001:db8:0:112::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0118 08:57:40.376171 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-2382to4000-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.376282 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.376391 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:40.376456 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.376469 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", Ipv6CidrBlock: "2001:db8:0:111::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0118 08:57:40.376550 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:40.376614 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:40.376624 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.0.0/22", Ipv6CidrBlock: "2001:db8:0:115::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0118 08:57:40.376682 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:40.376706 42731 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.376740 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:40.376824 42731 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.376799 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.376934 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.377063 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:40.377165 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-1" } I0118 08:57:40.377223 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0118 08:57:40.377265 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:40.377238 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", Ipv6CidrBlock: "2001:db8:0:113::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "dualstack-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0118 08:57:40.377295 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.377414 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-4003to65535-masters.minimal-ipv6.example.com" }] }] } I0118 08:57:40.377525 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-1to2379-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.377630 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" }] }] } I0118 08:57:40.377747 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0118 08:57:40.377785 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0118 08:57:40.377831 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0118 08:57:40.377894 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" }] }] } I0118 08:57:40.378032 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.378147 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.378285 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0118 08:57:40.378333 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0118 08:57:40.378366 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" }] }] } I0118 08:57:40.378489 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.378606 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0118 08:57:40.378646 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-3" } I0118 08:57:40.378694 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.378821 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0118 08:57:40.378864 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0118 08:57:40.378900 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:40.378937 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:40.378970 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:40.379015 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:40.379091 42731 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0118 08:57:40.379165 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:40.379180 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:40.379236 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:40.379260 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:40.379359 42731 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-5"] }] } I0118 08:57:40.379337 42731 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "dualstack", Name: "api-minimal-ipv6-example--jhj9te", SubnetMappings: [{ SubnetId: "subnet-5" },{ SubnetId: "subnet-1" }], Tags: [{ Key: "Name", Value: "api.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], Type: "network" } I0118 08:57:40.379413 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0118 08:57:40.379444 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:40.379484 42731 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1", Port: 443, Protocol: "TCP" } I0118 08:57:40.379476 42731 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-2", SubnetId: "subnet-5", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.379520 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:40.379554 42731 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "false" },{ Key: "access_logs.s3.enabled", Value: "false" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } W0118 08:57:40.379612 42731 api.go:53] PageSize not implemented I0118 08:57:40.379664 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-6"] }] } I0118 08:57:40.379740 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-6" } I0118 08:57:40.379792 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:40.379892 42731 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:40.379966 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:40.380009 42731 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-1", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0118 08:57:40.380087 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0118 08:57:40.380123 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:40.380156 42731 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-2" }] } I0118 08:57:40.380192 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0118 08:57:40.380240 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-2" } I0118 08:57:40.380275 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0118 08:57:40.380308 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0118 08:57:40.380338 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:40.380462 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-5"] }] } I0118 08:57:40.380505 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:40.380583 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:40.380648 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-5" } I0118 08:57:40.380687 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0118 08:57:40.380740 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0118 08:57:40.380779 42731 tags.go:42] CreateTags { Resources: ["subnet-5"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0118 08:57:40.380816 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0118 08:57:40.380868 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-3" } I0118 08:57:40.380901 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0118 08:57:40.380935 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-4" } I0118 08:57:40.380992 42731 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0118 08:57:40.381074 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:40.381070 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:40.381121 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:40.381076 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:40.381156 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0118 08:57:40.381219 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-2", RouteTableId: "rtb-3" } I0118 08:57:40.381163 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:40.381276 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:40.381307 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:40.381315 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:40.381384 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:40.381391 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0118 08:57:40.381402 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0118 08:57:40.381437 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:40.381403 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:40.381536 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-2", RouteTableId: "rtb-3" } I0118 08:57:40.381572 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:40.381662 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0118 08:57:40.385674 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:57:40.385831 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:40.385957 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:40.386106 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:40.386202 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:40.386648 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:57:40.386883 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:57:40.387090 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:57:40.387134 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:40.387163 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:40.387224 42731 dns.go:235] Pre-creating DNS records I0118 08:57:40.387246 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:40.397769 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0118 08:57:40.400931 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:40.401014 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:41.681806 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:41.839357 42731 iamrole.go:89] ListRoles: { } I0118 08:57:41.840740 42731 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0118 08:57:41.841155 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:41.841280 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.843601 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:41.844353 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.844690 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] }] } I0118 08:57:41.844875 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.844988 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:41.845018 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:41.845077 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:41.847052 42731 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0118 08:57:41.847256 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0118 08:57:41.847350 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0118 08:57:41.847421 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0118 08:57:41.847457 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0118 08:57:41.847520 42731 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0118 08:57:41.847318 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.847605 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:41.847734 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0118 08:57:41.847896 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:41.847958 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0118 08:57:41.848574 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:41.848615 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.848726 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:41.848799 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0118 08:57:41.848921 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:41.848973 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.849137 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.849256 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.849594 42731 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0118 08:57:41.849849 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:41.849979 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0118 08:57:41.850102 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:41.850225 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:41.850290 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0118 08:57:41.850318 42731 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0118 08:57:41.850349 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0118 08:57:41.850403 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.850528 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0118 08:57:41.850593 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:41.850663 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:41.850748 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.850856 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0118 08:57:41.850906 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] }] } I0118 08:57:41.851014 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:41.851070 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.851173 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:41.851250 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.851347 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:41.851412 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:41.851481 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.851583 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0118 08:57:41.851613 42731 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0118 08:57:41.851639 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0118 08:57:41.851716 42731 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0118 08:57:41.851781 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:41.851850 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:41.851862 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0118 08:57:41.851964 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0118 08:57:41.852010 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:41.852030 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0118 08:57:41.852038 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:41.852100 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0118 08:57:41.852070 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0118 08:57:41.852150 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:41.852180 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0118 08:57:41.852206 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0118 08:57:41.852216 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0118 08:57:41.852245 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0118 08:57:41.852248 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0118 08:57:41.852323 42731 api.go:53] PageSize not implemented I0118 08:57:41.852309 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:41.852364 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:41.852440 42731 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0118 08:57:41.852497 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:41.852492 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:41.852579 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:41.852561 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:41.852547 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:41.852593 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0118 08:57:41.852622 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0118 08:57:41.852634 42731 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0118 08:57:41.852653 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:41.852696 42731 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0118 08:57:41.852688 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:41.852674 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:41.852730 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0118 08:57:41.852821 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:41.852867 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:41.852880 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0118 08:57:41.852946 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:41.852971 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0118 08:57:41.857801 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:57:41.857911 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:41.858084 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:41.858230 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:41.858368 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:41.858975 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:57:41.859140 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:57:41.859336 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:57:41.862241 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:57:41.862296 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:41.862326 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:57:41.862353 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-2"] }] } I0118 08:57:41.862379 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0118 08:57:41.862405 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:57:41.862430 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0118 08:57:41.862457 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:57:41.862481 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:57:41.862505 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:41.862532 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:57:41.862558 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:57:41.862587 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:57:41.862616 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0118 08:57:41.862643 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0118 08:57:41.862669 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:57:41.862691 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:57:41.862715 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:41.862738 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:57:41.862761 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:57:41.862786 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0118 08:57:41.862810 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:41.862835 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:41.862861 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:57:41.862885 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:41.862913 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:57:41.862938 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:41.862965 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0118 08:57:41.862992 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0118 08:57:41.863041 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0118 08:57:41.863072 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0118 08:57:41.863098 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:57:41.863123 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:57:41.863147 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:41.863175 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:41.863203 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:41.863229 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:57:41.864911 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:57:41.864966 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:57:41.864982 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:57:41.865018 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.865061 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0118 08:57:41.865111 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.865160 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.865201 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.865245 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.865284 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.865322 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0118 08:57:41.865379 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.865443 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:57:41.865471 42731 natgateway.go:117] DescribeNatGateways: { } I0118 08:57:41.865507 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0118 08:57:41.865538 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } W0118 08:57:41.865582 42731 api.go:53] PageSize not implemented I0118 08:57:41.865599 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:41.865619 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:41.865634 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0118 08:57:41.865665 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:57:41.865684 42731 targetgroups.go:35] PageSize not implemented I0118 08:57:41.865699 42731 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" ] } I0118 08:57:41.865743 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:57:41.865782 42731 iamrole.go:89] ListRoles: { } I0118 08:57:41.865822 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:41.865844 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:41.865879 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:57:41.865918 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:57:41.865961 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-3","rtb-2"] } I0118 08:57:41.865996 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0118 08:57:41.866024 42731 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0118 08:57:41.866051 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0118 08:57:41.866075 42731 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } autoscaling-group:nodes.minimal-ipv6.example.com ok I0118 08:57:41.866631 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0118 08:57:41.866691 42731 egressonlyinternetgateways.go:171] DeleteEgressOnlyInternetGateway: { EgressOnlyInternetGatewayId: "eigw-2" } autoscaling-group:master-us-test-1a.masters.minimal-ipv6.example.com ok egress-only-internet-gateway:eigw-2 ok I0118 08:57:41.866740 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:41.866726 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0118 08:57:41.866794 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } iam-instance-profile:masters.minimal-ipv6.example.com ok I0118 08:57:41.866791 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:41.866826 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0118 08:57:41.866868 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } iam-instance-profile:nodes.minimal-ipv6.example.com ok I0118 08:57:41.866781 42731 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1 ok I0118 08:57:41.866916 42731 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4 ok I0118 08:57:41.866820 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.internal.minimal-ipv6.example.com. ok I0118 08:57:41.866859 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0118 08:57:41.867120 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:41.867142 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0118 08:57:41.867172 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0118 08:57:41.867213 42731 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0118 08:57:41.867269 42731 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0118 08:57:41.867299 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0118 08:57:41.867348 42731 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-2" } nat-gateway:nat-2 ok I0118 08:57:41.867393 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok autoscaling-config:lt-1 ok I0118 08:57:41.867449 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0118 08:57:41.867508 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0118 08:57:41.867546 42731 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0118 08:57:41.867595 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-5" } subnet:subnet-5 ok I0118 08:57:41.867639 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:41.867679 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0118 08:57:41.867789 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:41.867804 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0118 08:57:41.867883 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal-ipv6.example.com" } I0118 08:57:41.867924 42731 iamrole.go:180] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0118 08:57:41.867897 42731 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-2" } elastic-ip:eipalloc-2 ok I0118 08:57:41.867940 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0118 08:57:41.867994 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal-ipv6.example.com" } iam-role:masters.minimal-ipv6.example.com ok I0118 08:57:41.867975 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0118 08:57:41.868024 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal-ipv6.example.com" } I0118 08:57:41.868055 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0118 08:57:41.868065 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0118 08:57:41.868086 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal-ipv6.example.com" } iam-role:nodes.minimal-ipv6.example.com ok I0118 08:57:41.868052 42731 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0118 08:57:41.868122 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-6" } subnet:subnet-6 ok I0118 08:57:41.868161 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0118 08:57:41.868195 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0118 08:57:41.868259 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0118 08:57:41.868301 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0118 08:57:41.868354 42731 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0118 08:57:41.868409 42731 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleIPv6 (2.94s) === RUN TestLifecycleSharedVPC I0118 08:57:41.868905 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:41.869237 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:41.869271 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:41.869306 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:41.869337 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:41.869376 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:41.869411 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:41.869435 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:41.869464 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:41.869486 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedvpc.example.com I0118 08:57:41.889399 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:41.892129 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:41.892200 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:43.139905 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:43.291673 42731 iamrole.go:89] ListRoles: { } I0118 08:57:43.293224 42731 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0118 08:57:43.293620 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } I0118 08:57:43.293744 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0118 08:57:43.293816 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:43.293955 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } I0118 08:57:43.294017 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:57:43.294057 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedvpc.example.com" }] } I0118 08:57:43.294129 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0118 08:57:43.294159 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0118 08:57:43.294209 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:43.294352 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:43.294349 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:43.294402 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:43.294577 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedvpc.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:43.294698 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:43.294743 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:43.294880 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0118 08:57:43.296327 42731 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0118 08:57:43.296533 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0118 08:57:43.296619 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:43.296735 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0118 08:57:43.296796 42731 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0118 08:57:43.296761 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0118 08:57:43.296873 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0118 08:57:43.296811 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.sharedvpc.example.com" } ] }], VpcId: "vpc-12345678" } I0118 08:57:43.296955 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:43.297008 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:43.296986 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0118 08:57:43.297053 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:57:43.297165 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:43.297241 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0118 08:57:43.297320 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0118 08:57:43.297361 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" } ] }], VpcId: "vpc-12345678" } I0118 08:57:43.297438 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:43.297478 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "sharedvpc.example.com" } ] } I0118 08:57:43.297561 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }], VpcId: "vpc-12345678" } I0118 08:57:43.297630 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:43.297670 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:43.297711 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0118 08:57:43.297786 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:43.297829 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:43.298194 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedvpc.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0118 08:57:43.301014 42731 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0118 08:57:43.301223 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:43.301301 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0118 08:57:43.301497 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0118 08:57:43.301661 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedvpc.example.com" }] }] } I0118 08:57:43.301834 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-1to2379-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0118 08:57:43.301999 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0118 08:57:43.302164 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-2382to4000-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0118 08:57:43.302327 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0118 08:57:43.302441 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:43.302502 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0118 08:57:43.302536 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0118 08:57:43.302653 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:43.302708 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0118 08:57:43.302825 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0118 08:57:43.302899 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0118 08:57:43.302948 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:43.303076 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:43.303149 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0118 08:57:43.303194 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:43.303273 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:43.303363 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-4003to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0118 08:57:43.303542 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0118 08:57:43.303660 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-udp-1to65535-masters.sharedvpc.example.com" }] }] } I0118 08:57:43.303810 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0118 08:57:43.303934 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0118 08:57:43.304095 42731 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0118 08:57:43.304306 42731 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0118 08:57:43.304575 42731 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0118 08:57:43.304623 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:43.304667 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:43.304734 42731 dns.go:235] Pre-creating DNS records I0118 08:57:43.304762 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:43.309633 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:43.312552 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:43.312630 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:44.584999 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:44.732231 42731 iamrole.go:89] ListRoles: { } I0118 08:57:44.733710 42731 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0118 08:57:44.733914 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] }] } I0118 08:57:44.734099 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:57:44.734117 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:44.734262 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.734888 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:57:44.734984 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0118 08:57:44.735009 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0118 08:57:44.736565 42731 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0118 08:57:44.736724 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:57:44.736825 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0118 08:57:44.736841 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0118 08:57:44.737021 42731 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0118 08:57:44.736961 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0118 08:57:44.737136 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:44.737187 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:44.737273 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.737411 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:44.737455 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.741497 42731 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0118 08:57:44.741612 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:44.741776 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:44.741859 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:44.741998 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:44.742204 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:44.742354 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:44.742488 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:44.742941 42731 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0118 08:57:44.743180 42731 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0118 08:57:44.743365 42731 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0118 08:57:44.745503 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:57:44.745556 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:57:44.745582 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:57:44.745606 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:57:44.745628 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:57:44.745651 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:57:44.745676 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:57:44.745706 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:57:44.745735 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:57:44.745757 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:57:44.745778 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:44.745805 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:57:44.745829 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:44.745854 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:44.745877 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:44.745901 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:57:44.745921 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:57:44.745944 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:57:44.745964 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:44.745990 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:44.746016 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:57:44.747154 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:57:44.747207 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:57:44.747221 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:57:44.747257 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.747297 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0118 08:57:44.747343 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.747389 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.747421 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.747453 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.747486 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.747517 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0118 08:57:44.747553 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.747596 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0118 08:57:44.747622 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } W0118 08:57:44.747666 42731 api.go:53] PageSize not implemented I0118 08:57:44.747685 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:44.747706 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:44.747723 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:57:44.747744 42731 targetgroups.go:35] PageSize not implemented I0118 08:57:44.747760 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0118 08:57:44.747801 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:57:44.747832 42731 iamrole.go:89] ListRoles: { } I0118 08:57:44.747866 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:44.747886 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:44.747923 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:57:44.747956 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:57:44.747980 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:44.748337 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com ok autoscaling-group:nodes.sharedvpc.example.com ok I0118 08:57:44.748388 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0118 08:57:44.748500 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:44.748517 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0118 08:57:44.748496 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } autoscaling-config:lt-2 ok I0118 08:57:44.748560 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } iam-instance-profile:nodes.sharedvpc.example.com ok I0118 08:57:44.748573 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0118 08:57:44.748456 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.sharedvpc.example.com. ok I0118 08:57:44.748620 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } I0118 08:57:44.748596 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } volume:vol-1 ok I0118 08:57:44.748664 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } iam-instance-profile:masters.sharedvpc.example.com ok I0118 08:57:44.748654 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-1 ok I0118 08:57:44.748721 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:44.748768 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0118 08:57:44.748938 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:44.748950 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0118 08:57:44.749035 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0118 08:57:44.749050 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedvpc.example.com" } I0118 08:57:44.749094 42731 iamrole.go:180] ListAttachedRolePolicies: masters.sharedvpc.example.com I0118 08:57:44.749114 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0118 08:57:44.749142 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedvpc.example.com" } iam-role:masters.sharedvpc.example.com ok I0118 08:57:44.749189 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedvpc.example.com" } I0118 08:57:44.749264 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0118 08:57:44.749280 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0118 08:57:44.749308 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedvpc.example.com" } iam-role:nodes.sharedvpc.example.com ok I0118 08:57:44.749385 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok --- PASS: TestLifecycleSharedVPC (2.88s) === RUN TestLifecycleComplex I0118 08:57:44.749979 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:44.750325 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:44.750363 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:44.750400 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:44.750435 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:44.750476 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:44.750512 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:44.750536 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:44.750563 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:44.750586 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster complex.example.com I0118 08:57:44.779804 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:44.783398 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:44.783479 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:46.077455 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:46.248362 42731 iamrole.go:89] ListRoles: { } I0118 08:57:46.250316 42731 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0118 08:57:46.250649 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:46.250830 42731 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" } ] }] } I0118 08:57:46.250841 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] }] } I0118 08:57:46.250867 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } I0118 08:57:46.250969 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com", Tags: [ { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } W0118 08:57:46.250929 42731 api.go:53] PageSize not implemented I0118 08:57:46.251024 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-events.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/events", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:46.251127 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } I0118 08:57:46.251161 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:46.251192 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", Tags: [ { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0118 08:57:46.251211 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0118 08:57:46.251314 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:46.251402 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0118 08:57:46.251436 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0118 08:57:46.251467 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:46.251506 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:46.251539 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:46.251598 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:46.251692 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:46.251763 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-main.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/main", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:57:46.251903 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:46.251953 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:46.252055 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:46.252192 42731 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0118 08:57:46.252290 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:46.253121 42731 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0118 08:57:46.253297 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:46.253357 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0118 08:57:46.253422 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:46.253400 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:46.253497 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:46.253580 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:46.253539 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0118 08:57:46.253464 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.96.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-utility.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0118 08:57:46.253685 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:46.253635 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:46.254208 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0118 08:57:46.254177 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "api-elb.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0118 08:57:46.254320 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:46.254371 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:46.254300 42731 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tls-complex-example-com-5nursn", Port: 443, Protocol: "TLS", Tags: [ { Key: "Name", Value: "tls-complex-example-com-5nursn" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0118 08:57:46.254422 42731 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:46.254409 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:46.254478 42731 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-complex-example-com-vpjolq", Port: 443, Protocol: "TCP", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "tcp-complex-example-com-vpjolq" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0118 08:57:46.254560 42731 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:46.254601 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:46.254679 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:46.254758 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:46.254851 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:46.254919 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0118 08:57:46.254997 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:46.255065 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:46.255123 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:46.255147 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0118 08:57:46.255174 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:46.255285 42731 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0118 08:57:46.255321 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }], VpcId: "vpc-1" } I0118 08:57:46.255408 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:46.255450 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:46.255484 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:46.255522 42731 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0118 08:57:46.255565 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0118 08:57:46.255673 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0118 08:57:46.255704 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0118 08:57:46.255857 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0118 08:57:46.255875 42731 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0118 08:57:46.255717 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/complex.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0118 08:57:46.255964 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:46.256017 42731 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.1.0.0/16", VpcId: "vpc-1" } I0118 08:57:46.256063 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:46.256098 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:46.256125 42731 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.2.0.0/16", VpcId: "vpc-1" } I0118 08:57:46.256163 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }], VpcId: "vpc-1" } I0118 08:57:46.256245 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:57:46.256290 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:46.256331 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:46.256415 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] } I0118 08:57:46.256496 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:57:46.256540 42731 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] } I0118 08:57:46.256667 42731 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0118 08:57:46.256752 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:46.256886 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:57:46.256933 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-4003to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0118 08:57:46.257207 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0118 08:57:46.257341 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.complex.example.com" } ] }] } I0118 08:57:46.257473 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }] } I0118 08:57:46.257626 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0118 08:57:46.257808 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0118 08:57:46.257891 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:46.258005 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:57:46.258049 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:46.258114 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:46.258165 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:46.258238 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-2382to4000-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0118 08:57:46.258312 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.1.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-east-1a-private.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0118 08:57:46.258398 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:46.258468 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:46.258532 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }] } I0118 08:57:46.258751 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0118 08:57:46.258859 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-0.0.0.0/0" } ] }] } I0118 08:57:46.259012 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "192.168.1.10/32", RouteTableId: "rtb-2", TransitGatewayId: "tgw-0123456" } I0118 08:57:46.259061 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0118 08:57:46.259147 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }] } I0118 08:57:46.259223 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0118 08:57:46.259263 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0118 08:57:46.259306 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0118 08:57:46.259350 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:46.259379 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0118 08:57:46.259473 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0118 08:57:46.259597 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0118 08:57:46.259741 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }] } I0118 08:57:46.259816 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" } ] }] } I0118 08:57:46.259924 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.0/24-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0118 08:57:46.260034 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-1to2379-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0118 08:57:46.260147 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0118 08:57:46.260255 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0118 08:57:46.260364 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0118 08:57:46.260400 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0118 08:57:46.260502 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0118 08:57:46.260624 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0118 08:57:46.260741 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }] } I0118 08:57:46.260816 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", RouteTableId: "rtb-2", TransitGatewayId: "tgw-123456" } I0118 08:57:46.260854 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-::/0" } ] }] } I0118 08:57:46.260966 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-::/0" } ] }] } I0118 08:57:46.261075 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-udp-1to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0118 08:57:46.261225 42731 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0118 08:57:46.261286 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:46.261333 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0118 08:57:46.261395 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } W0118 08:57:46.261414 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:46.261424 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-3" } I0118 08:57:46.261528 42731 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "api-complex-example-com-vd3t5n", SubnetMappings: [{ AllocationId: "eipalloc-012345a678b9cdefa", SubnetId: "subnet-2" }], Tags: [ { Key: "Name", Value: "api.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], Type: "network" } I0118 08:57:46.261626 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:46.261676 42731 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-test-1:000000000000:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0118 08:57:46.261750 42731 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0118 08:57:46.261809 42731 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "true" },{ Key: "access_logs.s3.enabled", Value: "true" },{ Key: "access_logs.s3.bucket", Value: "access-log-example" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0118 08:57:46.261867 42731 api.go:53] PageSize not implemented I0118 08:57:46.261916 42731 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0118 08:57:46.261981 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:46.261984 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:46.262046 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:46.262071 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:46.262073 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:46.262194 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:46.262163 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:46.262232 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:46.262253 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:46.262265 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:46.266698 42731 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0118 08:57:46.267013 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:46.267135 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:46.267291 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:46.267394 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:46.267872 42731 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0118 08:57:46.268118 42731 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0118 08:57:46.268365 42731 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0118 08:57:46.268409 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:46.268440 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:46.268504 42731 dns.go:235] Pre-creating DNS records I0118 08:57:46.268526 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:46.275785 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:46.279498 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:46.279581 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:47.549793 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:47.718224 42731 iamrole.go:89] ListRoles: { } I0118 08:57:47.719824 42731 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0118 08:57:47.720208 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0118 08:57:47.720303 42731 api.go:53] PageSize not implemented I0118 08:57:47.720385 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:47.720435 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:47.720522 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0118 08:57:47.720655 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:47.720841 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] }] } I0118 08:57:47.720976 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:47.721071 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:47.721150 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:47.721177 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:47.721222 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:47.721258 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:47.723704 42731 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0118 08:57:47.723952 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:47.723887 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:47.724013 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:47.724118 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:47.724107 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:47.724164 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:47.724210 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:47.724243 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:47.724330 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:47.724364 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:47.724241 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0118 08:57:47.724494 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:47.724580 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:47.724765 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:47.724881 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:47.725018 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:47.725140 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:47.725172 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:47.725277 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:47.725309 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:47.725411 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:47.725483 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:47.725564 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:47.725632 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:47.725747 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:47.725828 42731 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0118 08:57:47.725975 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:47.726070 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:47.726219 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:47.726334 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:47.726488 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:47.726702 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:47.727044 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:47.727223 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:47.727441 42731 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0118 08:57:47.727531 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:47.727596 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:47.727614 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:47.727654 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:47.727685 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:47.727721 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:47.727526 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:47.727753 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:47.727779 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0118 08:57:47.727864 42731 api.go:53] PageSize not implemented I0118 08:57:47.727906 42731 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0118 08:57:47.727973 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:47.727978 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:47.728034 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:47.728031 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:47.728057 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:47.728016 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:47.728053 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:47.728166 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:47.728237 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:47.728265 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:47.728348 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:47.728390 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:47.728462 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:47.728486 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:47.734046 42731 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0118 08:57:47.734359 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:47.734559 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:47.734808 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:47.735152 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:47.736797 42731 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0118 08:57:47.737255 42731 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0118 08:57:47.737515 42731 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.sslCertificate=arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678] I0118 08:57:47.743765 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:47.747178 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:47.757745 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:47.761327 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:47.761405 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:49.028414 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:49.194801 42731 iamrole.go:89] ListRoles: { } I0118 08:57:49.196276 42731 executor.go:111] Tasks: 0 done / 135 total; 51 can run W0118 08:57:49.196772 42731 api.go:53] PageSize not implemented I0118 08:57:49.196909 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.197371 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.197500 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:49.197527 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:49.197581 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:49.197764 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:49.197945 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:49.199104 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.199299 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:49.199432 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.199643 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:49.200041 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0118 08:57:49.203335 42731 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0118 08:57:49.203606 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:49.203546 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.203742 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:49.203815 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:49.203790 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:49.203886 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:49.203892 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:49.203924 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:49.203940 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:49.203982 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:49.204032 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:49.204004 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:49.204057 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:49.204118 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.204264 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:49.204834 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:49.204906 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:49.205039 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:49.205078 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:49.205211 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:49.205252 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.205336 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.205419 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.205500 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:49.205557 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:49.206169 42731 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0118 08:57:49.206326 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:49.206462 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:49.206716 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:49.206933 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:49.207093 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:49.207267 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:49.207444 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:49.207572 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:49.207702 42731 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0118 08:57:49.207765 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:49.207793 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:49.207880 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:49.207899 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:49.207939 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:49.207969 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:49.208007 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:49.208036 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:49.208061 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:49.208212 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { Names: ["api-complex-example-com-vd3t5n"] } I0118 08:57:49.208242 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:49.208268 42731 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/1" } I0118 08:57:49.208292 42731 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/2" } I0118 08:57:49.208316 42731 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0118 08:57:49.208392 42731 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0118 08:57:49.208446 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:49.208473 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } W0118 08:57:49.208503 42731 api.go:53] PageSize not implemented I0118 08:57:49.208551 42731 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0118 08:57:49.208615 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:49.208619 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:49.208690 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:49.208683 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:49.208711 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:49.208667 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:49.208709 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:49.208810 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:49.208860 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:49.208875 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:49.208959 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:49.208983 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:49.209079 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:49.209099 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:49.213387 42731 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0118 08:57:49.213535 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:49.213752 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:49.214011 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:49.214235 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:49.215012 42731 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0118 08:57:49.215226 42731 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0118 08:57:49.215522 42731 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0118 08:57:49.215604 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:49.215660 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:49.215785 42731 dns.go:235] Pre-creating DNS records I0118 08:57:49.222731 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:49.226454 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:49.226536 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:50.496832 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:50.659696 42731 iamrole.go:89] ListRoles: { } I0118 08:57:50.661091 42731 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0118 08:57:50.661264 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:50.661371 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:50.661428 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0118 08:57:50.661561 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:50.661596 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } W0118 08:57:50.661611 42731 api.go:53] PageSize not implemented I0118 08:57:50.662737 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:50.663187 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0118 08:57:50.663339 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:50.663537 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0118 08:57:50.663700 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:50.663766 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:50.663726 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:50.668660 42731 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0118 08:57:50.668795 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:50.668855 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:50.668863 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:50.668902 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:50.668960 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:50.669042 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:50.669067 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:50.669054 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:50.669100 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:50.669193 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:50.669160 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:50.669230 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:50.669279 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0118 08:57:50.669399 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:50.669526 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:50.669578 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:50.669748 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:50.669832 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:50.669959 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:50.669998 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:50.670125 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:50.670168 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:50.670308 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:50.670341 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:50.670420 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0118 08:57:50.670569 42731 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0118 08:57:50.670646 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:50.670793 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:50.671109 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:50.671218 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:50.671321 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:50.671448 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:50.671558 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:50.671768 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:50.671943 42731 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0118 08:57:50.671995 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:50.672014 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:50.672081 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:50.672098 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:50.672133 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:50.672160 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:50.672192 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:50.672216 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:50.672239 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0118 08:57:50.672317 42731 api.go:53] PageSize not implemented I0118 08:57:50.672367 42731 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0118 08:57:50.672425 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:50.672420 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:50.672474 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:50.672460 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:50.672501 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:50.672529 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:50.672490 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:50.672668 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:50.672720 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:50.672831 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:50.672877 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:50.672898 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:50.672980 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:50.673027 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:50.677519 42731 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0118 08:57:50.677614 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:50.677753 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:50.677823 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:50.677985 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:50.678665 42731 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0118 08:57:50.678883 42731 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0118 08:57:50.679032 42731 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.additionalSecurityGroups=sg-123456] I0118 08:57:50.681922 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:50.684902 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:50.695629 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:50.699155 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:50.699231 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:51.969242 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:52.143278 42731 iamrole.go:89] ListRoles: { } I0118 08:57:52.145099 42731 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0118 08:57:52.145293 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:52.145585 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:52.145780 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:52.145927 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:52.146013 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0118 08:57:52.146092 42731 api.go:53] PageSize not implemented I0118 08:57:52.146045 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:52.146141 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0118 08:57:52.146654 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:52.146754 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:52.146780 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:52.146829 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:52.146873 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:52.146998 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0118 08:57:52.148050 42731 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0118 08:57:52.148155 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:52.148217 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:52.148213 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:52.148302 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:52.148377 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:52.148336 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:52.148409 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:52.148525 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:52.148505 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:52.148579 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:52.148603 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:52.148651 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0118 08:57:52.148802 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:52.148866 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:52.148944 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:52.149072 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:52.149111 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:52.149237 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:52.149275 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:52.149440 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:52.149567 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:52.149600 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:52.149693 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:52.149772 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:52.149894 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:52.150022 42731 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0118 08:57:52.150116 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:52.150340 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:52.150430 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:52.150598 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:52.150821 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:52.150897 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:52.150990 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:52.151114 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:52.151439 42731 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0118 08:57:52.151510 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:52.151520 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:52.151598 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:52.151614 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:52.151651 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:52.151679 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:52.151712 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:52.151738 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:52.151764 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0118 08:57:52.151843 42731 api.go:53] PageSize not implemented I0118 08:57:52.151895 42731 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0118 08:57:52.151938 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:52.151977 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:52.151980 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:52.152021 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:52.151989 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:52.152051 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:52.152105 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:52.152061 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:52.152145 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:52.152172 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:52.152256 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:52.152288 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:52.152386 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:52.152432 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:52.156751 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:57:52.156868 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:52.157017 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:52.157078 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:52.157210 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:52.158960 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:52.159131 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:52.159775 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:57:52.160381 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:57:52.161260 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:57:52.161364 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:52.161420 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:52.161556 42731 dns.go:235] Pre-creating DNS records I0118 08:57:52.169816 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:52.173827 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:52.173911 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:53.416556 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:53.580428 42731 iamrole.go:89] ListRoles: { } I0118 08:57:53.581851 42731 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0118 08:57:53.582066 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:53.582292 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:53.582426 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:53.582557 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:53.582638 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:53.582741 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:53.582880 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0118 08:57:53.582820 42731 api.go:53] PageSize not implemented I0118 08:57:53.584875 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:53.585149 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:53.585206 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:53.585330 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:53.585392 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0118 08:57:53.586843 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0118 08:57:53.590163 42731 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0118 08:57:53.590343 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:53.590454 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:53.590460 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:53.590544 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:53.590494 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:53.590639 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:53.590546 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:53.590709 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:53.590801 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:53.590855 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:53.590915 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:53.591012 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:53.590965 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:53.591051 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:53.591098 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:53.591155 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:53.591290 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:53.591364 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:53.591505 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:53.591565 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:53.591695 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:53.591833 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:53.591869 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:53.591941 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] }] } I0118 08:57:53.592045 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:53.592382 42731 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0118 08:57:53.592605 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:53.592697 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:53.592909 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:53.593216 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:53.593312 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:53.593384 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:53.593560 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:53.593661 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:53.593882 42731 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0118 08:57:53.593956 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:53.593971 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:53.594063 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:53.594079 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:53.594119 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:53.594148 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:53.594182 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:53.594215 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:53.594241 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0118 08:57:53.594323 42731 api.go:53] PageSize not implemented I0118 08:57:53.594374 42731 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0118 08:57:53.594416 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:53.594455 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:53.594473 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:53.594469 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:53.594525 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:53.594553 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:53.594545 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0118 08:57:53.594585 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" W0118 08:57:53.594595 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:53.594612 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:53.594686 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:53.594730 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:53.594822 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:53.594862 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:53.599749 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:57:53.599872 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:53.600013 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:53.600058 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:53.600210 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:53.601027 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:57:53.601211 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:57:53.601410 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t3.large] I0118 08:57:53.605645 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:53.608646 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:53.608722 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:53.616944 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:53.620590 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:53.620666 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:53.620711 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:54.873640 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:55.042682 42731 iamrole.go:89] ListRoles: { } I0118 08:57:55.044617 42731 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0118 08:57:55.044988 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:55.045149 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } W0118 08:57:55.045275 42731 api.go:53] PageSize not implemented I0118 08:57:55.045343 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.045497 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:55.045600 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:55.045677 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:55.045746 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.045836 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:55.045879 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.046102 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:55.046206 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:55.046264 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.046502 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0118 08:57:55.047466 42731 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0118 08:57:55.047620 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:55.047609 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:55.047714 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:55.047714 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:55.047825 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:55.047821 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:55.047816 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.047901 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:55.047982 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:55.047967 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:55.048047 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:55.048075 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:55.048101 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:55.048153 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.048318 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:55.048358 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.048502 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:55.048534 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:55.048606 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:55.048734 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:55.048784 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:55.048881 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:55.049031 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:55.049072 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.049240 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.049512 42731 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0118 08:57:55.049621 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:55.049716 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:55.049814 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:55.049993 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:55.050532 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:55.050662 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:55.050785 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:55.050816 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:55.050985 42731 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0118 08:57:55.051051 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:55.051055 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:55.051146 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:55.051164 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:55.051201 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:55.051230 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:55.051264 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:55.051291 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:55.051317 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0118 08:57:55.051397 42731 api.go:53] PageSize not implemented I0118 08:57:55.051440 42731 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0118 08:57:55.051513 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:55.051559 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:55.051518 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0118 08:57:55.051580 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:55.051605 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" W0118 08:57:55.051589 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:55.051631 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:55.051738 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:55.051780 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:55.051801 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:55.051880 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:55.051918 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:55.052015 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:55.052061 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:55.056413 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:57:55.056543 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:55.056687 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:55.056820 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:55.056949 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:55.057414 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:57:55.057721 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:57:55.057905 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:57:55.057948 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:55.057981 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:55.058041 42731 dns.go:235] Pre-creating DNS records I0118 08:57:55.064643 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:55.068278 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:55.068358 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:55.068404 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.356674 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:56.526395 42731 iamrole.go:89] ListRoles: { } I0118 08:57:56.528161 42731 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0118 08:57:56.528385 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.528566 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0118 08:57:56.528692 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:56.528717 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } W0118 08:57:56.528814 42731 api.go:53] PageSize not implemented I0118 08:57:56.528869 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.529062 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:56.529171 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:56.529249 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:56.529322 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.529410 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:56.529436 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:56.529479 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.529721 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:56.530753 42731 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0118 08:57:56.530886 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:56.530882 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:56.530986 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:56.531098 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:56.531189 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:56.531144 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:56.531238 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:56.531199 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:56.531276 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:56.531326 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:56.531331 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.531415 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:56.531449 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:56.531464 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:56.531531 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:56.531659 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:56.531710 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.531849 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:56.531896 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:56.531982 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:56.532136 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:56.532170 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.532253 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.532344 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.532511 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:56.532602 42731 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0118 08:57:56.532720 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:56.532803 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:56.533246 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:56.533375 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:56.533476 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:56.533513 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:56.533635 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:56.533955 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:56.534154 42731 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0118 08:57:56.534249 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:56.534263 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:56.534354 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:56.534378 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:56.534425 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:56.534452 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:56.534483 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:56.534510 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:56.534533 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0118 08:57:56.534612 42731 api.go:53] PageSize not implemented I0118 08:57:56.534669 42731 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0118 08:57:56.534765 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:56.534787 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:56.534854 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:56.534852 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:56.534892 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:56.534829 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:56.534877 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:56.534988 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:56.535067 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:56.535095 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:56.535189 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:56.535239 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:56.535376 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:56.535409 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:56.539751 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:57:56.539878 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.540042 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.540154 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.540287 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.540727 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:57:56.540973 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:57:56.541153 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t2.medium] I0118 08:57:56.543597 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:56.546535 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.546609 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.546647 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.554876 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:56.558387 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.558467 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.558510 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:56.558551 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:57.814075 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:57.983171 42731 iamrole.go:89] ListRoles: { } I0118 08:57:57.984964 42731 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0118 08:57:57.985157 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:57.985291 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:57.985372 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0118 08:57:57.985476 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:57.985662 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:57.985766 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:57.985882 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:57.986266 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:57.986391 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } W0118 08:57:57.986635 42731 api.go:53] PageSize not implemented I0118 08:57:57.986893 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:57.986992 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:57.987017 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:57.987070 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:57.987790 42731 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0118 08:57:57.987887 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:57.987990 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:57.988023 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0118 08:57:57.988138 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:57.988100 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:57.988128 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:57.988245 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:57.988235 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:57.988332 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:57.988295 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:57.988450 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:57.988423 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:57.988489 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:57.988515 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:57.988508 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:57.988623 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:57.988763 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:57.988801 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:57.988889 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:57.989008 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:57.989118 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:57.989316 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:57.989355 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:57.989412 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:57.989554 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:57.989655 42731 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0118 08:57:57.989862 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:57.990020 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:57.990172 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:57.990401 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:57.990524 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:57.990661 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:57.990735 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:57.990795 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:57.991098 42731 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0118 08:57:57.991160 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:57.991171 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:57.991236 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:57.991252 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:57.991287 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:57.991316 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:57.991347 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:57.991375 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:57.991401 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0118 08:57:57.991475 42731 api.go:53] PageSize not implemented I0118 08:57:57.991518 42731 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0118 08:57:57.991583 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:57.991621 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:57.991604 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:57.991646 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:57.991641 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:57.991667 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:57.991662 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:57.991758 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:57.991808 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:57.991922 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:57.991948 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:57.992012 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:57.992058 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:57.992071 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:57.996195 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:57:57.996298 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:57.996462 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:57.996587 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:57.996712 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:57.997192 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:57:57.997499 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:57:57.997711 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:57:57.997758 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:57.997789 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:57.997851 42731 dns.go:235] Pre-creating DNS records I0118 08:57:58.004696 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0118 08:57:58.008205 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:58.008281 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:58.008326 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:58.008369 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:59.276507 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:59.443148 42731 iamrole.go:89] ListRoles: { } I0118 08:57:59.444974 42731 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0118 08:57:59.445169 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0118 08:57:59.445320 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0118 08:57:59.445449 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0118 08:57:59.445624 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.445810 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.445900 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:57:59.445925 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:57:59.445972 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:59.446007 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0118 08:57:59.446079 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.446195 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:57:59.446236 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0118 08:57:59.446332 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0118 08:57:59.446463 42731 api.go:53] PageSize not implemented I0118 08:57:59.447442 42731 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0118 08:57:59.447553 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0118 08:57:59.447633 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:59.447590 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0118 08:57:59.447670 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0118 08:57:59.447737 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0118 08:57:59.447717 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.447791 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:59.447816 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0118 08:57:59.447797 42731 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:59.447890 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:59.447826 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0118 08:57:59.447959 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:59.448002 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:59.448049 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:59.448126 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:59.448191 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.448307 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:57:59.448336 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] }] } I0118 08:57:59.448444 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:57:59.448474 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:59.448539 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.448648 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:57:59.448717 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0118 08:57:59.448831 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:57:59.448888 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.449331 42731 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0118 08:57:59.449483 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:59.449578 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:59.449721 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:59.449878 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:59.450148 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.450269 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0118 08:57:59.450353 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:59.450426 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:57:59.450745 42731 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0118 08:57:59.450814 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:59.450872 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:59.450888 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:59.450921 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:59.450817 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:57:59.450949 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0118 08:57:59.450982 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0118 08:57:59.451009 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0118 08:57:59.451035 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0118 08:57:59.451114 42731 api.go:53] PageSize not implemented I0118 08:57:59.451154 42731 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0118 08:57:59.451193 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:59.451230 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:59.451220 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:59.451261 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:59.451243 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:59.451293 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:57:59.451317 42731 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0118 08:57:59.451325 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:59.451394 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:59.451419 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:59.451489 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:59.451521 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:59.451607 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0118 08:57:59.451643 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:59.455937 42731 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0118 08:57:59.456059 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:59.456210 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:59.456276 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:59.456444 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:59.457100 42731 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0118 08:57:59.457322 42731 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0118 08:57:59.457537 42731 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0118 08:57:59.457703 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:57:59.457747 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:57:59.457776 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:57:59.457802 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:57:59.457825 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:57:59.457847 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:57:59.457873 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:57:59.457898 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:57:59.457927 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:57:59.457958 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:57:59.457979 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:57:59.458001 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:57:59.458026 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:57:59.458047 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:57:59.458072 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:57:59.458098 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:57:59.458121 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:57:59.458145 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:57:59.458170 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:57:59.458192 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:57:59.458216 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0118 08:57:59.458241 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:57:59.458261 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:57:59.458282 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:57:59.458306 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:57:59.458330 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:57:59.458355 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:57:59.460707 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:57:59.460764 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:57:59.460780 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:57:59.460809 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.460858 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0118 08:57:59.460912 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.460961 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.460997 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.461042 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.461077 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.461113 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0118 08:57:59.461161 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.461218 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0118 08:57:59.461249 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } W0118 08:57:59.461295 42731 api.go:53] PageSize not implemented I0118 08:57:59.461311 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:57:59.461330 42731 loadbalancers.go:35] PageSize not implemented I0118 08:57:59.461343 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0118 08:57:59.461372 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:57:59.461391 42731 targetgroups.go:35] PageSize not implemented I0118 08:57:59.461406 42731 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" ] } I0118 08:57:59.461459 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:57:59.461493 42731 iamrole.go:89] ListRoles: { } I0118 08:57:59.461531 42731 zones.go:93] ListHostedZonesPages { } I0118 08:57:59.461552 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:57:59.461590 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:57:59.461635 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:57:59.461675 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0118 08:57:59.462197 42731 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5 ok I0118 08:57:59.462234 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0118 08:57:59.462296 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0118 08:57:59.462288 42731 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4 ok I0118 08:57:59.462312 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:nodes.complex.example.com ok I0118 08:57:59.462360 42731 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1 ok I0118 08:57:59.462345 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } autoscaling-group:master-us-test-1a.masters.complex.example.com ok I0118 08:57:59.462431 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } iam-instance-profile:masters.complex.example.com ok I0118 08:57:59.462468 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } iam-instance-profile:nodes.complex.example.com ok I0118 08:57:59.462387 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0118 08:57:59.462581 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:59.462404 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.complex.example.com ok I0118 08:57:59.462602 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0118 08:57:59.462639 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok I0118 08:57:59.462711 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-2 ok I0118 08:57:59.462785 42731 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0118 08:57:59.462842 42731 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0118 08:57:59.462870 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:57:59.462916 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }, { FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }, { FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0118 08:57:59.463218 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:57:59.463237 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0118 08:57:59.463271 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0118 08:57:59.463309 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:57:59.463348 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0118 08:57:59.463420 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.complex.example.com" } I0118 08:57:59.463460 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.complex.example.com I0118 08:57:59.463435 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0118 08:57:59.463474 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0118 08:57:59.463503 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.complex.example.com" } iam-role:nodes.complex.example.com ok I0118 08:57:59.463529 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.complex.example.com" } I0118 08:57:59.463510 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0118 08:57:59.463563 42731 iamrole.go:180] ListAttachedRolePolicies: masters.complex.example.com I0118 08:57:59.463599 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0118 08:57:59.463628 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.complex.example.com" } iam-role:masters.complex.example.com ok I0118 08:57:59.463698 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0118 08:57:59.463771 42731 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0118 08:57:59.463847 42731 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleComplex (14.71s) === RUN TestLifecycleExternalLB I0118 08:57:59.464383 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:57:59.464732 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:57:59.464766 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:57:59.464799 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:57:59.464832 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:57:59.464870 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:57:59.464907 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:57:59.464933 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:57:59.464964 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:57:59.464987 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster externallb.example.com I0118 08:57:59.486127 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:57:59.490034 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:57:59.490150 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:00.744132 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:00.895166 42731 iamrole.go:89] ListRoles: { } I0118 08:58:00.897109 42731 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0118 08:58:00.897317 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0118 08:58:00.897465 42731 api.go:53] PageSize not implemented I0118 08:58:00.897596 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:00.897641 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0118 08:58:00.897755 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0118 08:58:00.897790 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } I0118 08:58:00.897811 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:00.897863 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } I0118 08:58:00.897952 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:00.897957 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.externallb.example.com" }] } I0118 08:58:00.897855 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0118 08:58:00.898029 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0118 08:58:00.898008 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:00.898060 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0118 08:58:00.898120 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } I0118 08:58:00.898153 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:00.898204 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0118 08:58:00.898262 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:00.898238 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0118 08:58:00.898308 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:00.898372 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0118 08:58:00.898418 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0118 08:58:00.898450 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.898591 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } W0118 08:58:00.898661 42731 api.go:53] PageSize not implemented I0118 08:58:00.898746 42731 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.898825 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0118 08:58:00.898857 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0118 08:58:00.898886 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } W0118 08:58:00.898914 42731 api.go:53] PageSize not implemented I0118 08:58:00.898922 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:00.898982 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:00.899138 42731 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.899234 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:58:00.900659 42731 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0118 08:58:00.900896 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0118 08:58:00.900935 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0118 08:58:00.900870 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:00.901022 42731 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0118 08:58:00.901011 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0118 08:58:00.901132 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0118 08:58:00.901155 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0118 08:58:00.901175 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:00.901340 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0118 08:58:00.901411 42731 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.901509 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:58:00.901565 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:00.901747 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0118 08:58:00.901992 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0118 08:58:00.902203 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:58:00.902297 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:00.902385 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:00.902531 42731 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0118 08:58:00.902582 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:58:00.902703 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:00.902772 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:00.902675 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0118 08:58:00.902860 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:58:00.902664 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/externallb.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0118 08:58:00.902922 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:58:00.902976 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:00.903065 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:00.903107 42731 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0118 08:58:00.903168 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:58:00.903212 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" } ] } I0118 08:58:00.905501 42731 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0118 08:58:00.905617 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:00.905729 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.906005 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-1to2379-masters.externallb.example.com" }] }] } I0118 08:58:00.906192 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.906407 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:00.906505 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:00.906593 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:00.906762 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:58:00.906825 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:00.906913 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:58:00.906963 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0118 08:58:00.907133 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-2382to4000-masters.externallb.example.com" }] }] } I0118 08:58:00.907259 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:00.907343 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:00.907426 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.907591 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0118 08:58:00.907636 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0118 08:58:00.907672 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-::/0" }] }] } I0118 08:58:00.907790 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-4003to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.907904 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.908011 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0118 08:58:00.908122 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-udp-1to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.908237 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.908346 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-::/0" }] }] } I0118 08:58:00.908450 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0118 08:58:00.908620 42731 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0118 08:58:00.908864 42731 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0118 08:58:00.909104 42731 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0118 08:58:00.909174 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:00.909209 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:00.909286 42731 dns.go:235] Pre-creating DNS records I0118 08:58:00.909315 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:00.914481 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:58:00.917244 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:00.917345 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:02.173440 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:02.324593 42731 iamrole.go:89] ListRoles: { } I0118 08:58:02.326141 42731 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0118 08:58:02.326424 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0118 08:58:02.326498 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:58:02.326534 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0118 08:58:02.326571 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } W0118 08:58:02.326621 42731 api.go:53] PageSize not implemented I0118 08:58:02.326610 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.326704 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0118 08:58:02.326764 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0118 08:58:02.326792 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0118 08:58:02.326799 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.326889 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } W0118 08:58:02.327096 42731 api.go:53] PageSize not implemented I0118 08:58:02.327052 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.326917 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0118 08:58:02.327238 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:58:02.327292 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } W0118 08:58:02.327338 42731 api.go:53] PageSize not implemented I0118 08:58:02.327252 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0118 08:58:02.327357 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:02.327387 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0118 08:58:02.327484 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:02.329180 42731 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0118 08:58:02.329277 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:02.329379 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.329456 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0118 08:58:02.329512 42731 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0118 08:58:02.329504 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0118 08:58:02.329665 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:02.329731 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:58:02.329819 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.330021 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.330167 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:02.330271 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0118 08:58:02.330439 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:02.333803 42731 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0118 08:58:02.334028 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:02.334158 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:02.334344 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:02.334461 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:02.334579 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:02.334742 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:02.334846 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:02.335361 42731 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0118 08:58:02.335579 42731 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0118 08:58:02.335755 42731 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0118 08:58:02.338311 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:58:02.338369 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:58:02.338399 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:58:02.338421 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:58:02.338444 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:58:02.338468 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:58:02.338489 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:58:02.338514 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:58:02.338540 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:58:02.338573 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:58:02.338604 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:58:02.338628 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:58:02.338649 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:58:02.338675 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:58:02.338699 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:02.338723 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:02.338749 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:58:02.338779 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:58:02.338803 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:58:02.338825 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:58:02.338848 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:02.338877 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:02.338904 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:58:02.338929 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:58:02.340048 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:58:02.340102 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:58:02.340118 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:58:02.340152 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.340194 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0118 08:58:02.340240 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.340287 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.340325 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.340375 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.340411 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.340443 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0118 08:58:02.340481 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.340521 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0118 08:58:02.340551 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } W0118 08:58:02.340594 42731 api.go:53] PageSize not implemented I0118 08:58:02.340614 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:58:02.340635 42731 loadbalancers.go:35] PageSize not implemented I0118 08:58:02.340650 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:58:02.340670 42731 targetgroups.go:35] PageSize not implemented I0118 08:58:02.340686 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0118 08:58:02.340730 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:58:02.340767 42731 iamrole.go:89] ListRoles: { } I0118 08:58:02.340803 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:02.340829 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:02.340864 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:58:02.340900 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:58:02.340929 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:02.341317 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0118 08:58:02.341370 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } iam-instance-profile:masters.externallb.example.com ok I0118 08:58:02.341352 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-group:nodes.externallb.example.com ok I0118 08:58:02.341423 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0118 08:58:02.341430 42731 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } autoscaling-group:master-us-test-1a.masters.externallb.example.com ok I0118 08:58:02.341456 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } iam-instance-profile:nodes.externallb.example.com ok I0118 08:58:02.341499 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-1 ok I0118 08:58:02.341579 42731 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0118 08:58:02.341449 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.externallb.example.com. ok I0118 08:58:02.341622 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:02.341679 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0118 08:58:02.341852 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:02.341872 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-config:lt-2 ok I0118 08:58:02.341919 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0118 08:58:02.341972 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:02.342009 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0118 08:58:02.342097 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:02.342108 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0118 08:58:02.342178 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.externallb.example.com" } I0118 08:58:02.342219 42731 iamrole.go:180] ListAttachedRolePolicies: masters.externallb.example.com I0118 08:58:02.342209 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0118 08:58:02.342231 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0118 08:58:02.342275 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.externallb.example.com" } iam-role:masters.externallb.example.com ok I0118 08:58:02.342317 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.externallb.example.com" } I0118 08:58:02.342388 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.externallb.example.com I0118 08:58:02.342402 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0118 08:58:02.342429 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.externallb.example.com" } iam-role:nodes.externallb.example.com ok I0118 08:58:02.342505 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0118 08:58:02.342573 42731 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0118 08:58:02.342632 42731 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleExternalLB (2.88s) === RUN TestLifecycleSharedSubnet I0118 08:58:02.343213 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:58:02.343562 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:58:02.343598 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:58:02.343633 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:58:02.343665 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:58:02.343705 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:58:02.343740 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:58:02.343763 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:58:02.343793 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:58:02.343816 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedsubnet.example.com I0118 08:58:02.363635 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:58:02.366232 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:02.366300 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:03.616556 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:03.761740 42731 iamrole.go:89] ListRoles: { } I0118 08:58:03.762635 42731 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0118 08:58:03.764223 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:03.764541 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } I0118 08:58:03.764699 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0118 08:58:03.764613 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:03.764827 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:03.765656 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] }] } I0118 08:58:03.766021 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:03.766280 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:03.767151 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:58:03.767556 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0118 08:58:03.767620 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0118 08:58:03.767598 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } I0118 08:58:03.767934 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0118 08:58:03.768235 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:58:03.769255 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:03.769438 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0118 08:58:03.771299 42731 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0118 08:58:03.771892 42731 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0118 08:58:03.771426 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0118 08:58:03.771967 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0118 08:58:03.772110 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0118 08:58:03.772197 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }], VpcId: "vpc-12345678" } I0118 08:58:03.772214 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0118 08:58:03.772302 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0118 08:58:03.772301 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:03.772347 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:03.772385 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0118 08:58:03.772375 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0118 08:58:03.772519 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:58:03.772648 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedsubnet.example.com" }] }], VpcId: "vpc-12345678" } I0118 08:58:03.772734 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:03.772784 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:03.772823 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:58:03.772860 42731 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [ { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "shared" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] } I0118 08:58:03.773835 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedsubnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0118 08:58:03.776411 42731 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0118 08:58:03.776606 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" }] }] } I0118 08:58:03.776811 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-1to2379-masters.sharedsubnet.example.com" }] }] } I0118 08:58:03.776932 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0118 08:58:03.777044 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0118 08:58:03.777197 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-masters.sharedsubnet.example.com" }] }] } I0118 08:58:03.777361 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0118 08:58:03.777469 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0118 08:58:03.777630 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0118 08:58:03.777805 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:03.777918 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:03.777998 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0118 08:58:03.778157 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:03.778247 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:03.778332 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-udp-1to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0118 08:58:03.778507 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedsubnet.example.com" }] }] } I0118 08:58:03.778634 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-2382to4000-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0118 08:58:03.778749 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0118 08:58:03.778866 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-4003to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0118 08:58:03.779050 42731 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0118 08:58:03.779270 42731 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0118 08:58:03.779501 42731 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0118 08:58:03.779546 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:03.779577 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:03.779639 42731 dns.go:235] Pre-creating DNS records I0118 08:58:03.779665 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:03.784638 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:58:03.787505 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:03.787577 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:05.046837 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:05.201573 42731 iamrole.go:89] ListRoles: { } I0118 08:58:05.202642 42731 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0118 08:58:05.202935 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.203177 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:58:05.203533 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:58:05.203628 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0118 08:58:05.203655 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0118 08:58:05.203956 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:05.204218 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.205737 42731 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0118 08:58:05.205910 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0118 08:58:05.206041 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0118 08:58:05.206009 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0118 08:58:05.206111 42731 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0118 08:58:05.206175 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:05.206227 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0118 08:58:05.206379 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:58:05.206493 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:05.210213 42731 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0118 08:58:05.210461 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:05.210603 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:05.210794 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:05.210948 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:05.211325 42731 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0118 08:58:05.211511 42731 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0118 08:58:05.211726 42731 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0118 08:58:05.213940 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:58:05.213994 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:58:05.214018 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:58:05.214041 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:58:05.214061 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:58:05.214084 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:58:05.214108 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:58:05.214141 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:58:05.214169 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:58:05.214192 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:58:05.214212 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:58:05.214234 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:05.214276 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:05.214303 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:58:05.214327 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:58:05.214349 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:58:05.214371 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:05.214396 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:05.214420 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:58:05.215542 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:58:05.215597 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:58:05.215612 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:58:05.215646 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.215686 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0118 08:58:05.215732 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.215784 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.215818 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.215853 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.215889 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.215917 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0118 08:58:05.215945 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.215978 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0118 08:58:05.216006 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } W0118 08:58:05.216047 42731 api.go:53] PageSize not implemented I0118 08:58:05.216068 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:58:05.216091 42731 loadbalancers.go:35] PageSize not implemented I0118 08:58:05.216108 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:58:05.216128 42731 targetgroups.go:35] PageSize not implemented I0118 08:58:05.216147 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0118 08:58:05.216190 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:58:05.216224 42731 iamrole.go:89] ListRoles: { } I0118 08:58:05.216260 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:05.216285 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:05.216326 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:58:05.216385 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:58:05.216719 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:05.216772 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0118 08:58:05.216845 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } I0118 08:58:05.216714 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } iam-instance-profile:masters.sharedsubnet.example.com ok route53-record:Z1AFAKE1ZON3YO/A/api.internal.sharedsubnet.example.com. ok autoscaling-group:nodes.sharedsubnet.example.com ok I0118 08:58:05.216900 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } autoscaling-group:master-us-test-1a.masters.sharedsubnet.example.com ok I0118 08:58:05.216967 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } iam-instance-profile:nodes.sharedsubnet.example.com ok I0118 08:58:05.216802 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0118 08:58:05.217011 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:05.217036 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0118 08:58:05.217098 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok I0118 08:58:05.217188 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:05.217242 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0118 08:58:05.217344 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:05.217364 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0118 08:58:05.217394 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-2 ok I0118 08:58:05.217472 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0118 08:58:05.217560 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedsubnet.example.com" } I0118 08:58:05.217609 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0118 08:58:05.217635 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0118 08:58:05.217666 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedsubnet.example.com" } iam-role:nodes.sharedsubnet.example.com ok I0118 08:58:05.217704 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedsubnet.example.com" } I0118 08:58:05.217742 42731 iamrole.go:180] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0118 08:58:05.217752 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0118 08:58:05.217778 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedsubnet.example.com" } iam-role:masters.sharedsubnet.example.com ok --- PASS: TestLifecycleSharedSubnet (2.88s) === RUN TestLifecyclePrivateSharedSubnet I0118 08:58:05.218304 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:58:05.218662 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:58:05.218706 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:58:05.218749 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:58:05.218785 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:58:05.218845 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:58:05.218884 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:58:05.218913 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:58:05.218951 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:58:05.218974 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-subnet.example.com I0118 08:58:05.242410 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:58:05.245374 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:05.245460 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:05.245510 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:06.507432 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:06.667089 42731 iamrole.go:89] ListRoles: { } I0118 08:58:06.668657 42731 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0118 08:58:06.669242 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:06.669433 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:06.669510 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } I0118 08:58:06.669626 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" }] } I0118 08:58:06.669566 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:06.669782 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:58:06.669792 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:58:06.669847 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } I0118 08:58:06.669899 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0118 08:58:06.669952 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0118 08:58:06.669943 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0118 08:58:06.670005 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] }] } I0118 08:58:06.670122 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } I0118 08:58:06.670237 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0118 08:58:06.670222 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:06.670410 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.670572 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:06.670692 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:06.671543 42731 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0118 08:58:06.671656 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0118 08:58:06.671733 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0118 08:58:06.671804 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0118 08:58:06.671928 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0118 08:58:06.671914 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0118 08:58:06.671989 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0118 08:58:06.671989 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0118 08:58:06.672052 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0118 08:58:06.672095 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0118 08:58:06.672146 42731 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-su-5ol32q", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-private-shared-su-5ol32q" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0118 08:58:06.672243 42731 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0118 08:58:06.672270 42731 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0118 08:58:06.672375 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0118 08:58:06.672368 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:58:06.672428 42731 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [{ Key: "kubernetes.io/role/internal-elb", Value: "1" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Private" }] } I0118 08:58:06.672510 42731 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0118 08:58:06.672517 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0118 08:58:06.672612 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:06.672656 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:06.672728 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0118 08:58:06.672691 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0118 08:58:06.672889 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0118 08:58:06.672974 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0118 08:58:06.673093 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0118 08:58:06.673163 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:58:06.673241 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:06.673279 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:58:06.673351 42731 tags.go:42] CreateTags { Resources: ["subnet-abcdef"], Tags: [{ Key: "kubernetes.io/role/elb", Value: "1" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Utility" }] } I0118 08:58:06.673410 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:58:06.673457 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:58:06.673490 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0118 08:58:06.673566 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0118 08:58:06.673604 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:58:06.673634 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:06.673598 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-subnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0118 08:58:06.673922 42731 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0118 08:58:06.674087 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } W0118 08:58:06.674261 42731 api.go:53] PageSize not implemented I0118 08:58:06.674275 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0118 08:58:06.674252 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } W0118 08:58:06.674343 42731 loadbalancers.go:35] PageSize not implemented I0118 08:58:06.674367 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-4003to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.674412 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:06.674435 42731 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-su-5ol32q", SubnetMappings: [{ SubnetId: "subnet-abcdef" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], Type: "network" } I0118 08:58:06.674513 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0118 08:58:06.674508 42731 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] } I0118 08:58:06.674557 42731 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1", Port: 22, Protocol: "TCP" } I0118 08:58:06.674548 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0118 08:58:06.674575 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:06.674646 42731 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0118 08:58:06.674637 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0118 08:58:06.674702 42731 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } W0118 08:58:06.674765 42731 api.go:53] PageSize not implemented I0118 08:58:06.674782 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:06.674808 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-1to2379-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.674983 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-2382to4000-masters.private-shared-subnet.example.com" }] }] } I0118 08:58:06.675151 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.675257 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:06.675384 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0118 08:58:06.675488 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0118 08:58:06.675598 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:06.675691 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-udp-1to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.675866 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0118 08:58:06.675989 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0118 08:58:06.676074 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.676188 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.676304 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.676450 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.676557 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0118 08:58:06.676662 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.676762 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.676864 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0118 08:58:06.676963 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" }] }] } I0118 08:58:06.677079 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:58:06.677152 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:58:06.677255 42731 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0118 08:58:06.677310 42731 api.go:53] PageSize not implemented I0118 08:58:06.677348 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:06.677355 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0118 08:58:06.677456 42731 api.go:53] PageSize not implemented I0118 08:58:06.677493 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:06.677456 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:58:06.677571 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:58:06.677646 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:58:06.686419 42731 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0118 08:58:06.686697 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:06.686822 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:06.686923 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:06.687080 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:06.687830 42731 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0118 08:58:06.688295 42731 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0118 08:58:06.688619 42731 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0118 08:58:06.688662 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:06.688693 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:06.688754 42731 dns.go:235] Pre-creating DNS records I0118 08:58:06.688777 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:06.695090 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:58:06.697919 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:06.697987 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:06.698031 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:07.960641 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:08.099337 42731 iamrole.go:89] ListRoles: { } I0118 08:58:08.100490 42731 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0118 08:58:08.100808 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:58:08.101479 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:58:08.101581 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0118 08:58:08.101609 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0118 08:58:08.102089 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.102182 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:08.102445 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.103302 42731 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0118 08:58:08.103412 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0118 08:58:08.103569 42731 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0118 08:58:08.103623 42731 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0118 08:58:08.103546 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:58:08.103571 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0118 08:58:08.103695 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0118 08:58:08.103697 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0118 08:58:08.103741 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0118 08:58:08.103846 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0118 08:58:08.103875 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:58:08.103922 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:08.103971 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0118 08:58:08.104094 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:08.104142 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0118 08:58:08.104264 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0118 08:58:08.104370 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0118 08:58:08.104479 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:58:08.104586 42731 executor.go:111] Tasks: 72 done / 123 total; 31 can run W0118 08:58:08.104763 42731 api.go:53] PageSize not implemented I0118 08:58:08.104790 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:08.104873 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:08.104845 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0118 08:58:08.104906 42731 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } W0118 08:58:08.104918 42731 loadbalancers.go:35] PageSize not implemented I0118 08:58:08.105003 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0118 08:58:08.105036 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0118 08:58:08.104974 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:08.105069 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0118 08:58:08.105103 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0118 08:58:08.105135 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } W0118 08:58:08.105201 42731 api.go:53] PageSize not implemented I0118 08:58:08.105098 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:08.105217 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:08.105371 42731 executor.go:111] Tasks: 103 done / 123 total; 5 can run I0118 08:58:08.105453 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0118 08:58:08.105470 42731 api.go:53] PageSize not implemented I0118 08:58:08.105497 42731 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0118 08:58:08.105518 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:58:08.105542 42731 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0118 08:58:08.105546 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } W0118 08:58:08.105624 42731 api.go:53] PageSize not implemented I0118 08:58:08.105664 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:08.105712 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:08.105818 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:08.110129 42731 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0118 08:58:08.110262 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:08.110415 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:08.110479 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:08.110616 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:08.111055 42731 executor.go:111] Tasks: 115 done / 123 total; 2 can run W0118 08:58:08.111151 42731 api.go:53] PageSize not implemented I0118 08:58:08.111173 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:08.111343 42731 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0118 08:58:08.111557 42731 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0118 08:58:08.118383 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:58:08.118441 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:58:08.118468 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:58:08.118491 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:58:08.118512 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:58:08.118544 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:58:08.118573 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:58:08.118601 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:58:08.118631 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0118 08:58:08.118660 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:58:08.118683 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:58:08.118703 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:58:08.118725 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:08.118749 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:08.118776 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:58:08.118799 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0118 08:58:08.118823 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:58:08.118847 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:58:08.118871 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:58:08.118895 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:08.118941 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:08.118972 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:58:08.120278 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:58:08.120338 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:58:08.120354 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:58:08.120390 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.120437 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0118 08:58:08.120491 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.120542 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.120578 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.120610 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.120644 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.120671 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0118 08:58:08.120700 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.120733 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0118 08:58:08.120758 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } W0118 08:58:08.120793 42731 api.go:53] PageSize not implemented I0118 08:58:08.120809 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0118 08:58:08.120841 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:58:08.120862 42731 loadbalancers.go:35] PageSize not implemented I0118 08:58:08.120875 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0118 08:58:08.120903 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:58:08.120923 42731 targetgroups.go:35] PageSize not implemented I0118 08:58:08.120936 42731 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" ] } I0118 08:58:08.120986 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:58:08.121023 42731 iamrole.go:89] ListRoles: { } I0118 08:58:08.121065 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:08.121086 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:08.121121 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:58:08.121157 42731 routetable.go:53] DescribeRouteTables: { } autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com ok I0118 08:58:08.121605 42731 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4 ok autoscaling-config:lt-3 ok I0118 08:58:08.121631 42731 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0118 08:58:08.121673 42731 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1 ok autoscaling-group:nodes.private-shared-subnet.example.com ok autoscaling-config:lt-1 ok I0118 08:58:08.121746 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0118 08:58:08.121754 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0118 08:58:08.121796 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } iam-instance-profile:nodes.private-shared-subnet.example.com ok autoscaling-config:lt-2 ok autoscaling-group:bastion.private-shared-subnet.example.com ok load-balancer:api-private-shared-subnet-n2f8ak ok I0118 08:58:08.121835 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:08.121849 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0118 08:58:08.121968 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } iam-instance-profile:masters.private-shared-subnet.example.com ok I0118 08:58:08.121920 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0118 08:58:08.122038 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:08.121878 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.private-shared-subnet.example.com ok I0118 08:58:08.122066 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0118 08:58:08.122030 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0118 08:58:08.122104 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } iam-instance-profile:bastions.private-shared-subnet.example.com ok I0118 08:58:08.122090 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:58:08.122144 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 } ] } W0118 08:58:08.122261 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:08.122281 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0118 08:58:08.122316 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0118 08:58:08.122381 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0118 08:58:08.122448 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:58:08.122501 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0118 08:58:08.122674 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:08.122688 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0118 08:58:08.122776 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-subnet.example.com" } I0118 08:58:08.122852 42731 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0118 08:58:08.122814 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:08.122876 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0118 08:58:08.122925 42731 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-subnet.example.com" } iam-role:bastions.private-shared-subnet.example.com ok I0118 08:58:08.122970 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-subnet.example.com" } I0118 08:58:08.122894 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:58:08.123063 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com W0118 08:58:08.123068 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:08.123090 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0118 08:58:08.123086 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0118 08:58:08.123150 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-subnet.example.com" } iam-role:nodes.private-shared-subnet.example.com ok I0118 08:58:08.123193 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-subnet.example.com" } I0118 08:58:08.123295 42731 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0118 08:58:08.123328 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0118 08:58:08.123400 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-subnet.example.com" } iam-role:masters.private-shared-subnet.example.com ok --- PASS: TestLifecyclePrivateSharedSubnet (2.91s) === RUN TestLifecyclePrivateSharedIP I0118 08:58:08.124398 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:58:08.124739 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:58:08.124776 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:58:08.124812 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:58:08.124845 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:58:08.124883 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:58:08.124915 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:58:08.124940 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:58:08.124968 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:58:08.124990 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-ip.example.com I0118 08:58:08.148920 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:58:08.151806 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:08.151874 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:08.151925 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:09.389266 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:09.540566 42731 iamrole.go:89] ListRoles: { } I0118 08:58:09.542086 42731 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0118 08:58:09.542478 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:58:09.542586 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0118 08:58:09.542618 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0118 08:58:09.542845 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } I0118 08:58:09.542921 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] } I0118 08:58:09.542973 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:58:09.543235 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } I0118 08:58:09.543264 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:09.543305 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0118 08:58:09.543434 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.543558 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:09.543700 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } I0118 08:58:09.543709 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:09.543794 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0118 08:58:09.543825 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:09.543872 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:09.544002 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:09.544098 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:09.545178 42731 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0118 08:58:09.545320 42731 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0118 08:58:09.545353 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0118 08:58:09.545435 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0118 08:58:09.545450 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0118 08:58:09.545593 42731 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0118 08:58:09.545470 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0118 08:58:09.545607 42731 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-ip-eepmph", Port: 22, Protocol: "TCP", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-private-shared-ip-eepmph" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0118 08:58:09.545651 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0118 08:58:09.545720 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0118 08:58:09.545707 42731 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.timeout_seconds", Value: "30" },{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0118 08:58:09.545731 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0118 08:58:09.545836 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:09.545759 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0118 08:58:09.545879 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:09.545930 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:09.545980 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0118 08:58:09.546029 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0118 08:58:09.546130 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "private-shared-ip.example.com" } ] }], VpcId: "vpc-12345678" } I0118 08:58:09.546104 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0118 08:58:09.546323 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:09.546511 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" } ] }], VpcId: "vpc-12345678" } I0118 08:58:09.546518 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:58:09.546635 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] }] } I0118 08:58:09.546721 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0118 08:58:09.546811 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-12345678" } I0118 08:58:09.546797 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0118 08:58:09.546956 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0118 08:58:09.547040 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0118 08:58:09.547137 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:09.547225 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }], VpcId: "vpc-12345678" } I0118 08:58:09.547298 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:58:09.547341 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:58:09.547302 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0118 08:58:09.547205 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-ip.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0118 08:58:09.547402 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:58:09.547503 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:58:09.547544 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:58:09.547583 42731 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" } ] } I0118 08:58:09.547658 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:09.547706 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:09.547739 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0118 08:58:09.547815 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0118 08:58:09.547854 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:58:09.547888 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:58:09.547942 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0118 08:58:09.548023 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:58:09.548063 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:58:09.548153 42731 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0118 08:58:09.548301 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0118 08:58:09.548484 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:58:09.548550 42731 loadbalancers.go:35] PageSize not implemented W0118 08:58:09.548564 42731 api.go:53] PageSize not implemented I0118 08:58:09.548476 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0118 08:58:09.548646 42731 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-ip-eepmph", SubnetMappings: [{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }], Type: "network" } I0118 08:58:09.548709 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:09.548794 42731 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"], Tags: [{ Key: "Name", Value: "api.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0118 08:58:09.548853 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:09.548883 42731 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0118 08:58:09.548935 42731 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0118 08:58:09.548721 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.549040 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:58:09.549111 42731 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1", Port: 22, Protocol: "TCP" } W0118 08:58:09.549200 42731 api.go:53] PageSize not implemented I0118 08:58:09.549229 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:09.549298 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0118 08:58:09.549512 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0118 08:58:09.549668 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:58:09.549815 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:09.549909 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:09.550025 42731 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0118 08:58:09.550124 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:09.550221 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-1to2379-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.550393 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-2382to4000-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0118 08:58:09.550504 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-udp-1to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0118 08:58:09.550620 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.550725 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0118 08:58:09.550829 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:58:09.550904 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.551006 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-::/0" }] }] } I0118 08:58:09.551107 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:58:09.551182 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-masters.private-shared-ip.example.com" }] }] } I0118 08:58:09.551280 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0118 08:58:09.551317 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0118 08:58:09.551348 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0118 08:58:09.551448 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0118 08:58:09.551490 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.551592 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0118 08:58:09.551627 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0118 08:58:09.551653 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.551763 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0118 08:58:09.551862 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:58:09.551985 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.552154 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0118 08:58:09.552201 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0118 08:58:09.552292 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:09.552382 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:09.552468 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.552632 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0118 08:58:09.552753 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-4003to65535-masters.private-shared-ip.example.com" }] }] } I0118 08:58:09.552868 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:58:09.552909 42731 tags.go:42] CreateTags { Resources: ["eipalloc-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "shared" }] } I0118 08:58:09.552990 42731 executor.go:111] Tasks: 110 done / 132 total; 6 can run I0118 08:58:09.553112 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0118 08:58:09.553155 42731 api.go:53] PageSize not implemented I0118 08:58:09.553174 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:58:09.553201 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:09.553092 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:58:09.553212 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:58:09.553300 42731 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } W0118 08:58:09.553356 42731 api.go:53] PageSize not implemented I0118 08:58:09.553324 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:58:09.553401 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:09.553411 42731 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-12345678", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0118 08:58:09.553488 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0118 08:58:09.553524 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:58:09.553557 42731 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0118 08:58:09.561848 42731 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0118 08:58:09.562091 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:09.562219 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:09.562305 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:58:09.562462 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0118 08:58:09.562513 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:09.562601 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:09.563293 42731 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0118 08:58:09.563553 42731 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0118 08:58:09.563783 42731 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0118 08:58:09.563834 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:09.563869 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:09.563932 42731 dns.go:235] Pre-creating DNS records I0118 08:58:09.563953 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:09.569189 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:58:09.572596 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:09.572669 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:09.572714 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:10.804358 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:10.958020 42731 iamrole.go:89] ListRoles: { } I0118 08:58:10.959593 42731 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0118 08:58:10.959802 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.960142 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0118 08:58:10.960264 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0118 08:58:10.960304 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0118 08:58:10.960348 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.960714 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:58:10.960942 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:10.962879 42731 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0118 08:58:10.963122 42731 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0118 08:58:10.963049 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.963169 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0118 08:58:10.963284 42731 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0118 08:58:10.963211 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0118 08:58:10.963247 42731 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0118 08:58:10.963381 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0118 08:58:10.963425 42731 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0118 08:58:10.963419 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0118 08:58:10.963488 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:58:10.963536 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0118 08:58:10.963632 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0118 08:58:10.963753 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:10.963801 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.963910 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.964018 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0118 08:58:10.964046 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0118 08:58:10.964157 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:58:10.964200 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0118 08:58:10.964304 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:10.964349 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.964795 42731 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0118 08:58:10.964984 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:58:10.965050 42731 loadbalancers.go:35] PageSize not implemented I0118 08:58:10.965067 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0118 08:58:10.965100 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0118 08:58:10.965133 42731 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } W0118 08:58:10.965160 42731 api.go:53] PageSize not implemented I0118 08:58:10.965171 42731 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0118 08:58:10.965199 42731 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0118 08:58:10.965098 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:10.965199 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:10.965308 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:10.965350 42731 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0118 08:58:10.965340 42731 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } W0118 08:58:10.965408 42731 api.go:53] PageSize not implemented I0118 08:58:10.965413 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:58:10.965431 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:10.965491 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:58:10.965565 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:10.965628 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:10.965705 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:10.965789 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:10.965939 42731 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0118 08:58:10.966044 42731 api.go:53] PageSize not implemented I0118 08:58:10.966042 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:58:10.966076 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } W0118 08:58:10.966113 42731 api.go:53] PageSize not implemented I0118 08:58:10.966134 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0118 08:58:10.966172 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:10.966113 42731 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0118 08:58:10.966185 42731 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0118 08:58:10.966232 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:10.966077 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:58:10.966381 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0118 08:58:10.966378 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:10.970529 42731 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0118 08:58:10.970692 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0118 08:58:10.970803 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:10.970911 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:10.971026 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:10.971078 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:10.971613 42731 executor.go:111] Tasks: 124 done / 132 total; 2 can run W0118 08:58:10.971699 42731 api.go:53] PageSize not implemented I0118 08:58:10.971716 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:10.971879 42731 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0118 08:58:10.972090 42731 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0118 08:58:10.974767 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:58:10.974822 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:58:10.974849 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:58:10.974876 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:58:10.974904 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:58:10.974930 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:58:10.974958 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:58:10.974986 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:58:10.975019 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0118 08:58:10.975046 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0118 08:58:10.975071 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:58:10.975093 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:58:10.975113 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:58:10.975139 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:58:10.975162 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0118 08:58:10.975188 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:10.975214 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:10.975240 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0118 08:58:10.975265 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0118 08:58:10.975289 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:58:10.975314 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:58:10.975338 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0118 08:58:10.975363 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:58:10.975385 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:58:10.975408 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:10.975436 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:10.975466 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:58:10.976719 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:58:10.976782 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:58:10.976798 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:58:10.976833 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.976880 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0118 08:58:10.976933 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.976985 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.977019 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.977052 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.977085 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.977120 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0118 08:58:10.977162 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.977204 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:58:10.977227 42731 natgateway.go:117] DescribeNatGateways: { } I0118 08:58:10.977262 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0118 08:58:10.977287 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } W0118 08:58:10.977324 42731 api.go:53] PageSize not implemented I0118 08:58:10.977337 42731 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0118 08:58:10.977372 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:58:10.977393 42731 loadbalancers.go:35] PageSize not implemented I0118 08:58:10.977408 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0118 08:58:10.977442 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:58:10.977462 42731 targetgroups.go:35] PageSize not implemented I0118 08:58:10.977477 42731 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" ] } I0118 08:58:10.977521 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:58:10.977554 42731 iamrole.go:89] ListRoles: { } I0118 08:58:10.977594 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:10.977616 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:10.977655 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:58:10.977692 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:58:10.977720 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0118 08:58:10.977754 42731 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0118 08:58:10.977782 42731 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } autoscaling-config:lt-3 ok I0118 08:58:10.978306 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:10.978335 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0118 08:58:10.978373 42731 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0118 08:58:10.978410 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } autoscaling-group:bastion.private-shared-ip.example.com ok I0118 08:58:10.978358 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } iam-instance-profile:nodes.private-shared-ip.example.com ok W0118 08:58:10.978468 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions autoscaling-group:master-us-test-1a.masters.private-shared-ip.example.com ok load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1 ok I0118 08:58:10.978486 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } I0118 08:58:10.978490 42731 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } autoscaling-config:lt-2 ok target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4 ok I0118 08:58:10.978497 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0118 08:58:10.978566 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } autoscaling-group:nodes.private-shared-ip.example.com ok I0118 08:58:10.978550 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } autoscaling-config:lt-1 ok I0118 08:58:10.978639 42731 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } load-balancer:api-private-shared-ip-exa-ohatqj ok I0118 08:58:10.978711 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0118 08:58:10.978774 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0118 08:58:10.978822 42731 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0118 08:58:10.978873 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0118 08:58:10.978908 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } iam-instance-profile:masters.private-shared-ip.example.com ok I0118 08:58:10.978958 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } security-group:sg-1 ok iam-instance-profile:bastions.private-shared-ip.example.com ok keypair:key-1 ok I0118 08:58:10.979008 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0118 08:58:10.979180 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:10.979203 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0118 08:58:10.979058 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.private-shared-ip.example.com ok I0118 08:58:10.979230 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0118 08:58:10.979295 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 } ] } W0118 08:58:10.979421 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:10.979434 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0118 08:58:10.979513 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0118 08:58:10.979540 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-ip.example.com" } I0118 08:58:10.979587 42731 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0118 08:58:10.979560 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:10.979603 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0118 08:58:10.979631 42731 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-ip.example.com" } iam-role:bastions.private-shared-ip.example.com ok I0118 08:58:10.979659 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-ip.example.com" } I0118 08:58:10.979617 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0118 08:58:10.979724 42731 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-ip.example.com W0118 08:58:10.979738 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:10.979737 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0118 08:58:10.979753 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0118 08:58:10.979758 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-ip.example.com" } iam-role:masters.private-shared-ip.example.com ok I0118 08:58:10.979786 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0118 08:58:10.979804 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-ip.example.com" } I0118 08:58:10.979845 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0118 08:58:10.979857 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0118 08:58:10.979883 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-ip.example.com" } iam-role:nodes.private-shared-ip.example.com ok I0118 08:58:10.979954 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0118 08:58:10.980010 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok --- PASS: TestLifecyclePrivateSharedIP (2.86s) === RUN TestLifecycleManyAddons I0118 08:58:10.980556 42731 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:58:10.980891 42731 internetgateways.go:66] CreateInternetGateway: { } I0118 08:58:10.980926 42731 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:58:10.980965 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:58:10.981000 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:58:10.981039 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:58:10.981074 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:58:10.981098 42731 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:58:10.981130 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:58:10.981152 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0118 08:58:11.009422 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:58:11.012460 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:11.012562 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:12.247286 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:12.916286 42731 iamrole.go:89] ListRoles: { } I0118 08:58:12.917168 42731 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0118 08:58:12.918248 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0118 08:58:12.918302 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0118 08:58:12.918367 42731 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0118 08:58:12.918396 42731 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0118 08:58:12.920301 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:12.920613 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:58:12.920797 42731 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0118 08:58:12.921044 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0118 08:58:12.921317 42731 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0118 08:58:12.921419 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:58:12.921530 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:12.921790 42731 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.921915 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:58:12.921983 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:12.922803 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:12.923994 42731 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.924713 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:12.924886 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] }] } I0118 08:58:12.925670 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:12.925828 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:12.925874 42731 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0118 08:58:12.925991 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:12.927989 42731 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0118 08:58:12.928101 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:12.928254 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0118 08:58:12.928249 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:12.928397 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0118 08:58:12.928451 42731 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0118 08:58:12.928538 42731 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0118 08:58:12.928426 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0118 08:58:12.928717 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:12.928842 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeTags\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0118 08:58:12.928941 42731 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0118 08:58:12.929023 42731 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0118 08:58:12.929075 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:12.929206 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0118 08:58:12.929292 42731 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.929378 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:58:12.929367 42731 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" } ] }], VpcId: "vpc-1" } I0118 08:58:12.929430 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:12.929599 42731 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" } ] }], VpcId: "vpc-1" } I0118 08:58:12.929625 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0118 08:58:12.929909 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:58:12.929990 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:12.930032 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:12.930073 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:58:12.930109 42731 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0118 08:58:12.930184 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:58:12.930219 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:58:12.930248 42731 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0118 08:58:12.930308 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:12.930345 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:12.930747 42731 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"acm:DescribeCertificate\",\n \"acm:ListCertificates\",\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"cognito-idp:DescribeUserPoolClient\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:CreateSnapshot\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcPeeringConnections\",\n \"ec2:DescribeVpcs\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"elasticloadbalancing:DescribeListenerCertificates\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeRules\",\n \"elasticloadbalancing:DescribeTags\",\n \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteSnapshot\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddListenerCertificates\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteRule\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyRule\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:RemoveListenerCertificates\",\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:SetIpAddressType\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\",\n \"elasticloadbalancing:SetSecurityGroups\",\n \"elasticloadbalancing:SetSubnets\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateRule\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0118 08:58:12.933243 42731 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0118 08:58:12.933416 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:12.933561 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:12.933648 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:12.933763 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:12.933913 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.934069 42731 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:58:12.934180 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.934312 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" }] }] } I0118 08:58:12.934419 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:12.934528 42731 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0118 08:58:12.934640 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" }] }] } I0118 08:58:12.934797 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.934909 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.935086 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.935199 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.935314 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0118 08:58:12.935357 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.935474 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.935600 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" }] }] } I0118 08:58:12.935708 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.935825 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.935942 42731 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" }] }] } I0118 08:58:12.936053 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:12.936131 42731 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0118 08:58:12.936169 42731 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0118 08:58:12.936281 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:12.936692 42731 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0118 08:58:12.936912 42731 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0118 08:58:12.937178 42731 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0118 08:58:12.937233 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:12.937267 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:12.937331 42731 dns.go:235] Pre-creating DNS records I0118 08:58:12.937357 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:12.942478 42731 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0118 08:58:12.945501 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:12.945574 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:14.165039 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:14.871370 42731 iamrole.go:89] ListRoles: { } I0118 08:58:14.872324 42731 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0118 08:58:14.872521 42731 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0118 08:58:14.872722 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.872815 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:58:14.872846 42731 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:58:14.872879 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:14.873044 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.874258 42731 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0118 08:58:14.874440 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.874669 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.875261 42731 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0118 08:58:14.875408 42731 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0118 08:58:14.875471 42731 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0118 08:58:14.875385 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.875549 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.875670 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0118 08:58:14.875797 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:14.875849 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:14.875942 42731 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:58:14.876006 42731 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:58:14.876044 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.876143 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0118 08:58:14.876270 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:14.878029 42731 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0118 08:58:14.878130 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:14.878234 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:14.878306 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0118 08:58:14.878441 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:14.878571 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:14.878714 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:14.878755 42731 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0118 08:58:14.879313 42731 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0118 08:58:14.879499 42731 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0118 08:58:14.879761 42731 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0118 08:58:14.882206 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0118 08:58:14.882260 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0118 08:58:14.882292 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0118 08:58:14.882316 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0118 08:58:14.882338 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0118 08:58:14.882364 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0118 08:58:14.882386 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0118 08:58:14.882415 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0118 08:58:14.882441 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0118 08:58:14.882471 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0118 08:58:14.882502 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0118 08:58:14.882525 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0118 08:58:14.882545 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0118 08:58:14.882570 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0118 08:58:14.882593 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:58:14.882618 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0118 08:58:14.882643 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:58:14.882670 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0118 08:58:14.882693 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0118 08:58:14.882714 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0118 08:58:14.882739 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0118 08:58:14.882766 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0118 08:58:14.882795 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:58:14.882823 42731 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0118 08:58:14.884225 42731 delete_cluster.go:128] Looking for cloud resources to delete W0118 08:58:14.884278 42731 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0118 08:58:14.884293 42731 keypairs.go:95] DescribeKeyPairs: { } I0118 08:58:14.884324 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.884363 42731 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0118 08:58:14.884406 42731 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.884450 42731 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.884485 42731 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.884526 42731 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.884559 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.884589 42731 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0118 08:58:14.884625 42731 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.884667 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0118 08:58:14.884698 42731 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0118 08:58:14.884735 42731 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0118 08:58:14.884764 42731 api.go:53] PageSize not implemented I0118 08:58:14.884783 42731 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0118 08:58:14.884804 42731 loadbalancers.go:35] PageSize not implemented I0118 08:58:14.884821 42731 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0118 08:58:14.884841 42731 targetgroups.go:35] PageSize not implemented I0118 08:58:14.884858 42731 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0118 08:58:14.884897 42731 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0118 08:58:14.884930 42731 iamrole.go:89] ListRoles: { } I0118 08:58:14.884965 42731 zones.go:93] ListHostedZonesPages { } I0118 08:58:14.884988 42731 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0118 08:58:14.885022 42731 internetgateways.go:101] DescribeInternetGateways: { } I0118 08:58:14.885061 42731 routetable.go:53] DescribeRouteTables: { } I0118 08:58:14.885088 42731 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-group:master-us-test-1a.masters.minimal.example.com ok autoscaling-group:nodes.minimal.example.com ok I0118 08:58:14.885450 42731 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0118 08:58:14.885538 42731 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-1 ok I0118 08:58:14.885533 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } autoscaling-config:lt-2 ok I0118 08:58:14.885613 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0118 08:58:14.885652 42731 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0118 08:58:14.885653 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0118 08:58:14.885696 42731 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0118 08:58:14.885532 42731 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.minimal.example.com. ok I0118 08:58:14.885717 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0118 08:58:14.885916 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:14.885939 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0118 08:58:14.885978 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0118 08:58:14.886031 42731 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0118 08:58:14.886071 42731 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0118 08:58:14.886113 42731 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0118 08:58:14.886203 42731 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0118 08:58:14.886221 42731 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0118 08:58:14.886252 42731 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0118 08:58:14.886355 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0118 08:58:14.886408 42731 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0118 08:58:14.886383 42731 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0118 08:58:14.886422 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0118 08:58:14.886452 42731 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0118 08:58:14.886477 42731 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0118 08:58:14.886528 42731 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0118 08:58:14.886540 42731 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0118 08:58:14.886570 42731 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0118 08:58:14.886632 42731 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0118 08:58:14.886697 42731 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0118 08:58:14.886754 42731 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleManyAddons (3.91s) === RUN TestGetFilters --- PASS: TestGetFilters (0.00s) === RUN TestGetInstanceSelectorOpts --- PASS: TestGetInstanceSelectorOpts (0.00s) === RUN TestValidateAllPrivateOrPublicSubnets --- PASS: TestValidateAllPrivateOrPublicSubnets (0.00s) === RUN TestValidateUserSubnetsWithClusterSubnets --- PASS: TestValidateUserSubnetsWithClusterSubnets (0.00s) === RUN TestCreateInstanceGroup --- PASS: TestCreateInstanceGroup (0.00s) === RUN TestDecorateWithInstanceGroupSpecs --- PASS: TestDecorateWithInstanceGroupSpecs (0.00s) === RUN TestDecorateWithMixedInstancesPolicy --- PASS: TestDecorateWithMixedInstancesPolicy (0.00s) === RUN TestDecorateWithClusterAutoscalerLabels --- PASS: TestDecorateWithClusterAutoscalerLabels (0.00s) === RUN TestNewTemplateContext --- PASS: TestNewTemplateContext (0.00s) PASS ok k8s.io/kops/cmd/kops 200.746s === RUN TestBuildProxyRequest === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/livez === RUN TestBuildProxyRequest/http://127.0.0.1:3990/healthz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ready === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz? === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude --- PASS: TestBuildProxyRequest (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/livez (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/healthz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ready (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz? (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude (0.00s) PASS ok k8s.io/kops/cmd/kube-apiserver-healthcheck 0.004s === RUN TestAliasForNodesInRole --- PASS: TestAliasForNodesInRole (0.00s) === RUN TestEnsureDotSuffix --- PASS: TestEnsureDotSuffix (0.00s) === RUN TestParseZoneSpec --- PASS: TestParseZoneSpec (0.00s) === RUN TestParseZoneRules I0118 08:54:54.163080 42733 zonespec.go:75] No rules specified, will permit management of all zones --- PASS: TestParseZoneRules (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/dns 0.004s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/util 0.003s === RUN TestPodController I0118 08:54:54.181807 42734 pod.go:59] starting pod controller I0118 08:54:54.181948 42734 stoppable.go:62] shutting down controller I0118 08:54:54.182008 42734 pod.go:107] Got stop signal --- PASS: TestPodController (0.00s) PASS I0118 08:54:54.182025 42734 pod.go:65] shutting down pod controller ok k8s.io/kops/dns-controller/pkg/watchers 0.024s === RUN TestEquivalent --- PASS: TestEquivalent (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider 0.004s Parsing flags. Getting new test interface. Running tests... === RUN TestZonesList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00011d5d0} route53_test.go:93: Got zone list: [0xc00011d600] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a140} --- PASS: TestZonesList (0.00s) === RUN TestZonesID route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00011d730} route53_test.go:93: Got zone list: [0xc00011d760] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a158} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess route53_test.go:79: Got zones {0xc00011d860} route53_test.go:170: Successfully added managed DNS zone: &{0xc0003bb5c0 0xc00012a178} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00011da10} route53_test.go:93: Got zone list: [0xc00011da40] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a198} route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00011dba0} route53_test.go:93: Got zone list: [0xc00011dbd0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a1c0} route53_test.go:187: Successfully added resource record set: {0xc0003b7ef0 0xc00012a1e0} --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00011deb0} route53_test.go:93: Got zone list: [0xc00011dee0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a270} route53_test.go:199: Successfully added resource record set: {0xc0003de120 0xc00012a290} route53_test.go:118: Got 1 recordsets: [0xc0003e2100] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0003e2290} route53_test.go:93: Got zone list: [0xc0003e22c0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a330} route53_test.go:221: Successfully added resource record set: {0xc0003de2d0 0xc00012a350} route53_test.go:228: Correctly failed to add duplicate resource record {0xc0003de2d0 0xc00012a350}: attempt to create duplicate rrset www11.example.com::A --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0003e2680} route53_test.go:93: Got zone list: [0xc0003e26b0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a410} route53_test.go:246: Successfully removed resource set {0xc0003de510 0xc00012a430} after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0003e2990} route53_test.go:93: Got zone list: [0xc0003e29c0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a4c0} route53_test.go:264: Successfully removed resource set {0xc0003de6c0 0xc00012a4e0} after adding route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0003e2cd0} route53_test.go:93: Got zone list: [0xc0003e2d00] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a578} commontests.go:192: Successfully added resource record set: {0xc0003de870 0xc00012a598} commontests.go:45: Correctly replaced resource record {0xc0003de870 0xc00012a598} -> {0xc0003de990 0xc00012a5e8} commontests.go:142: Got 1 recordsets: [0xc0003e3010] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0003e3240} route53_test.go:93: Got zone list: [0xc0003e3270] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a6a0} commontests.go:192: Successfully added resource record set: {0xc0003dec60 0xc00012a6c0} commontests.go:70: Correctly replaced resource record {0xc0003dec60 0xc00012a6c0} -> {0xc0003ded80 0xc00012a710} commontests.go:142: Got 1 recordsets: [0xc0003e3580] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0003e3800} route53_test.go:93: Got zone list: [0xc0003e3830] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a7d8} commontests.go:192: Successfully added resource record set: {0xc0003df050 0xc00012a7f8} commontests.go:142: Got 2 recordsets: [0xc0003e3aa0 0xc0003e3ac0] commontests.go:142: Got 2 recordsets: [0xc0003e3b30 0xc0003e3b50] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0003e3d50} route53_test.go:93: Got zone list: [0xc0003e3d80] route53_test.go:98: Got at least 1 zone in list:&{0xc0003bb380 0xc00012a900} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53 0.011s === RUN TestZonesList --- PASS: TestZonesList (0.00s) === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestRemove --- PASS: TestRemove (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/do 0.006s === RUN TestZonesList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc000000e00} clouddns_test.go:71: Got zone list: [0xc000734090] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc000734060} --- PASS: TestZonesList (0.00s) === RUN TestZonesID clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc000000f00} clouddns_test.go:71: Got zone list: [0xc000734150] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc000734120} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess clouddns_test.go:131: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc000001000} clouddns_test.go:133: Got zones, making new Zone clouddns_test.go:149: Successfully added managed DNS zone: &{0xc00003d300 0xc000734210} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc0000010c0} clouddns_test.go:71: Got zone list: [0xc0007342d0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc0007342a0} clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc0000011e0} clouddns_test.go:71: Got zone list: [0xc000734408] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc0007343d8} clouddns_test.go:165: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc000001320} clouddns_test.go:71: Got zone list: [0xc000734570] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc000734540} clouddns_test.go:176: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:96: Got 1 recordsets: [<(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc000001480} clouddns_test.go:71: Got zone list: [0xc000734780] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc000734750} clouddns_test.go:198: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:205: Correctly failed to add duplicate resource record <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>: attempt to insert duplicate rrset {www11.example.com [10.10.10.10 169.20.20.20] 180 A} --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc0000015e0} clouddns_test.go:71: Got zone list: [0xc000734918] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc0007348e8} clouddns_test.go:223: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc000001720} clouddns_test.go:71: Got zone list: [0xc000734a80] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc000734a50} clouddns_test.go:241: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc000001880} clouddns_test.go:71: Got zone list: [0xc000734c48] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc000734c18} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:45: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc0000019e0} clouddns_test.go:71: Got zone list: [0xc000734f18] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc000734ee8} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:70: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc000001b60} clouddns_test.go:71: Got zone list: [0xc000735248] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc000735218} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40>] commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40>] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000800058 0xc000001d40} clouddns_test.go:71: Got zone list: [0xc000735620] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00003d180 0xc0007355f0} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns 0.046s === RUN TestContract --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/openstack/designate 0.020s === RUN TestZonesListValid --- PASS: TestZonesListValid (0.00s) === RUN TestZonesListShouldFail --- PASS: TestZonesListShouldFail (0.00s) === RUN TestAddValid --- PASS: TestAddValid (0.00s) === RUN TestAddShouldFail --- PASS: TestAddShouldFail (0.00s) === RUN TestRemoveValid --- PASS: TestRemoveValid (0.00s) === RUN TestRemoveShouldFail --- PASS: TestRemoveShouldFail (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/scaleway 0.006s === RUN TestBootstarapBuilder_Simple --- PASS: TestBootstarapBuilder_Simple (0.00s) PASS ok k8s.io/kops/nodeup/pkg/bootstrap 0.043s === RUN TestBuildAzure --- PASS: TestBuildAzure (0.00s) === RUN TestBuildAWSCustomNodeIPFamilies --- PASS: TestBuildAWSCustomNodeIPFamilies (0.00s) === RUN TestContainerdBuilder_Docker_19_03_13 I0118 08:54:57.510123 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.510355 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.510387 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.510414 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.510434 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.510471 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.510495 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.510505 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.510527 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.510543 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.515555 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_13 (0.01s) === RUN TestContainerdBuilder_Docker_19_03_14 I0118 08:54:57.518994 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.519177 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.519198 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.519219 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.519235 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.519256 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.519273 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.519283 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.519299 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.519310 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.520037 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_14 (0.00s) === RUN TestContainerdBuilder_Simple I0118 08:54:57.522056 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.522154 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.522180 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.522195 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.522208 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.522226 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.522240 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.522251 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.522264 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.522273 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.522869 43497 zones.go:93] ListHostedZonesPages { } I0118 08:54:57.523813 43497 assetstore.go:108] Matching assets for "^bin/(containerd|ctr)": I0118 08:54:57.523824 43497 assetstore.go:111] bin/containerd I0118 08:54:57.523828 43497 assetstore.go:111] bin/containerd-shim I0118 08:54:57.523831 43497 assetstore.go:111] bin/containerd-shim-runc-v1 I0118 08:54:57.523834 43497 assetstore.go:111] bin/containerd-shim-runc-v2 I0118 08:54:57.523837 43497 assetstore.go:111] bin/containerd-stress I0118 08:54:57.523840 43497 assetstore.go:111] bin/ctr I0118 08:54:57.523862 43497 assetstore.go:108] Matching assets for "/runc\\.(amd64|arm64)$": I0118 08:54:57.523869 43497 assetstore.go:111] https://github.com/opencontainers/runc/releases/download/v1.1.0/runc.amd64 --- PASS: TestContainerdBuilder_Simple (0.01s) === RUN TestContainerdBuilder_Flatcar I0118 08:54:57.527154 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.527313 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.527332 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.527353 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.527369 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.527389 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.527406 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.527423 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.527438 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.527458 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.528136 43497 zones.go:93] ListHostedZonesPages { } I0118 08:54:57.529319 43497 containerd.go:60] Detected Flatcar; won't install containerd --- PASS: TestContainerdBuilder_Flatcar (0.00s) === RUN TestContainerdBuilder_SkipInstall I0118 08:54:57.530152 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.530263 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.530276 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.530290 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.530309 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.530333 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.530352 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.530369 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.530396 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.530406 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.530986 43497 zones.go:93] ListHostedZonesPages { } I0118 08:54:57.531961 43497 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestContainerdBuilder_SkipInstall (0.00s) === RUN TestContainerdBuilder_BuildFlags --- PASS: TestContainerdBuilder_BuildFlags (0.00s) === RUN TestContainerdConfig --- PASS: TestContainerdConfig (0.00s) === RUN TestAppendGPURuntimeContainerdConfig --- PASS: TestAppendGPURuntimeContainerdConfig (0.00s) === RUN TestDockerBuilder_19_03_11 I0118 08:54:57.532370 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.532463 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.532487 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.532503 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.532517 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.532540 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.532560 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.532571 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.532585 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.532594 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.533169 43497 zones.go:93] ListHostedZonesPages { } I0118 08:54:57.534121 43497 assetstore.go:108] Matching assets for "^docker/": I0118 08:54:57.534131 43497 assetstore.go:111] docker/containerd I0118 08:54:57.534135 43497 assetstore.go:111] docker/containerd-shim I0118 08:54:57.534138 43497 assetstore.go:111] docker/ctr I0118 08:54:57.534141 43497 assetstore.go:111] docker/docker I0118 08:54:57.534144 43497 assetstore.go:111] docker/docker-init I0118 08:54:57.534148 43497 assetstore.go:111] docker/docker-proxy I0118 08:54:57.534151 43497 assetstore.go:111] docker/dockerd I0118 08:54:57.534153 43497 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_19_03_11 (0.00s) === RUN TestDockerBuilder_LogFlags I0118 08:54:57.535774 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.535871 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.535884 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.535898 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.535910 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.535926 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.535940 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.535950 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.535963 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.535971 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.536495 43497 zones.go:93] ListHostedZonesPages { } I0118 08:54:57.537441 43497 assetstore.go:108] Matching assets for "^docker/": I0118 08:54:57.537455 43497 assetstore.go:111] docker/containerd I0118 08:54:57.537461 43497 assetstore.go:111] docker/containerd-shim I0118 08:54:57.537467 43497 assetstore.go:111] docker/ctr I0118 08:54:57.537472 43497 assetstore.go:111] docker/docker I0118 08:54:57.537475 43497 assetstore.go:111] docker/docker-init I0118 08:54:57.537479 43497 assetstore.go:111] docker/docker-proxy I0118 08:54:57.537484 43497 assetstore.go:111] docker/dockerd I0118 08:54:57.537488 43497 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_LogFlags (0.00s) === RUN TestDockerBuilder_SkipInstall I0118 08:54:57.539286 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.539388 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.539402 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.539421 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.539433 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.539449 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.539462 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.539472 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.539484 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.539493 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.540058 43497 zones.go:93] ListHostedZonesPages { } I0118 08:54:57.540944 43497 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestDockerBuilder_SkipInstall (0.00s) === RUN TestDockerBuilder_HealthCheck I0118 08:54:57.541042 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.541132 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.541144 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.541157 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.541169 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.541184 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.541195 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.541205 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.541216 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.541225 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.541744 43497 zones.go:93] ListHostedZonesPages { } I0118 08:54:57.542591 43497 assetstore.go:108] Matching assets for "^docker/": I0118 08:54:57.542600 43497 assetstore.go:111] docker/docker I0118 08:54:57.542604 43497 assetstore.go:111] docker/docker-containerd I0118 08:54:57.542607 43497 assetstore.go:111] docker/docker-containerd-ctr I0118 08:54:57.542610 43497 assetstore.go:111] docker/docker-containerd-shim I0118 08:54:57.542613 43497 assetstore.go:111] docker/docker-init I0118 08:54:57.542616 43497 assetstore.go:111] docker/docker-proxy I0118 08:54:57.542618 43497 assetstore.go:111] docker/docker-runc I0118 08:54:57.542622 43497 assetstore.go:111] docker/dockerd --- PASS: TestDockerBuilder_HealthCheck (0.00s) === RUN TestDockerBuilder_BuildFlags --- PASS: TestDockerBuilder_BuildFlags (0.00s) === RUN TestContainerdHooksBuilder I0118 08:54:57.544889 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.544980 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.544993 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.545012 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.545023 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.545038 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.545050 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.545058 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.545069 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.545076 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.546492 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdHooksBuilder (0.00s) === RUN TestDockerHooksBuilder I0118 08:54:57.547884 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.547973 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.547986 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.547998 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.548022 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.548036 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.548051 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.548061 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.548072 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.548080 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.549164 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestDockerHooksBuilder (0.00s) === RUN TestKopsControllerBuilder I0118 08:54:57.552105 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.552215 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.552231 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.552247 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.552261 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.552277 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.552290 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.552300 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.552312 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.552321 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.553379 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKopsControllerBuilder (0.00s) === RUN Test_KubeAPIServer_BuildFlags --- PASS: Test_KubeAPIServer_BuildFlags (0.00s) === RUN TestKubeAPIServerBuilder I0118 08:54:57.556967 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.557113 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.557130 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.557154 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.557172 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.557194 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.557212 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.557227 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.557246 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.557259 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.558615 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilder (0.01s) === RUN TestAuditConfigAPIServerBuilder I0118 08:54:57.563927 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.564029 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.564042 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.564057 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.564071 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.564087 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.564101 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.564110 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.564123 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.564132 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.565913 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestAuditConfigAPIServerBuilder (0.01s) === RUN TestOIDCConfigAPIServerBuilder I0118 08:54:57.570991 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.571183 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.571203 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.571228 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.571243 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.571263 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.571280 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.571291 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.571307 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.571319 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.573568 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestOIDCConfigAPIServerBuilder (0.01s) === RUN TestDeddicatedAPIServerBuilder I0118 08:54:57.577590 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.577745 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.577762 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.577783 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.577798 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.577818 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.577845 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.577856 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.577871 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.577883 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.578878 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestDeddicatedAPIServerBuilder (0.01s) === RUN TestWithoutEtcdEventsAPIServerBuilder I0118 08:54:57.582730 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.582895 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.582912 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.582930 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.582945 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.582963 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.582979 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.582995 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.583019 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.583044 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.584416 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestWithoutEtcdEventsAPIServerBuilder (0.01s) === RUN TestAwsIamAuthenticator I0118 08:54:57.588683 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.588840 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.588856 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.588873 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.588888 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.588907 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.588922 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.588933 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.588948 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.588959 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.589986 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestAwsIamAuthenticator (0.01s) === RUN TestKubeAPIServerBuilderAMD64 I0118 08:54:57.596371 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:57.596550 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:57.596571 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:57.596595 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:57.596616 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:57.596639 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:57.596660 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:57.596675 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:57.596695 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:57.596709 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:57.598259 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderAMD64 (1.17s) === RUN TestKubeAPIServerBuilderARM64 I0118 08:54:58.770716 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:58.770912 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:58.770934 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:58.770959 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:58.770975 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:58.770997 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:58.771016 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:58.771027 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:58.771051 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:58.771071 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:58.772233 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderARM64 (1.13s) === RUN TestKubeControllerManagerBuilder I0118 08:54:59.904942 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:59.905308 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:59.905341 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:59.905380 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:59.905405 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:59.905442 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:59.905475 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:59.905494 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:59.905521 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:59.905541 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:59.907564 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilder (0.01s) === RUN TestKubeControllerManagerBuilderAMD64 I0118 08:54:59.914422 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:54:59.914791 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:54:59.914836 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:54:59.914877 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:54:59.914905 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:54:59.914940 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:54:59.914973 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:54:59.914992 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:54:59.915027 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:54:59.915050 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:54:59.917152 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderAMD64 (1.13s) === RUN TestKubeControllerManagerBuilderARM64 I0118 08:55:01.046603 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:01.046831 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:01.046858 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:01.046888 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:01.046911 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:01.046949 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:01.046973 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:01.046989 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:01.047010 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:01.047026 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:01.048614 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderARM64 (1.14s) === RUN TestKubeProxyBuilder_buildPod === RUN TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 --- PASS: TestKubeProxyBuilder_buildPod (0.00s) --- PASS: TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 (0.00s) === RUN TestKubeProxyBuilder I0118 08:55:02.185283 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:02.185558 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:02.185587 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:02.185619 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:02.185641 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:02.185672 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:02.185697 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:02.185712 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:02.185736 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:02.185764 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:02.191167 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilder (0.01s) === RUN TestKubeProxyBuilderAMD64 I0118 08:55:02.194987 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:02.195265 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:02.195293 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:02.195324 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:02.195346 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:02.195379 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:02.195406 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:02.195422 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:02.195448 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:02.195465 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:02.197273 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderAMD64 (1.13s) === RUN TestKubeProxyBuilderARM64 I0118 08:55:03.326610 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:03.326794 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:03.326814 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:03.326843 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:03.326861 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:03.326883 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:03.326906 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:03.326920 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:03.326938 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:03.326950 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:03.328146 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderARM64 (1.13s) === RUN TestParseDefault --- PASS: TestParseDefault (0.00s) === RUN TestParse --- PASS: TestParse (0.00s) === RUN TestKubeSchedulerBuilder I0118 08:55:04.455296 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:04.455467 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:04.455486 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:04.455507 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:04.455521 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:04.455541 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:04.455558 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:04.455568 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:04.455607 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:04.455619 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:04.456613 43497 zones.go:93] ListHostedZonesPages { } W0118 08:55:04.458060 43497 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilder (0.00s) === RUN TestKubeSchedulerBuilderAMD64 I0118 08:55:04.459074 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:04.459164 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:04.459177 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:04.459192 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:04.459203 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:04.459218 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:04.459230 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:04.459239 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:04.459251 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:04.459259 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:04.460170 43497 zones.go:93] ListHostedZonesPages { } W0118 08:55:05.581078 43497 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderAMD64 (1.12s) === RUN TestKubeSchedulerBuilderARM64 I0118 08:55:05.583495 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:05.583771 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:05.583820 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:05.583860 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:05.583891 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:05.583929 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:05.583974 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:05.583996 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:05.584026 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:05.584048 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:05.586216 43497 zones.go:93] ListHostedZonesPages { } W0118 08:55:06.713935 43497 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderARM64 (1.13s) === RUN TestKubectlBuilder I0118 08:55:06.716303 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:06.716634 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:06.716672 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:06.716722 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:06.716757 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:06.716799 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:06.716834 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:06.716859 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:06.716891 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:06.716916 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:06.719104 43497 zones.go:93] ListHostedZonesPages { } I0118 08:55:06.721471 43497 assetstore.go:159] Resolved asset kubectl: to /path/to/kubectl/asset --- PASS: TestKubectlBuilder (0.01s) === RUN TestTaintsApplied --- PASS: TestTaintsApplied (0.00s) === RUN Test_RunKubeletBuilder I0118 08:55:06.724052 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:06.724271 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:06.724301 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:06.724332 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:06.724367 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:06.724406 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:06.724435 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:06.724458 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:06.724485 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:06.724505 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:06.726236 43497 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilder (0.01s) === RUN Test_RunKubeletBuilderWarmPool I0118 08:55:06.733802 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:06.734122 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:06.734160 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:06.734203 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:06.734249 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:06.734292 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:06.734342 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:06.734376 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:06.734411 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:06.734441 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:06.736234 43497 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilderWarmPool (0.01s) === RUN Test_BuildComponentConfigFile --- PASS: Test_BuildComponentConfigFile (0.00s) === RUN TestProtokubeBuilder I0118 08:55:06.741024 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:06.741284 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:06.741320 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:06.741364 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:06.741394 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:06.741440 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:06.741474 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:06.741503 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:06.741539 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:06.741561 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:06.743808 43497 zones.go:93] ListHostedZonesPages { } I0118 08:55:06.746314 43497 assetstore.go:108] Matching assets for "protokube$": I0118 08:55:06.746340 43497 assetstore.go:111] /opt/kops/bin/protokube I0118 08:55:06.746408 43497 assetstore.go:129] Found single matching asset for expr "protokube$": "protokube" I0118 08:55:06.746442 43497 assetstore.go:108] Matching assets for "channels$": I0118 08:55:06.746464 43497 assetstore.go:111] /opt/kops/bin/channels I0118 08:55:06.746482 43497 assetstore.go:129] Found single matching asset for expr "channels$": "channels" --- PASS: TestProtokubeBuilder (0.01s) === RUN TestSecretBuilder I0118 08:55:06.748294 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:06.748550 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:06.748587 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:06.748633 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:06.748665 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:06.748719 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:06.748751 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:06.748776 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:06.748817 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:06.748839 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:06.751027 43497 zones.go:93] ListHostedZonesPages { } --- PASS: TestSecretBuilder (0.01s) === RUN TestUpdateServiceBuilderAutomaticUpgrade I0118 08:55:06.754409 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:06.754663 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:06.754701 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:06.754744 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:06.754776 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:06.754833 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:06.754864 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:06.754890 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:06.754930 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:06.754951 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:06.757103 43497 zones.go:93] ListHostedZonesPages { } I0118 08:55:06.759509 43497 update_service.go:91] Detected OS {deb ubuntu focal 20.04}; installing unattended-upgrades package --- PASS: TestUpdateServiceBuilderAutomaticUpgrade (0.01s) === RUN TestUpdateServiceBuilderExternal I0118 08:55:06.760082 43497 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:06.760345 43497 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:06.760381 43497 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:06.760427 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:06.760459 43497 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:06.760514 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:06.760550 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:06.760580 43497 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:06.760618 43497 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:06.760640 43497 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:06.762779 43497 zones.go:93] ListHostedZonesPages { } I0118 08:55:06.765340 43497 update_service.go:86] UpdatePolicy requests automatic updates; skipping installation of package "unattended-upgrades" --- PASS: TestUpdateServiceBuilderExternal (0.01s) PASS ok k8s.io/kops/nodeup/pkg/model 9.318s === RUN TestWarmPoolSpec_IsEnabled === RUN TestWarmPoolSpec_IsEnabled/nil === RUN TestWarmPoolSpec_IsEnabled/empty === RUN TestWarmPoolSpec_IsEnabled/1 === RUN TestWarmPoolSpec_IsEnabled/0 --- PASS: TestWarmPoolSpec_IsEnabled (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/nil (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/empty (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/1 (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/0 (0.00s) === RUN TestWarmPoolSpec_ResolveDefaults === RUN TestWarmPoolSpec_ResolveDefaults/MinSize === RUN TestWarmPoolSpec_ResolveDefaults/MaxSize === RUN TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook --- PASS: TestWarmPoolSpec_ResolveDefaults (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MinSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MaxSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook (0.00s) === RUN Test_ParseInstanceGroupRole --- PASS: Test_ParseInstanceGroupRole (0.00s) === RUN TestParseConfigYAML === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{}" --- PASS: TestParseConfigYAML (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{}" (0.00s) === RUN Test_SemverOrdering --- PASS: Test_SemverOrdering (0.00s) PASS ok k8s.io/kops/pkg/apis/kops 0.025s === RUN TestRoundTripTypes --- PASS: TestRoundTripTypes (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/install 0.022s === RUN TestUseCiliumEtcd --- PASS: TestUseCiliumEtcd (0.00s) === RUN Test_FindSubnet --- PASS: Test_FindSubnet (0.00s) === RUN Test_FindZonesForInstanceGroup --- PASS: Test_FindZonesForInstanceGroup (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/model 0.017s === RUN TestGetNodeRole === RUN TestGetNodeRole/RoleNone === RUN TestGetNodeRole/RoleNewerLabel === RUN TestGetNodeRole/RoleOlderLabel --- PASS: TestGetNodeRole (0.00s) --- PASS: TestGetNodeRole/RoleNone (0.00s) --- PASS: TestGetNodeRole/RoleNewerLabel (0.00s) --- PASS: TestGetNodeRole/RoleOlderLabel (0.00s) === RUN Test_ParseKubernetesVersion === RUN Test_ParseKubernetesVersion/1.3.7 === RUN Test_ParseKubernetesVersion/v1.4.0-beta.8 === RUN Test_ParseKubernetesVersion/1.5.0 === RUN Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ === RUN Test_ParseKubernetesVersion/#00 E0118 08:54:57.464310 43501 versions.go:96] unable to parse Kubernetes version "" === RUN Test_ParseKubernetesVersion/abc E0118 08:54:57.464398 43501 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: Test_ParseKubernetesVersion (0.00s) --- PASS: Test_ParseKubernetesVersion/1.3.7 (0.00s) --- PASS: Test_ParseKubernetesVersion/v1.4.0-beta.8 (0.00s) --- PASS: Test_ParseKubernetesVersion/1.5.0 (0.00s) --- PASS: Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ (0.00s) --- PASS: Test_ParseKubernetesVersion/#00 (0.00s) --- PASS: Test_ParseKubernetesVersion/abc (0.00s) === RUN Test_IsKubernetesGTEWithPatch --- PASS: Test_IsKubernetesGTEWithPatch (0.00s) === RUN Test_IsKubernetesGTEWithoutPatch --- PASS: Test_IsKubernetesGTEWithoutPatch (0.00s) === RUN Test_IsKubernetesGTEWithPre --- PASS: Test_IsKubernetesGTEWithPre (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/util 0.007s === RUN TestAWSValidateExternalCloudConfig --- PASS: TestAWSValidateExternalCloudConfig (0.00s) === RUN TestValidateInstanceGroupSpec I0118 08:54:58.686404 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686500 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686538 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686562 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686584 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestValidateInstanceGroupSpec (0.00s) === RUN TestMixedInstancePolicies I0118 08:54:58.686771 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686799 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686815 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686841 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686865 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686883 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686904 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686923 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686942 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686968 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.686984 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.687004 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.687021 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.687036 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.687061 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.687087 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.687104 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.687120 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0118 08:54:58.687136 43758 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestMixedInstancePolicies (0.00s) === RUN TestInstanceMetadataOptions I0118 08:54:58.687280 43758 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } I0118 08:54:58.687340 43758 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } --- PASS: TestInstanceMetadataOptions (0.00s) === RUN TestLoadBalancerSubnets --- PASS: TestLoadBalancerSubnets (0.00s) === RUN TestAWSAuthentication --- PASS: TestAWSAuthentication (0.00s) === RUN TestAWSAdditionalRoutes === RUN TestAWSAdditionalRoutes/valid_pcx === RUN TestAWSAdditionalRoutes/valid_instance === RUN TestAWSAdditionalRoutes/valid_nat === RUN TestAWSAdditionalRoutes/valid_transit_gateway === RUN TestAWSAdditionalRoutes/valid_internet_gateway === RUN TestAWSAdditionalRoutes/valid_egress_only_internet_gateway === RUN TestAWSAdditionalRoutes/bad_cluster_cidr === RUN TestAWSAdditionalRoutes/bad_cidr === RUN TestAWSAdditionalRoutes/bad_target === RUN TestAWSAdditionalRoutes/target_more_specific === RUN TestAWSAdditionalRoutes/target_more_specific_additionalCIDR === RUN TestAWSAdditionalRoutes/duplicates_cidr === RUN TestAWSAdditionalRoutes/shared_subnet === RUN TestAWSAdditionalRoutes/not_a_private_subnet --- PASS: TestAWSAdditionalRoutes (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_pcx (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_instance (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_nat (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_transit_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_egress_only_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cluster_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_target (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific_additionalCIDR (0.00s) --- PASS: TestAWSAdditionalRoutes/duplicates_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/shared_subnet (0.00s) --- PASS: TestAWSAdditionalRoutes/not_a_private_subnet (0.00s) === RUN TestValidEtcdChanges --- PASS: TestValidEtcdChanges (0.00s) === RUN TestValidateInstanceProfile --- PASS: TestValidateInstanceProfile (0.00s) === RUN TestValidMasterInstanceGroup --- PASS: TestValidMasterInstanceGroup (0.00s) === RUN TestValidBootDevice --- PASS: TestValidBootDevice (0.00s) === RUN TestValidNodeLabels --- PASS: TestValidNodeLabels (0.00s) === RUN TestValidateIGCloudLabels --- PASS: TestValidateIGCloudLabels (0.00s) === RUN TestIGCloudLabelIsIGName --- PASS: TestIGCloudLabelIsIGName (0.00s) === RUN TestValidTaints --- PASS: TestValidTaints (0.00s) === RUN TestIGUpdatePolicy === RUN TestIGUpdatePolicy/missing === RUN TestIGUpdatePolicy/automatic === RUN TestIGUpdatePolicy/external === RUN TestIGUpdatePolicy/empty === RUN TestIGUpdatePolicy/unknown --- PASS: TestIGUpdatePolicy (0.00s) --- PASS: TestIGUpdatePolicy/missing (0.00s) --- PASS: TestIGUpdatePolicy/automatic (0.00s) --- PASS: TestIGUpdatePolicy/external (0.00s) --- PASS: TestIGUpdatePolicy/empty (0.00s) --- PASS: TestIGUpdatePolicy/unknown (0.00s) === RUN TestValidInstanceGroup --- PASS: TestValidInstanceGroup (0.00s) === RUN Test_Validate_DNS --- PASS: Test_Validate_DNS (0.00s) === RUN TestValidateCIDR --- PASS: TestValidateCIDR (0.00s) === RUN TestValidateSubnets --- PASS: TestValidateSubnets (0.00s) === RUN TestValidateKubeAPIServer --- PASS: TestValidateKubeAPIServer (0.00s) === RUN Test_Validate_DockerConfig_Storage --- PASS: Test_Validate_DockerConfig_Storage (0.00s) === RUN Test_Validate_Networking_Flannel --- PASS: Test_Validate_Networking_Flannel (0.00s) === RUN Test_Validate_AdditionalPolicies --- PASS: Test_Validate_AdditionalPolicies (0.00s) === RUN Test_Validate_Calico === RUN Test_Validate_Calico/empty_specs === RUN Test_Validate_Calico/positive_Typha_replica_count === RUN Test_Validate_Calico/negative_Typha_replica_count === RUN Test_Validate_Calico/with_etcd_version === RUN Test_Validate_Calico/IPv4_autodetection_method === RUN Test_Validate_Calico/IPv6_autodetection_method === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name === RUN Test_Validate_Calico/AWS_source/destination_checks_off === RUN Test_Validate_Calico/AWS_source/destination_checks_enabled === RUN Test_Validate_Calico/AWS_source/destination_checks_disabled === RUN Test_Validate_Calico/AWS_source/destination_checks_left_as_is === RUN Test_Validate_Calico/encapsulation_none_with_IPv4 === RUN Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 === RUN Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 === RUN Test_Validate_Calico/unknown_Calico_IPIP_mode === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPv6_without_encapsulation --- PASS: Test_Validate_Calico (0.00s) --- PASS: Test_Validate_Calico/empty_specs (0.00s) --- PASS: Test_Validate_Calico/positive_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/negative_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/with_etcd_version (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_off (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_enabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_disabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_left_as_is (0.00s) --- PASS: Test_Validate_Calico/encapsulation_none_with_IPv4 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/unknown_Calico_IPIP_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPv6_without_encapsulation (0.00s) === RUN Test_Validate_Cilium --- PASS: Test_Validate_Cilium (0.00s) === RUN Test_Validate_RollingUpdate --- PASS: Test_Validate_RollingUpdate (0.00s) === RUN Test_Validate_NodeLocalDNS --- PASS: Test_Validate_NodeLocalDNS (0.00s) === RUN Test_Validate_CloudConfiguration === RUN Test_Validate_CloudConfiguration/neither === RUN Test_Validate_CloudConfiguration/all_false === RUN Test_Validate_CloudConfiguration/all_true === RUN Test_Validate_CloudConfiguration/os_false === RUN Test_Validate_CloudConfiguration/os_true === RUN Test_Validate_CloudConfiguration/all_false,_os_false === RUN Test_Validate_CloudConfiguration/all_false,_os_true === RUN Test_Validate_CloudConfiguration/all_true,_os_false === RUN Test_Validate_CloudConfiguration/all_true,_os_true --- PASS: Test_Validate_CloudConfiguration (0.00s) --- PASS: Test_Validate_CloudConfiguration/neither (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_true (0.00s) === RUN TestValidateSAExternalPermissions === RUN TestValidateSAExternalPermissions/Duplicate_SA === RUN TestValidateSAExternalPermissions/Missing_permissions === RUN TestValidateSAExternalPermissions/Setting_both_arn_and_inline === RUN TestValidateSAExternalPermissions/Empty_SA_name === RUN TestValidateSAExternalPermissions/Empty_SA_namespace --- PASS: TestValidateSAExternalPermissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Duplicate_SA (0.00s) --- PASS: TestValidateSAExternalPermissions/Missing_permissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Setting_both_arn_and_inline (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_name (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_namespace (0.00s) === RUN Test_Validate_Nvidia_Cluster --- PASS: Test_Validate_Nvidia_Cluster (0.00s) === RUN Test_Validate_Nvidia_Ig --- PASS: Test_Validate_Nvidia_Ig (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/validation 0.062s === RUN TestManagedFieldsMigrator === RUN TestManagedFieldsMigrator/csa-migration === RUN TestManagedFieldsMigrator/merge-owners === RUN TestManagedFieldsMigrator/ssa-unchanged === RUN TestManagedFieldsMigrator/unknown-unchanged --- PASS: TestManagedFieldsMigrator (0.00s) --- PASS: TestManagedFieldsMigrator/csa-migration (0.00s) --- PASS: TestManagedFieldsMigrator/merge-owners (0.00s) --- PASS: TestManagedFieldsMigrator/ssa-unchanged (0.00s) --- PASS: TestManagedFieldsMigrator/unknown-unchanged (0.00s) PASS ok k8s.io/kops/pkg/applylib/applyset 0.011s === RUN TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub W0118 08:54:58.667903 43760 builder.go:232] failed to digest image "proxy.example.com/weaveworks/weave-kube": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub (0.01s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub W0118 08:54:58.668672 43760 builder.go:232] failed to digest image "proxy.example.com/debian": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL W0118 08:54:58.669519 43760 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL W0118 08:54:58.670444 43760 builder.go:232] failed to digest image "proxy.example.com/google_containers/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags W0118 08:54:58.671152 43760 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags (0.00s) === RUN TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges W0118 08:54:58.671730 43760 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host W0118 08:54:58.672329 43760 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges (0.00s) === RUN TestRemapEmptySection --- PASS: TestRemapEmptySection (0.00s) === RUN Test_BuildVFSPath E0118 08:54:58.672906 43760 copyfile.go:209] Unable to determine VFS path from supplied URL: https://foo/k8s-for-greeks-kops/kubernetes-release/release/v1.7.2/bin/linux/amd64/kubectl E0118 08:54:58.672915 43760 copyfile.go:210] S3, Google Cloud Storage, and File Paths are supported. E0118 08:54:58.672921 43760 copyfile.go:211] For S3, please make sure that the supplied file repository URL adhere to S3 naming conventions, https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region. E0118 08:54:58.672928 43760 copyfile.go:212] For GCS, please make sure that the supplied file repository URL adheres to https://storage.googleapis.com/ --- PASS: Test_BuildVFSPath (0.00s) PASS ok k8s.io/kops/pkg/assets 0.040s === RUN TestBackoff --- PASS: TestBackoff (0.00s) PASS ok k8s.io/kops/pkg/backoff 0.005s === RUN TestSSHCredentialStoreOnConfigBase --- PASS: TestSSHCredentialStoreOnConfigBase (0.00s) === RUN TestSSHCredentialStoreOnOwnCFS --- PASS: TestSSHCredentialStoreOnOwnCFS (0.00s) PASS ok k8s.io/kops/pkg/client/simple/vfsclientset 0.061s === RUN TestToAzureVMName === RUN TestToAzureVMName/test_case_0 === RUN TestToAzureVMName/test_case_1 --- PASS: TestToAzureVMName (0.00s) --- PASS: TestToAzureVMName/test_case_0 (0.00s) --- PASS: TestToAzureVMName/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/cloudinstances 0.021s === RUN TestSetClusterBadInput --- PASS: TestSetClusterBadInput (0.00s) === RUN TestSetClusterFields --- PASS: TestSetClusterFields (0.00s) === RUN TestSetCiliumFields --- PASS: TestSetCiliumFields (0.00s) === RUN TestSetInstanceGroupsBadInput --- PASS: TestSetInstanceGroupsBadInput (0.00s) === RUN TestSetInstanceGroupsFields --- PASS: TestSetInstanceGroupsFields (0.00s) === RUN TestUnsetClusterBadInput --- PASS: TestUnsetClusterBadInput (0.00s) === RUN TestUnsetClusterFields --- PASS: TestUnsetClusterFields (0.00s) === RUN TestUnsetCiliumFields --- PASS: TestUnsetCiliumFields (0.00s) === RUN TestUnsetInstanceGroupsBadInput --- PASS: TestUnsetInstanceGroupsBadInput (0.00s) === RUN TestUnsetInstanceGroupsFields --- PASS: TestUnsetInstanceGroupsFields (0.00s) PASS ok k8s.io/kops/pkg/commands 0.089s === RUN Test_cacheFilePath --- PASS: Test_cacheFilePath (0.00s) PASS ok k8s.io/kops/pkg/commands/helpers 0.093s === RUN TestGetStructVal --- PASS: TestGetStructVal (0.00s) === RUN TestWrongStructField --- PASS: TestWrongStructField (0.00s) PASS ok k8s.io/kops/pkg/configbuilder 0.022s === RUN Test_Diff_1 --- PASS: Test_Diff_1 (0.00s) === RUN Test_Diff_2 --- PASS: Test_Diff_2 (0.00s) === RUN Test_Diff_3 --- PASS: Test_Diff_3 (0.00s) === RUN Test_Diff_ChangedLine --- PASS: Test_Diff_ChangedLine (0.00s) === RUN Test_Diff_4 --- PASS: Test_Diff_4 (0.00s) PASS ok k8s.io/kops/pkg/diff 0.006s === RUN TestIsGossipHostname --- PASS: TestIsGossipHostname (0.00s) PASS ok k8s.io/kops/pkg/dns 0.004s === RUN TestHasExtraFields === RUN TestHasExtraFields/minimal === RUN TestHasExtraFields/extraFields === RUN TestHasExtraFields/spec2 === RUN TestHasExtraFields/isolateMasters === RUN TestHasExtraFields/instanceGroup --- PASS: TestHasExtraFields (0.01s) --- PASS: TestHasExtraFields/minimal (0.01s) --- PASS: TestHasExtraFields/extraFields (0.00s) --- PASS: TestHasExtraFields/spec2 (0.00s) --- PASS: TestHasExtraFields/isolateMasters (0.00s) --- PASS: TestHasExtraFields/instanceGroup (0.00s) PASS ok k8s.io/kops/pkg/edit 0.033s === RUN TestFlagToFalse I0118 08:54:58.654282 43957 featureflag_test.go:32] Created flag Unittest1 I0118 08:54:58.654325 43957 featureflag.go:164] FeatureFlag "UnitTest1"=false I0118 08:54:58.654330 43957 featureflag.go:164] FeatureFlag "UnitTest1"=true --- PASS: TestFlagToFalse (0.00s) === RUN TestSetenv I0118 08:54:58.654379 43957 featureflag.go:164] FeatureFlag "UnitTest2"=false --- PASS: TestSetenv (0.00s) === RUN TestGetPositive --- PASS: TestGetPositive (0.00s) === RUN TestGetNegative --- PASS: TestGetNegative (0.00s) PASS ok k8s.io/kops/pkg/featureflag 0.003s === RUN TestBuildKCMFlags --- PASS: TestBuildKCMFlags (0.00s) === RUN TestKubeletConfigSpec --- PASS: TestKubeletConfigSpec (0.00s) === RUN TestBuildAPIServerFlags --- PASS: TestBuildAPIServerFlags (0.00s) PASS ok k8s.io/kops/pkg/flagbuilder 0.030s === RUN TestRenderInstanceGroupZones W0118 08:54:58.740355 44225 instancegroup.go:42] error fetching zones for instancegroup: cannot find subnet "badsubnet" (declared in instance group "", not found in cluster) --- PASS: TestRenderInstanceGroupZones (0.00s) === RUN TestRenderInstanceGroupSubnets --- PASS: TestRenderInstanceGroupSubnets (0.00s) PASS ok k8s.io/kops/pkg/formatter 0.021s === RUN TestWarmPoolOnlyRoll I0118 08:55:10.816284 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.816379 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.816398 45431 instancegroups.go:136] deleting warm pool instance "node-1" --- PASS: TestWarmPoolOnlyRoll (0.00s) === RUN TestRollingUpdateDisabledSurgeOS rollingupdate_os_test.go:96: Failing in new release PR when build is not yet published --- SKIP: TestRollingUpdateDisabledSurgeOS (0.00s) === RUN TestRollingUpdateAllNeedUpdate I0118 08:55:10.816780 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:10.816802 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.818172 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.818204 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.823400 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.823454 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.823470 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.823481 45431 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0118 08:55:10.824823 45431 instancegroups.go:431] Draining the node: "master-1a.local". I0118 08:55:10.825313 45431 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0118 08:55:10.825384 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:10.825407 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.826514 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.826536 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.832063 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.832117 45431 instancegroups.go:431] Draining the node: "master-1b.local". I0118 08:55:10.832710 45431 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0118 08:55:10.832766 45431 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0118 08:55:10.832788 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.833890 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.833908 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.839203 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.839240 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.839253 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.839265 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:10.839937 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:10.840463 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:10.840492 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.841616 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.841653 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.846873 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.846932 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:10.847376 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:10.847394 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.848522 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.848557 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.853751 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.853809 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:10.854533 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:10.854563 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.855872 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.855894 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.861049 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.861073 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.861082 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.861089 45431 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0118 08:55:10.861486 45431 instancegroups.go:431] Draining the node: "node-2a.local". I0118 08:55:10.861768 45431 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0118 08:55:10.861784 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.862886 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.862903 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.868089 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.868145 45431 instancegroups.go:431] Draining the node: "node-2b.local". I0118 08:55:10.868764 45431 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0118 08:55:10.868788 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.869895 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.869915 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.875095 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.875137 45431 instancegroups.go:431] Draining the node: "node-2c.local". I0118 08:55:10.875538 45431 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0118 08:55:10.875554 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.876683 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.876699 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.882057 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.882090 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdate (0.07s) === RUN TestRollingUpdateAllNeedUpdateCloudonly I0118 08:55:10.882338 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:10.882352 45431 instancegroups.go:469] waiting for 1ms after terminating instance W0118 08:55:10.883498 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.883537 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.883558 45431 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0118 08:55:10.883567 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:10.883581 45431 instancegroups.go:469] waiting for 1ms after terminating instance W0118 08:55:10.884671 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.884696 45431 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0118 08:55:10.884706 45431 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0118 08:55:10.884722 45431 instancegroups.go:469] waiting for 1ms after terminating instance W0118 08:55:10.885824 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.885848 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.885879 45431 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0118 08:55:10.885890 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:10.885906 45431 instancegroups.go:469] waiting for 1ms after terminating instance W0118 08:55:10.886997 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.887023 45431 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0118 08:55:10.887034 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:10.887051 45431 instancegroups.go:469] waiting for 1ms after terminating instance W0118 08:55:10.888127 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.888143 45431 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0118 08:55:10.888150 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:10.888163 45431 instancegroups.go:469] waiting for 1ms after terminating instance W0118 08:55:10.889259 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.889270 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.889293 45431 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0118 08:55:10.889300 45431 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0118 08:55:10.889314 45431 instancegroups.go:469] waiting for 1ms after terminating instance W0118 08:55:10.890404 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.890428 45431 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0118 08:55:10.890435 45431 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0118 08:55:10.890449 45431 instancegroups.go:469] waiting for 1ms after terminating instance W0118 08:55:10.891540 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0118 08:55:10.891560 45431 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0118 08:55:10.891566 45431 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0118 08:55:10.891575 45431 instancegroups.go:469] waiting for 1ms after terminating instance W0118 08:55:10.892665 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0118 08:55:10.892680 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateCloudonly (0.01s) === RUN TestRollingUpdateAllNeedUpdateNoFailOnValidate I0118 08:55:10.892927 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:10.892942 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.894048 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.894072 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.894085 45431 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.894112 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.894128 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.894137 45431 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.894145 45431 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0118 08:55:10.894685 45431 instancegroups.go:431] Draining the node: "master-1a.local". I0118 08:55:10.895149 45431 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0118 08:55:10.895200 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:10.895215 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.896679 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.896703 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.896717 45431 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.896739 45431 instancegroups.go:431] Draining the node: "master-1b.local". I0118 08:55:10.897123 45431 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0118 08:55:10.897157 45431 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0118 08:55:10.897168 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.898262 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.898280 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.898290 45431 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.898304 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.898314 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.898322 45431 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.898333 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:10.898902 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:10.899343 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:10.899362 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.900459 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.900477 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.900487 45431 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.900506 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:10.900874 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:10.900887 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.901983 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.902002 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.902016 45431 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.902039 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:10.902492 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:10.902511 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.903612 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.903630 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.903642 45431 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.903652 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.903660 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.903667 45431 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.903675 45431 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0118 08:55:10.904264 45431 instancegroups.go:431] Draining the node: "node-2a.local". I0118 08:55:10.904721 45431 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0118 08:55:10.904740 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.905836 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.905853 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.905865 45431 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.905883 45431 instancegroups.go:431] Draining the node: "node-2b.local". I0118 08:55:10.906258 45431 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0118 08:55:10.906272 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.907366 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.907386 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.907398 45431 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.907418 45431 instancegroups.go:431] Draining the node: "node-2c.local". I0118 08:55:10.907886 45431 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0118 08:55:10.907904 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.909012 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.909025 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0118 08:55:10.909032 45431 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0118 08:55:10.909042 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateNoFailOnValidate (0.02s) === RUN TestRollingUpdateNoneNeedUpdate I0118 08:55:10.909193 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdate (0.00s) === RUN TestRollingUpdateNoneNeedUpdateWithForce I0118 08:55:10.909305 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:10.909316 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.910437 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.910450 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.915645 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.915714 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.915731 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.915743 45431 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0118 08:55:10.916149 45431 instancegroups.go:431] Draining the node: "master-1a.local". I0118 08:55:10.916452 45431 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0118 08:55:10.916492 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:10.916506 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.917597 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.917610 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.922795 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.922832 45431 instancegroups.go:431] Draining the node: "master-1b.local". I0118 08:55:10.923247 45431 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0118 08:55:10.923286 45431 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0118 08:55:10.923300 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.924405 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.924423 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.929627 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.929665 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.929679 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.929699 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:10.930410 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:10.930961 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:10.930986 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.932101 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.932115 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.937308 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.937347 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:10.937898 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:10.937922 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.939035 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.939048 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.944202 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.944246 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:10.944693 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:10.944711 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.945815 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.945827 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.951000 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.951024 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.951033 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.951040 45431 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0118 08:55:10.952094 45431 instancegroups.go:431] Draining the node: "node-2a.local". I0118 08:55:10.952366 45431 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0118 08:55:10.952383 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.953503 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.953522 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.958646 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.958693 45431 instancegroups.go:431] Draining the node: "node-2b.local". I0118 08:55:10.959116 45431 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0118 08:55:10.959139 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.960235 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.960247 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.965416 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.965461 45431 instancegroups.go:431] Draining the node: "node-2c.local". I0118 08:55:10.966098 45431 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0118 08:55:10.966123 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.967242 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.967263 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.972432 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.972459 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdateWithForce (0.06s) === RUN TestRollingUpdateEmptyGroup I0118 08:55:10.972605 45431 rollingupdate.go:111] Cloud Instance Group length is zero. Not doing a rolling-update. --- PASS: TestRollingUpdateEmptyGroup (0.00s) === RUN TestRollingUpdateUnknownRole --- PASS: TestRollingUpdateUnknownRole (0.00s) === RUN TestRollingUpdateAllNeedUpdateFailsValidation I0118 08:55:10.972871 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:10.972888 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.973991 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.974010 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0118 08:55:10.974019 45431 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateFailsValidation (0.00s) === RUN TestRollingUpdateAllNeedUpdateErrorsValidation I0118 08:55:10.974784 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:10.974807 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.976126 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.976141 45431 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0118 08:55:10.976151 45431 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateFailsValidation I0118 08:55:10.976268 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.976278 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0118 08:55:10.976284 45431 instancegroups.go:509] Cluster did not validate within 0s E0118 08:55:10.976289 45431 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateFailsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateErrorsValidation I0118 08:55:10.976371 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.976381 45431 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0118 08:55:10.976387 45431 instancegroups.go:509] Cluster did not validate within 0s E0118 08:55:10.976393 45431 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateClusterFailsValidationAfterOneMaster I0118 08:55:10.976476 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:10.976487 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.977586 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.977604 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.982716 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.982749 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.982758 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.982764 45431 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0118 08:55:10.983186 45431 instancegroups.go:431] Draining the node: "master-1a.local". I0118 08:55:10.983452 45431 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0118 08:55:10.983492 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:10.983505 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.984592 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.984609 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0118 08:55:10.984618 45431 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterFailsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneMaster I0118 08:55:10.984776 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:10.984790 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.985884 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.985902 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:10.991075 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.991126 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.991144 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.991155 45431 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0118 08:55:10.991734 45431 instancegroups.go:431] Draining the node: "master-1a.local". I0118 08:55:10.992187 45431 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0118 08:55:10.992240 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:10.992259 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.993350 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.993365 45431 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0118 08:55:10.993374 45431 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateNonRelatedInstanceGroupFailure I0118 08:55:10.993539 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.993549 45431 instancegroups.go:540] Cluster validated. I0118 08:55:10.993553 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:10.993903 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:10.994155 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:10.994168 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:10.995250 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:10.995261 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.000428 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.000455 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:11.000824 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:11.000839 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.001938 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.001954 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.007121 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.007160 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:11.007695 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:11.007715 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.008816 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.008830 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.014832 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.014861 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNonRelatedInstanceGroupFailure (0.02s) === RUN TestRollingUpdateRelatedInstanceGroupFailure I0118 08:55:11.015060 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.015072 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0118 08:55:11.015081 45431 instancegroups.go:509] Cluster did not validate within 0s E0118 08:55:11.015088 45431 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateRelatedInstanceGroupFailure (0.00s) === RUN TestRollingUpdateMasterGroupFailure I0118 08:55:11.015188 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.015197 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0118 08:55:11.015203 45431 instancegroups.go:509] Cluster did not validate within 0s E0118 08:55:11.015208 45431 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateMasterGroupFailure (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupNil I0118 08:55:11.015301 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.015309 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0118 08:55:11.015315 45431 instancegroups.go:509] Cluster did not validate within 0s E0118 08:55:11.015320 45431 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupNil (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupExitableError I0118 08:55:11.015420 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.015428 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.015433 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:11.015864 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:11.016158 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:11.016174 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.017379 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.017391 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.022555 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.022573 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:11.022876 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:11.022890 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.023985 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.023997 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.029161 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.029186 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:11.029596 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:11.029611 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.030737 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.030749 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.035949 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.035970 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.035981 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0118 08:55:11.035992 45431 instancegroups.go:509] Cluster did not validate within 0s E0118 08:55:11.036000 45431 rollingupdate.go:218] failed to roll InstanceGroup "node-2": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupExitableError (0.02s) === RUN TestRollingUpdateClusterFailsValidationAfterOneNode I0118 08:55:11.036183 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.036194 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.036199 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:11.036672 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:11.036968 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:11.036983 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.038114 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.038129 45431 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0118 08:55:11.038136 45431 instancegroups.go:509] Cluster did not validate within 0s E0118 08:55:11.038142 45431 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterFailsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneNode I0118 08:55:11.038240 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.038250 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.038254 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:11.038608 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:11.038874 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:11.038888 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.040002 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.040021 45431 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0118 08:55:11.040031 45431 instancegroups.go:509] Cluster did not validate within 0s E0118 08:55:11.040037 45431 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateFlappingValidation I0118 08:55:11.040152 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:11.040163 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.041247 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.041262 45431 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0118 08:55:11.042367 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.047540 45431 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0118 08:55:11.048647 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.053838 45431 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0118 08:55:11.054945 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.060132 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.060172 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.060186 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.060194 45431 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0118 08:55:11.060561 45431 instancegroups.go:431] Draining the node: "master-1a.local". I0118 08:55:11.060840 45431 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0118 08:55:11.060879 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:11.060893 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.062026 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.062041 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.067130 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.067166 45431 instancegroups.go:431] Draining the node: "master-1b.local". I0118 08:55:11.067765 45431 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0118 08:55:11.067809 45431 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0118 08:55:11.067828 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.068957 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.068982 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.074146 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.074169 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.074187 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.074196 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:11.074829 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:11.075331 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:11.075352 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.076501 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.076530 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.081735 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.081781 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:11.082171 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:11.082187 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.083274 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.083294 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.088495 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.088550 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:11.089206 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:11.089229 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.090368 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.090392 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.095605 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.095627 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.095639 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.095648 45431 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0118 08:55:11.096095 45431 instancegroups.go:431] Draining the node: "node-2a.local". I0118 08:55:11.096437 45431 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0118 08:55:11.096454 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.097544 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.097562 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.102765 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.102792 45431 instancegroups.go:431] Draining the node: "node-2b.local". I0118 08:55:11.103181 45431 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0118 08:55:11.103198 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.104280 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.104298 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.109486 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.109516 45431 instancegroups.go:431] Draining the node: "node-2c.local". I0118 08:55:11.109917 45431 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0118 08:55:11.109934 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.111835 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.111875 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.117066 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.117093 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateFlappingValidation (0.08s) === RUN TestRollingUpdateValidatesAfterBastion I0118 08:55:11.117283 45431 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0118 08:55:11.117298 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.118442 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.118471 45431 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0118 08:55:11.119561 45431 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0118 08:55:11.120644 45431 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0118 08:55:11.121741 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.126923 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.126964 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.126975 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.126982 45431 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0118 08:55:11.127353 45431 instancegroups.go:431] Draining the node: "master-1a.local". I0118 08:55:11.127628 45431 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0118 08:55:11.127673 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:11.127692 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.128842 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.128868 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.134065 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.134091 45431 instancegroups.go:431] Draining the node: "master-1b.local". I0118 08:55:11.134416 45431 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0118 08:55:11.134453 45431 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0118 08:55:11.134466 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.135605 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.135624 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.140811 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.140838 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.140847 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.140854 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:11.141300 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:11.141607 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:11.141626 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.142750 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.142771 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.147977 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.148030 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:11.148613 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:11.148637 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.149736 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.149768 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.154933 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.154980 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:11.155542 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:11.155566 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.156678 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.156709 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.161903 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.161938 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.161951 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.161961 45431 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0118 08:55:11.162595 45431 instancegroups.go:431] Draining the node: "node-2a.local". I0118 08:55:11.163015 45431 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0118 08:55:11.163058 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.164192 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.164217 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.169423 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.169458 45431 instancegroups.go:431] Draining the node: "node-2b.local". I0118 08:55:11.169844 45431 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0118 08:55:11.169861 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.170955 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.170978 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.176154 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.176202 45431 instancegroups.go:431] Draining the node: "node-2c.local". I0118 08:55:11.176821 45431 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0118 08:55:11.176844 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.177994 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.178017 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.183185 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.183207 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateValidatesAfterBastion (0.07s) === RUN TestAddAnnotatedNodesToNeedsUpdate --- PASS: TestAddAnnotatedNodesToNeedsUpdate (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateCloudonly --- PASS: TestAddAnnotatedNodesToNeedsUpdateCloudonly (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateNodesMissing --- PASS: TestAddAnnotatedNodesToNeedsUpdateNodesMissing (0.00s) === RUN TestRollingUpdateTaintAllButOneNeedUpdate I0118 08:55:11.183496 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.183507 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.183512 45431 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0118 08:55:11.183813 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:11.184078 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:11.184091 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.185210 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.185227 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.190418 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.190473 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:11.191105 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:11.191130 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.192242 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.192261 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.197452 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.197480 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateTaintAllButOneNeedUpdate (0.01s) === RUN TestRollingUpdateMaxSurgeIgnoredForMaster I0118 08:55:11.197698 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.197716 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.197725 45431 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0118 08:55:11.198221 45431 instancegroups.go:431] Draining the node: "master-1a.local". I0118 08:55:11.198656 45431 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0118 08:55:11.198710 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:11.198728 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.199831 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.199848 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.205032 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.205076 45431 instancegroups.go:431] Draining the node: "master-1b.local". I0118 08:55:11.205619 45431 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0118 08:55:11.205662 45431 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0118 08:55:11.205680 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.206780 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.206796 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.211977 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.212007 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeIgnoredForMaster (0.01s) === RUN TestRollingUpdateDisabled I0118 08:55:11.212241 45431 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled W0118 08:55:11.212267 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0118 08:55:11.212278 45431 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled W0118 08:55:11.212285 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0118 08:55:11.212294 45431 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled W0118 08:55:11.212299 45431 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0118 08:55:11.212308 45431 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0118 08:55:11.212316 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabled (0.00s) === RUN TestRollingUpdateDisabledSurge I0118 08:55:11.212459 45431 instancegroups.go:607] Detaching instance "bastion-1a", in group "bastion-1". I0118 08:55:11.212488 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:11.213583 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.213597 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.218785 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.218818 45431 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled I0118 08:55:11.218859 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.218874 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.218884 45431 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0118 08:55:11.219382 45431 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled I0118 08:55:11.219396 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.219407 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.219415 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:11.219916 45431 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0118 08:55:11.219953 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:11.221062 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.221085 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.226263 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.226289 45431 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled I0118 08:55:11.226300 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.226311 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.226319 45431 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0118 08:55:11.226874 45431 instancegroups.go:605] Detaching instance "node-2c", node "node-2c.local", in group "node-2". I0118 08:55:11.226909 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:11.228013 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.228034 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:11.233217 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.233245 45431 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0118 08:55:11.233259 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabledSurge (0.02s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdate I0118 08:55:11.233496 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.233518 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.233527 45431 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0118 08:55:11.234749 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:11.235177 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:11.235202 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.236309 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.236344 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.236381 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:11.236409 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:11.236734 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:11.236941 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:11.236955 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.238046 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.238078 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.338412 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.338470 45431 instancegroups.go:431] Draining the node: "node-1e.local". I0118 08:55:11.338472 45431 instancegroups.go:431] Draining the node: "node-1d.local". I0118 08:55:11.338905 45431 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0118 08:55:11.339111 45431 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0118 08:55:11.339128 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.340226 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.340250 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.340269 45431 instancegroups.go:431] Draining the node: "node-1f.local". I0118 08:55:11.340604 45431 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0118 08:55:11.340621 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.341743 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.341764 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.442063 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.442115 45431 instancegroups.go:431] Draining the node: "node-1g.local". I0118 08:55:11.442676 45431 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0118 08:55:11.442707 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.443852 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.443870 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.443879 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllButOneNeedUpdate I0118 08:55:11.443999 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.444009 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.444014 45431 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0118 08:55:11.444618 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:11.444645 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:11.445080 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:11.445177 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:11.445193 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.446297 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.446345 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.546769 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.546829 45431 instancegroups.go:431] Draining the node: "node-1d.local". I0118 08:55:11.546861 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:11.547240 45431 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0118 08:55:11.547463 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:11.547481 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.548615 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.548633 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.548647 45431 instancegroups.go:431] Draining the node: "node-1e.local". I0118 08:55:11.548936 45431 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0118 08:55:11.548952 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.550089 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.550111 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.650554 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.650618 45431 instancegroups.go:431] Draining the node: "node-1f.local". I0118 08:55:11.651369 45431 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0118 08:55:11.651415 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.652559 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.652578 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.652587 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdateMaster I0118 08:55:11.652759 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.652782 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.652793 45431 instancegroups.go:342] Tainting 7 nodes in "master-1" instancegroup. I0118 08:55:11.653699 45431 instancegroups.go:431] Draining the node: "master-1a.local". I0118 08:55:11.653928 45431 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0118 08:55:11.653955 45431 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0118 08:55:11.653969 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.655160 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.655193 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.655225 45431 instancegroups.go:431] Draining the node: "master-1c.local". I0118 08:55:11.655295 45431 instancegroups.go:431] Draining the node: "master-1b.local". I0118 08:55:11.656184 45431 instancegroups.go:691] skipping deregistration of instance "master-1c", as part of instancegroup with role "ControlPlane" I0118 08:55:11.656241 45431 instancegroups.go:628] Stopping instance "master-1c", node "master-1c.local", in group "master-1" (this may take a while). I0118 08:55:11.656415 45431 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0118 08:55:11.656473 45431 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0118 08:55:11.656509 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.657624 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.657647 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.758308 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.758365 45431 instancegroups.go:431] Draining the node: "master-1e.local". I0118 08:55:11.758373 45431 instancegroups.go:431] Draining the node: "master-1d.local". I0118 08:55:11.759141 45431 instancegroups.go:691] skipping deregistration of instance "master-1d", as part of instancegroup with role "ControlPlane" I0118 08:55:11.759197 45431 instancegroups.go:628] Stopping instance "master-1d", node "master-1d.local", in group "master-1" (this may take a while). I0118 08:55:11.759320 45431 instancegroups.go:691] skipping deregistration of instance "master-1e", as part of instancegroup with role "ControlPlane" I0118 08:55:11.759355 45431 instancegroups.go:628] Stopping instance "master-1e", node "master-1e.local", in group "master-1" (this may take a while). I0118 08:55:11.759389 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.760500 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.760530 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.760550 45431 instancegroups.go:431] Draining the node: "master-1f.local". I0118 08:55:11.760937 45431 instancegroups.go:691] skipping deregistration of instance "master-1f", as part of instancegroup with role "ControlPlane" I0118 08:55:11.760977 45431 instancegroups.go:628] Stopping instance "master-1f", node "master-1f.local", in group "master-1" (this may take a while). I0118 08:55:11.760994 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.762098 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.762146 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.862509 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.862555 45431 instancegroups.go:431] Draining the node: "master-1g.local". I0118 08:55:11.862964 45431 instancegroups.go:691] skipping deregistration of instance "master-1g", as part of instancegroup with role "ControlPlane" I0118 08:55:11.862999 45431 instancegroups.go:628] Stopping instance "master-1g", node "master-1g.local", in group "master-1" (this may take a while). I0118 08:55:11.863035 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.864148 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.864171 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.864179 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdateMaster (0.21s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdate I0118 08:55:11.864310 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.864323 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.864328 45431 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0118 08:55:11.864973 45431 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0118 08:55:11.865000 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:11.866128 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.866143 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.866149 45431 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0118 08:55:11.866170 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:11.867273 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.867288 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.867300 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:11.867309 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:11.867617 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:11.867866 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:11.867882 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.869024 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.869049 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.969445 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.969487 45431 instancegroups.go:431] Draining the node: "node-1d.local". I0118 08:55:11.969495 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:11.969932 45431 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0118 08:55:11.970152 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:11.970169 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.971306 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.971324 45431 instancegroups.go:540] Cluster validated. I0118 08:55:11.971336 45431 instancegroups.go:431] Draining the node: "node-1e.local". I0118 08:55:11.971654 45431 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0118 08:55:11.971672 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:11.972805 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:11.972826 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.073200 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.073238 45431 instancegroups.go:431] Draining the node: "node-1f.local". I0118 08:55:12.073655 45431 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0118 08:55:12.073681 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.074814 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.074831 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.074840 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeAllButOneNeedUpdate I0118 08:55:12.074972 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.074991 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.074997 45431 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0118 08:55:12.077039 45431 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0118 08:55:12.077063 45431 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0118 08:55:12.077078 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:12.078185 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.078214 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.078246 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:12.078254 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:12.078542 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:12.078731 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:12.078746 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.079865 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.079911 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.180107 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.180174 45431 instancegroups.go:431] Draining the node: "node-1d.local". I0118 08:55:12.180182 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:12.180599 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:12.181154 45431 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0118 08:55:12.181174 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.182339 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.182360 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.182377 45431 instancegroups.go:431] Draining the node: "node-1e.local". I0118 08:55:12.182736 45431 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0118 08:55:12.182766 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.183900 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.183925 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.284907 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.284961 45431 instancegroups.go:431] Draining the node: "node-1f.local". I0118 08:55:12.285454 45431 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0118 08:55:12.285491 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.286607 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.286625 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.286635 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeGreaterThanNeedUpdate I0118 08:55:12.286752 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.286761 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.286766 45431 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0118 08:55:12.287005 45431 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0118 08:55:12.287017 45431 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". I0118 08:55:12.287030 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:12.288163 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.288174 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:12.293339 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.293361 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:12.293382 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:12.293763 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:12.293791 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.294215 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:12.294256 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.294979 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.295004 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:12.300276 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.300295 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeGreaterThanNeedUpdate (0.01s) === RUN TestRollingUpdateDetachFails I0118 08:55:12.300485 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.300505 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.300516 45431 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0118 08:55:12.301011 45431 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". E0118 08:55:12.301053 45431 instancegroups.go:191] Failed to detach instance "node-1b": error detaching instance "node-1b", node "node-1b.local": error detaching instance "node-1b": testing error I0118 08:55:12.301064 45431 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". E0118 08:55:12.301084 45431 instancegroups.go:191] Failed to detach instance "node-1a": error detaching instance "node-1a", node "node-1a.local": error detaching instance "node-1a": testing error I0118 08:55:12.301108 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:12.302286 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.302310 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:12.307515 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.307547 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:12.307557 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:12.307957 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:12.307991 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.308245 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:12.308263 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.309131 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.309141 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:12.314421 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.314436 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDetachFails (0.01s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached I0118 08:55:12.314560 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.314571 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.314576 45431 instancegroups.go:342] Tainting 4 nodes in "node-1" instancegroup. I0118 08:55:12.315528 45431 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0118 08:55:12.315582 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:12.316719 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.316734 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.316739 45431 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0118 08:55:12.316758 45431 instancegroups.go:203] waiting for 1ms after detaching instance I0118 08:55:12.317868 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.317883 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.317897 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:12.317960 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:12.317995 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:12.318392 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:12.318430 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.318717 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:12.318745 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.318846 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:12.318863 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.319590 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.420308 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.420363 45431 instancegroups.go:431] Draining the node: "node-1d.local". I0118 08:55:12.420848 45431 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0118 08:55:12.420883 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.422053 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.422094 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.422106 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached (0.11s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached I0118 08:55:12.422274 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.422289 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.422296 45431 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0118 08:55:12.423284 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:12.423615 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:12.423635 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.424780 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.424800 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.424814 45431 instancegroups.go:431] Draining the node: "node-1e.local". I0118 08:55:12.424890 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:12.425277 45431 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0118 08:55:12.425389 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:12.425407 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.426526 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.426553 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.527214 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.527262 45431 instancegroups.go:431] Draining the node: "node-1g.local". I0118 08:55:12.527333 45431 instancegroups.go:431] Draining the node: "node-1f.local". I0118 08:55:12.528296 45431 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0118 08:55:12.528511 45431 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0118 08:55:12.528556 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.529785 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.529821 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.529850 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:12.530495 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:12.530532 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.531717 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.531786 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.632568 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.632625 45431 instancegroups.go:431] Draining the node: "node-1d.local". I0118 08:55:12.633115 45431 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0118 08:55:12.633143 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.634272 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.634298 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.634309 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached (0.21s) === RUN TestRollingUpdateOnlyWarmPoolNodes I0118 08:55:12.634467 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.634485 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.634492 45431 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0118 08:55:12.634499 45431 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0118 08:55:12.634504 45431 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0118 08:55:12.634516 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateOnlyWarmPoolNodes (0.00s) === RUN TestRollingWarmPoolBeforeJoinedNodes I0118 08:55:12.634580 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.634589 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.634595 45431 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0118 08:55:12.634994 45431 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0118 08:55:12.635004 45431 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0118 08:55:12.635009 45431 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0118 08:55:12.635026 45431 instancegroups.go:431] Draining the node: "node-1a.local". I0118 08:55:12.635359 45431 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0118 08:55:12.635373 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.636484 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.636497 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:12.641709 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.641736 45431 instancegroups.go:431] Draining the node: "node-1b.local". I0118 08:55:12.642107 45431 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0118 08:55:12.642122 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.643547 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.643557 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:12.648709 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.648733 45431 instancegroups.go:431] Draining the node: "node-1c.local". I0118 08:55:12.649277 45431 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0118 08:55:12.649301 45431 instancegroups.go:469] waiting for 1ms after terminating instance I0118 08:55:12.650448 45431 instancegroups.go:504] Validating the cluster. I0118 08:55:12.650462 45431 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0118 08:55:12.655611 45431 instancegroups.go:540] Cluster validated. I0118 08:55:12.655633 45431 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingWarmPoolBeforeJoinedNodes (0.02s) === RUN TestSettings === RUN TestSettings/DrainAndTerminate === RUN TestSettings/MaxUnavailable === RUN TestSettings/MaxSurge --- PASS: TestSettings (0.00s) --- PASS: TestSettings/DrainAndTerminate (0.00s) --- PASS: TestSettings/MaxUnavailable (0.00s) --- PASS: TestSettings/MaxSurge (0.00s) === RUN TestMaxUnavailable === RUN TestMaxUnavailable/0_1 === RUN TestMaxUnavailable/0%_1 === RUN TestMaxUnavailable/39%_10 === RUN TestMaxUnavailable/100%_10 --- PASS: TestMaxUnavailable (0.00s) --- PASS: TestMaxUnavailable/0_1 (0.00s) --- PASS: TestMaxUnavailable/0%_1 (0.00s) --- PASS: TestMaxUnavailable/39%_10 (0.00s) --- PASS: TestMaxUnavailable/100%_10 (0.00s) === RUN TestMaxSurge === RUN TestMaxSurge/0_1 === RUN TestMaxSurge/0%_1 === RUN TestMaxSurge/31%_10 === RUN TestMaxSurge/100%_10 --- PASS: TestMaxSurge (0.00s) --- PASS: TestMaxSurge/0_1 (0.00s) --- PASS: TestMaxSurge/0%_1 (0.00s) --- PASS: TestMaxSurge/31%_10 (0.00s) --- PASS: TestMaxSurge/100%_10 (0.00s) === RUN TestAWSDefault --- PASS: TestAWSDefault (0.00s) PASS ok k8s.io/kops/pkg/instancegroups 1.918s === RUN TestWriteToken === RUN TestWriteToken/WriteJson === RUN TestWriteToken/WriteJsonWithIndent --- PASS: TestWriteToken (0.00s) --- PASS: TestWriteToken/WriteJson (0.00s) --- PASS: TestWriteToken/WriteJsonWithIndent (0.00s) PASS ok k8s.io/kops/pkg/jsonutils 0.005s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.00s) PASS ok k8s.io/kops/pkg/k8scodecs 0.010s === RUN TestParse E0118 08:55:10.753762 45434 versions.go:96] unable to parse Kubernetes version "" E0118 08:55:10.753843 45434 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: TestParse (0.00s) === RUN TestIsGTE === RUN TestIsGTE/KV_greater_than_Version === RUN TestIsGTE/KV_greater_than_Version#01 === RUN TestIsGTE/KV_equal_Version === RUN TestIsGTE/KV_equal_Version#01 === RUN TestIsGTE/Version_greater_than_KV === RUN TestIsGTE/Version_greater_than_KV#01 --- PASS: TestIsGTE (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version#01 (0.00s) --- PASS: TestIsGTE/KV_equal_Version (0.00s) --- PASS: TestIsGTE/KV_equal_Version#01 (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV#01 (0.00s) PASS ok k8s.io/kops/pkg/k8sversion 0.008s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.01s) === RUN TestToVersionedJSON --- PASS: TestToVersionedJSON (0.00s) === RUN TestRewriteAPIGroup --- PASS: TestRewriteAPIGroup (0.00s) PASS ok k8s.io/kops/pkg/kopscodecs 0.037s === RUN TestBuildKubecfg === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster === RUN TestBuildKubecfg/Public_DNS_with_kops_auth_plugin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option --- PASS: TestBuildKubecfg (0.11s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster (0.00s) --- PASS: TestBuildKubecfg/Public_DNS_with_kops_auth_plugin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option (0.00s) PASS ok k8s.io/kops/pkg/kubeconfig 0.176s === RUN Test_ProxyFunc --- PASS: Test_ProxyFunc (0.00s) === RUN TestBootstrapUserData --- PASS: TestBootstrapUserData (0.01s) === RUN TestValidateAWSVolumeAllow50ratio --- PASS: TestValidateAWSVolumeAllow50ratio (0.00s) PASS ok k8s.io/kops/pkg/model 0.076s === RUN TestRootVolumeOptimizationFlag --- PASS: TestRootVolumeOptimizationFlag (0.00s) === RUN TestAPIServerAdditionalSecurityGroupsWithNLB === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Node --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Node (0.00s) === RUN TestJoinSuffixes --- PASS: TestJoinSuffixes (0.00s) === RUN TestIAMServiceEC2 --- PASS: TestIAMServiceEC2 (0.00s) === RUN Test_formatAWSIAMStatement === RUN Test_formatAWSIAMStatement/namespace_and_name_without_wildcard === RUN Test_formatAWSIAMStatement/name_contains_wildcard === RUN Test_formatAWSIAMStatement/namespace_contains_wildcard --- PASS: Test_formatAWSIAMStatement (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_and_name_without_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/name_contains_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_contains_wildcard (0.00s) PASS ok k8s.io/kops/pkg/model/awsmodel 0.071s === RUN TestAPILoadBalancerModelBuilder_Build --- PASS: TestAPILoadBalancerModelBuilder_Build (0.00s) === RUN TestSubnetForLoadbalancer --- PASS: TestSubnetForLoadbalancer (0.00s) === RUN TestCloudTagsForInstanceGroup --- PASS: TestCloudTagsForInstanceGroup (0.00s) === RUN TestNetworkModelBuilder_Build --- PASS: TestNetworkModelBuilder_Build (0.00s) === RUN TestResourceGroupModelBuilder_Build --- PASS: TestResourceGroupModelBuilder_Build (0.00s) === RUN TestVMScaleSetModelBuilder_Build --- PASS: TestVMScaleSetModelBuilder_Build (0.00s) === RUN TestGetCapacity === RUN TestGetCapacity/test_case_0 === RUN TestGetCapacity/test_case_1 === RUN TestGetCapacity/test_case_2 === RUN TestGetCapacity/test_case_3 --- PASS: TestGetCapacity (0.00s) --- PASS: TestGetCapacity/test_case_0 (0.00s) --- PASS: TestGetCapacity/test_case_1 (0.00s) --- PASS: TestGetCapacity/test_case_2 (0.00s) --- PASS: TestGetCapacity/test_case_3 (0.00s) === RUN TestGetStorageProfile === RUN TestGetStorageProfile/test_case_0 === RUN TestGetStorageProfile/test_case_1 --- PASS: TestGetStorageProfile (0.00s) --- PASS: TestGetStorageProfile/test_case_0 (0.00s) --- PASS: TestGetStorageProfile/test_case_1 (0.00s) === RUN TestParseImage === RUN TestParseImage/test_case_0 === RUN TestParseImage/test_case_1 === RUN TestParseImage/test_case_2 === RUN TestParseImage/test_case_3 --- PASS: TestParseImage (0.00s) --- PASS: TestParseImage/test_case_0 (0.00s) --- PASS: TestParseImage/test_case_1 (0.00s) --- PASS: TestParseImage/test_case_2 (0.00s) --- PASS: TestParseImage/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/model/azuremodel 0.069s === RUN TestCloudConfigurationOptionsBuilder === RUN TestCloudConfigurationOptionsBuilder/neither === RUN TestCloudConfigurationOptionsBuilder/all_false === RUN TestCloudConfigurationOptionsBuilder/all_true === RUN TestCloudConfigurationOptionsBuilder/os_false === RUN TestCloudConfigurationOptionsBuilder/os_true === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_true === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_true --- PASS: TestCloudConfigurationOptionsBuilder (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/neither (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_true (0.00s) === RUN Test_Build_Containerd_Supported_Version --- PASS: Test_Build_Containerd_Supported_Version (0.00s) === RUN Test_Build_Containerd_Unneeded_Runtime --- PASS: Test_Build_Containerd_Unneeded_Runtime (0.00s) === RUN Test_Build_Containerd_Needed_Runtime --- PASS: Test_Build_Containerd_Needed_Runtime (0.00s) === RUN TestImage I0118 08:55:10.799550 45442 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestImage (0.00s) === RUN Test_Build_KCM_Builder --- PASS: Test_Build_KCM_Builder (0.00s) === RUN Test_Build_KCM_Builder_Change_Duration --- PASS: Test_Build_KCM_Builder_Change_Duration (0.00s) === RUN Test_Build_KCM_Builder_CIDR_Mask_Size === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: (0.00s) === RUN TestFeatureGatesKubernetesVersion --- PASS: TestFeatureGatesKubernetesVersion (0.00s) === RUN TestFeatureGatesOverride --- PASS: TestFeatureGatesOverride (0.00s) === RUN Test_Build_Scheduler_Without_PolicyConfigMap --- PASS: Test_Build_Scheduler_Without_PolicyConfigMap (0.00s) === RUN Test_Build_Scheduler_PolicyConfigMap_Supported_Version --- PASS: Test_Build_Scheduler_PolicyConfigMap_Supported_Version (0.00s) PASS ok k8s.io/kops/pkg/model/components 0.058s === RUN Test_RunEtcdManagerBuilder I0118 08:55:10.812119 45443 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunEtcdManagerBuilder/basedir=tests/minimal === RUN Test_RunEtcdManagerBuilder/basedir=tests/interval === RUN Test_RunEtcdManagerBuilder/basedir=tests/proxy === RUN Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings W0118 08:55:10.838936 45443 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 W0118 08:55:10.841006 45443 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 --- PASS: Test_RunEtcdManagerBuilder (0.03s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/minimal (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/interval (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/proxy (0.00s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings (0.01s) PASS ok k8s.io/kops/pkg/model/components/etcdmanager 0.102s === RUN Test_RunKubeApiserverBuilder I0118 08:55:10.813556 45444 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunKubeApiserverBuilder/basedir=tests/minimal --- PASS: Test_RunKubeApiserverBuilder (0.01s) --- PASS: Test_RunKubeApiserverBuilder/basedir=tests/minimal (0.01s) PASS ok k8s.io/kops/pkg/model/components/kubeapiserver 0.082s === RUN Test_RunKubeSchedulerBuilder === RUN Test_RunKubeSchedulerBuilder/basedir=tests/minimal === RUN Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig === RUN Test_RunKubeSchedulerBuilder/basedir=tests/mixing --- PASS: Test_RunKubeSchedulerBuilder (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/minimal (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig (0.00s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/mixing (0.00s) PASS ok k8s.io/kops/pkg/model/components/kubescheduler 0.076s === RUN TestDefaultInstanceGroupVolumeSize --- PASS: TestDefaultInstanceGroupVolumeSize (0.00s) PASS ok k8s.io/kops/pkg/model/defaults 0.020s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) === RUN TestPolicyGeneration --- PASS: TestPolicyGeneration (0.00s) === RUN TestEmptyPolicy --- PASS: TestEmptyPolicy (0.00s) PASS ok k8s.io/kops/pkg/model/iam 0.074s === RUN TestServerGroupBuilder I0118 08:55:10.812499 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:10.823054 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:10.831996 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:10.846778 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:10.853654 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:10.869086 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:10.884404 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.148138 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.157332 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.166048 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.173822 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.179427 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.183285 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.186961 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.192512 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.196175 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.385221 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:11.388735 45451 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestServerGroupBuilder (0.58s) PASS ok k8s.io/kops/pkg/model/openstackmodel 0.649s === RUN Test_NodeUpTabs --- PASS: Test_NodeUpTabs (0.00s) PASS ok k8s.io/kops/pkg/model/resources 0.033s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetVMSSNameFromProviderID === RUN TestGetVMSSNameFromProviderID/test_case_0 === RUN TestGetVMSSNameFromProviderID/test_case_1 === RUN TestGetVMSSNameFromProviderID/test_case_2 --- PASS: TestGetVMSSNameFromProviderID (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_0 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_1 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_2 (0.00s) === RUN TestIdentifyNode === RUN TestIdentifyNode/test_case_0 === RUN TestIdentifyNode/test_case_1 --- PASS: TestIdentifyNode (0.00s) --- PASS: TestIdentifyNode/test_case_0 (0.00s) --- PASS: TestIdentifyNode/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/nodeidentity/azure 0.030s === RUN TestBuildNodeLabels === RUN TestBuildNodeLabels/RoleControlPlane === RUN TestBuildNodeLabels/RoleNode --- PASS: TestBuildNodeLabels (0.00s) --- PASS: TestBuildNodeLabels/RoleControlPlane (0.00s) --- PASS: TestBuildNodeLabels/RoleNode (0.00s) PASS ok k8s.io/kops/pkg/nodelabels 0.022s === RUN TestGenerateCertificate === RUN TestGenerateCertificate/selfsigned === RUN TestGenerateCertificate/client === RUN TestGenerateCertificate/server --- PASS: TestGenerateCertificate (0.00s) --- PASS: TestGenerateCertificate/selfsigned (0.00s) --- PASS: TestGenerateCertificate/client (0.00s) --- PASS: TestGenerateCertificate/server (0.00s) === RUN TestCertificateRoundTrip --- PASS: TestCertificateRoundTrip (0.00s) === RUN TestIssueCert === RUN TestIssueCert/ca === RUN TestIssueCert/client === RUN TestIssueCert/clientOneYear === RUN TestIssueCert/#00 === RUN TestIssueCert/server --- PASS: TestIssueCert (0.80s) --- PASS: TestIssueCert/ca (0.31s) --- PASS: TestIssueCert/client (0.20s) --- PASS: TestIssueCert/clientOneYear (0.29s) --- PASS: TestIssueCert/#00 (0.00s) --- PASS: TestIssueCert/server (0.00s) === RUN TestPrivateKeyRoundTripRSA === RUN TestPrivateKeyRoundTripRSA/rsa === RUN TestPrivateKeyRoundTripRSA/ecdsa --- PASS: TestPrivateKeyRoundTripRSA (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/rsa (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/ecdsa (0.00s) === RUN Test_AWSFingerprint_RsaKey1 --- PASS: Test_AWSFingerprint_RsaKey1 (0.00s) === RUN Test_AWSFingerprint_RsaKeyEncrypted --- PASS: Test_AWSFingerprint_RsaKeyEncrypted (0.00s) === RUN Test_AWSFingerprint_Ed25519Key --- PASS: Test_AWSFingerprint_Ed25519Key (0.00s) === RUN Test_AWSFingerprint_TrickyWhitespace --- PASS: Test_AWSFingerprint_TrickyWhitespace (0.00s) === RUN Test_AWSFingerprint_DsaKey --- PASS: Test_AWSFingerprint_DsaKey (0.00s) === RUN Test_OpenSSHFingerprint_RsaKey1 --- PASS: Test_OpenSSHFingerprint_RsaKey1 (0.00s) PASS ok k8s.io/kops/pkg/pki 0.805s === RUN TestLongDesc --- PASS: TestLongDesc (0.00s) PASS ok k8s.io/kops/pkg/pretty 0.003s === RUN TestAddUntaggedRouteTables I0118 08:55:15.488582 47049 routetable.go:53] DescribeRouteTables: { } W0118 08:55:15.488674 47049 tags.go:67] cluster tag not found on route-table:rtb-1234 I0118 08:55:15.488681 47049 aws.go:230] Skipping route table in VPC, but with wrong cluster tag ("other.example.com") --- PASS: TestAddUntaggedRouteTables (0.00s) === RUN TestListIAMInstanceProfiles I0118 08:55:15.488772 47049 iaminstanceprofile.go:193] ListInstanceProfiles: { } W0118 08:55:15.488840 47049 aws.go:2076] could not find instance profile "__no_entity__.me.example.com". Resource may already have been deleted: NoSuchEntity: No such entity --- PASS: TestListIAMInstanceProfiles (0.00s) === RUN TestListIAMRoles I0118 08:55:15.488908 47049 iamrole.go:89] ListRoles: { } --- PASS: TestListIAMRoles (0.00s) === RUN TestListRouteTables I0118 08:55:15.488977 47049 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["me.example.com"] }] } I0118 08:55:15.489030 47049 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/me.example.com"] }] } --- PASS: TestListRouteTables (0.00s) === RUN TestSharedVolume I0118 08:55:15.489120 47049 volumes.go:33] CreateVolume: { TagSpecifications: [{ ResourceType: "volume", Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "shared" }] }] } I0118 08:55:15.489185 47049 volumes.go:33] CreateVolume: { TagSpecifications: [{ Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "owned" }] }] } I0118 08:55:15.489205 47049 volumes.go:128] DescribeVolumes: { } W0118 08:55:15.489226 47049 aws.go:2229] (new) cluster tag not found on volume:vol-2 aws_test.go:334: 2 --- PASS: TestSharedVolume (0.00s) === RUN TestMatchesElbTags --- PASS: TestMatchesElbTags (0.00s) === RUN TestListVPCs I0118 08:55:15.489314 47049 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:15.489450 47049 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:15.489476 47049 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:15.489528 47049 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:15.489550 47049 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:15.489593 47049 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:15.489622 47049 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:15.489631 47049 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:15.489647 47049 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:15.489681 47049 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:15.489722 47049 tags.go:42] CreateTags { Resources: ["vpc-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "legacy.example.com" }] } I0118 08:55:15.489756 47049 tags.go:42] CreateTags { Resources: ["vpc-shared"], Tags: [{ Key: "kubernetes.io/cluster/shared.example.com", Value: "shared" }] } I0118 08:55:15.489778 47049 tags.go:42] CreateTags { Resources: ["vpc-shared-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "shared-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/shared-with-legacy.example.com", Value: "shared" }] } I0118 08:55:15.489810 47049 tags.go:42] CreateTags { Resources: ["vpc-owned"], Tags: [{ Key: "kubernetes.io/cluster/owned.example.com", Value: "owned" }] } I0118 08:55:15.489831 47049 tags.go:42] CreateTags { Resources: ["vpc-owned-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "owned-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/owned-with-legacy.example.com", Value: "owned" }] } I0118 08:55:15.489858 47049 tags.go:42] CreateTags { Resources: ["vpc-other"], Tags: [{ Key: "KubernetesCluster", Value: "other.example.com" },{ Key: "kubernetes.io/cluster/other.example.com", Value: "shared" }] } I0118 08:55:15.489898 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["mismatch.example.com"] }] } I0118 08:55:15.489925 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/mismatch.example.com"] }] } I0118 08:55:15.489946 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["legacy.example.com"] }] } I0118 08:55:15.489967 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/legacy.example.com"] }] } I0118 08:55:15.489988 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared-with-legacy.example.com"] }] } I0118 08:55:15.490008 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared-with-legacy.example.com"] }] } I0118 08:55:15.490029 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared.example.com"] }] } I0118 08:55:15.490046 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared.example.com"] }] } I0118 08:55:15.490083 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned-with-legacy.example.com"] }] } I0118 08:55:15.490113 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned-with-legacy.example.com"] }] } I0118 08:55:15.490140 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned.example.com"] }] } I0118 08:55:15.490158 47049 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned.example.com"] }] } --- PASS: TestListVPCs (0.00s) PASS ok k8s.io/kops/pkg/resources/aws 0.112s === RUN TestListResourcesAzure --- PASS: TestListResourcesAzure (0.00s) === RUN TestIsOwnedByCluster === RUN TestIsOwnedByCluster/test_case_0 === RUN TestIsOwnedByCluster/test_case_1 === RUN TestIsOwnedByCluster/test_case_2 === RUN TestIsOwnedByCluster/test_case_3 --- PASS: TestIsOwnedByCluster (0.00s) --- PASS: TestIsOwnedByCluster/test_case_0 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_1 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_2 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/resources/azure 0.025s === RUN TestNameMatch --- PASS: TestNameMatch (0.00s) === RUN TestMatchesClusterNameWithUUID --- PASS: TestMatchesClusterNameWithUUID (0.00s) PASS ok k8s.io/kops/pkg/resources/gce 0.108s === RUN TestEscapeCommand --- PASS: TestEscapeCommand (0.00s) === RUN TestRawManifest --- PASS: TestRawManifest (0.00s) === RUN TestRawMixedManifest --- PASS: TestRawMixedManifest (0.00s) === RUN TestKeyPairOnlyManifest --- PASS: TestKeyPairOnlyManifest (0.00s) === RUN TestUnitFileExtensionValid === RUN TestUnitFileExtensionValid/valid_extension:_.automount === RUN TestUnitFileExtensionValid/valid_extension:_.device === RUN TestUnitFileExtensionValid/valid_extension:_.mount === RUN TestUnitFileExtensionValid/valid_extension:_.path === RUN TestUnitFileExtensionValid/valid_extension:_.scope === RUN TestUnitFileExtensionValid/valid_extension:_.service === RUN TestUnitFileExtensionValid/valid_extension:_.slice === RUN TestUnitFileExtensionValid/valid_extension:_.socket === RUN TestUnitFileExtensionValid/valid_extension:_.swap === RUN TestUnitFileExtensionValid/valid_extension:_.target === RUN TestUnitFileExtensionValid/valid_extension:_.timer === RUN TestUnitFileExtensionValid/invalid_extension:_(no_extension) === RUN TestUnitFileExtensionValid/invalid_extension:_.not-valid --- PASS: TestUnitFileExtensionValid (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.automount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.device (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.mount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.path (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.scope (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.service (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.slice (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.socket (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.swap (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.target (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.timer (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_(no_extension) (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_.not-valid (0.00s) PASS ok k8s.io/kops/pkg/systemd 0.004s === RUN TestTruncateString === RUN TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false --- PASS: TestTruncateString (0.00s) --- PASS: TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false (0.00s) PASS ok k8s.io/kops/pkg/truncate 0.003s === RUN TestJoin --- PASS: TestJoin (0.00s) PASS ok k8s.io/kops/pkg/urls 0.004s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) PASS ok k8s.io/kops/pkg/util/stringorslice 0.004s === RUN Test_Overlap --- PASS: Test_Overlap (0.00s) === RUN Test_BelongsTo --- PASS: Test_BelongsTo (0.00s) === RUN Test_SplitInto8 --- PASS: Test_SplitInto8 (0.00s) PASS ok k8s.io/kops/pkg/util/subnet 0.004s === RUN TestRenderGeneralOK --- PASS: TestRenderGeneralOK (0.00s) === RUN TestRenderMissingValue --- PASS: TestRenderMissingValue (0.00s) === RUN TestRenderIndent --- PASS: TestRenderIndent (0.00s) === RUN TestRenderChannelFunctions --- PASS: TestRenderChannelFunctions (0.00s) === RUN TestRenderSnippet --- PASS: TestRenderSnippet (0.00s) === RUN TestRenderContext --- PASS: TestRenderContext (0.00s) === RUN TestAllowForMissingVars --- PASS: TestAllowForMissingVars (0.00s) === RUN TestRenderIntegration --- PASS: TestRenderIntegration (0.00s) PASS ok k8s.io/kops/pkg/util/templater 0.033s === RUN Test_ValidateCloudGroupMissing --- PASS: Test_ValidateCloudGroupMissing (0.00s) === RUN Test_ValidateNodesNotEnough --- PASS: Test_ValidateNodesNotEnough (0.00s) === RUN Test_ValidateDetachedNodesDontCount --- PASS: Test_ValidateDetachedNodesDontCount (0.00s) === RUN Test_ValidateNodeNotReady --- PASS: Test_ValidateNodeNotReady (0.00s) === RUN Test_ValidateMastersNotEnough --- PASS: Test_ValidateMastersNotEnough (0.00s) === RUN Test_ValidateMasterNotReady --- PASS: Test_ValidateMasterNotReady (0.00s) === RUN Test_ValidateMasterStaticPods --- PASS: Test_ValidateMasterStaticPods (0.00s) === RUN Test_ValidateNoPodFailures --- PASS: Test_ValidateNoPodFailures (0.00s) === RUN Test_ValidatePodFailure === RUN Test_ValidatePodFailure/pending-node-kube-system === RUN Test_ValidatePodFailure/pending-node-kube-system#01 === RUN Test_ValidatePodFailure/pending-node-kube-system#02 === RUN Test_ValidatePodFailure/pending-node-otherNamespace === RUN Test_ValidatePodFailure/pending-node-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-node-otherNamespace#02 === RUN Test_ValidatePodFailure/pending-cluster-kube-system === RUN Test_ValidatePodFailure/pending-cluster-kube-system#01 === RUN Test_ValidatePodFailure/pending-cluster-kube-system#02 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-node-kube-system === RUN Test_ValidatePodFailure/notready-node-kube-system#01 === RUN Test_ValidatePodFailure/notready-node-kube-system#02 === RUN Test_ValidatePodFailure/notready-node-otherNamespace === RUN Test_ValidatePodFailure/notready-node-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-node-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-cluster-kube-system === RUN Test_ValidatePodFailure/notready-cluster-kube-system#01 === RUN Test_ValidatePodFailure/notready-cluster-kube-system#02 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-node-kube-system === RUN Test_ValidatePodFailure/unknown-node-kube-system#01 === RUN Test_ValidatePodFailure/unknown-node-kube-system#02 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#01 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#02 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 --- PASS: Test_ValidatePodFailure (0.01s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 (0.00s) === RUN Test_ValidateBastionNodes === RUN Test_ValidateBastionNodes/instancegroup's_nodes_not_ready === RUN Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready --- PASS: Test_ValidateBastionNodes (0.00s) --- PASS: Test_ValidateBastionNodes/instancegroup's_nodes_not_ready (0.00s) --- PASS: Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready (0.00s) === RUN Test_ValidateDetachedNodesNotValidated --- PASS: Test_ValidateDetachedNodesNotValidated (0.00s) PASS ok k8s.io/kops/pkg/validation 0.053s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetInternalIP --- PASS: TestGetInternalIP (0.00s) === RUN TestGetSeeds --- PASS: TestGetSeeds (0.00s) PASS ok k8s.io/kops/protokube/pkg/gossip/azure 0.041s === RUN TestRemovesDuplicateGuardedBlocks W0118 08:55:15.489189 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.489234 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.489238 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.489242 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.489245 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.489248 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.489251 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.489254 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.489257 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.489260 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.489263 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.489269 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.489271 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.489274 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.489278 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.489281 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.504711 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.504737 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.504803 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.504813 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.504870 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.504879 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.504931 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.504940 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.504993 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505002 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505071 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505081 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505138 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505146 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505219 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505234 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505291 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505300 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505378 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505388 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505446 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505455 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505509 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505518 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505570 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505579 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505633 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505641 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505694 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505703 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505758 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505767 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505819 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505828 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505883 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505893 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.505948 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.505957 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506191 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506202 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506264 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506274 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506331 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506341 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506412 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506423 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506487 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506497 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506568 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506577 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506638 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506648 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506706 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506715 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506773 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506782 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506838 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506848 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506913 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506923 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.506981 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.506993 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507055 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507066 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507124 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507134 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507191 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507200 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507267 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507278 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507336 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507345 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507436 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507446 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507515 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507525 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507584 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507594 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507652 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507662 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507740 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507752 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507810 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507820 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507879 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507889 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.507944 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.507953 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508010 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508027 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508086 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508095 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508149 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508158 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508215 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508224 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508278 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508287 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508345 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508355 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508410 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508420 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508477 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508486 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508549 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508559 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508613 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508621 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508676 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508685 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508741 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508751 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508807 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508816 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.508874 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.508883 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.509521 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.509532 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.509589 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.509597 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.509653 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.509662 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.509732 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.509744 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.509821 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.509831 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.509888 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.509898 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.509951 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.509960 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510012 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510023 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510074 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510083 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510134 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510143 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510195 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510204 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510254 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510263 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510315 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510324 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510374 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510382 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510433 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510442 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510491 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510500 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510549 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510558 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510605 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510613 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510660 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510667 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510714 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510721 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510805 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510814 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510878 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510888 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.510943 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.510953 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511011 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511020 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511077 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511086 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511165 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511175 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511234 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511243 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511300 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511309 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511362 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511369 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511419 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511427 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511477 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511485 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511533 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511541 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511591 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511601 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511653 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511661 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511710 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511718 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511764 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511772 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511820 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511829 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511883 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511892 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.511945 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.511955 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.512009 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512018 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.512070 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512079 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRemovesDuplicateGuardedBlocks (0.02s) === RUN TestRecoversFromBadNesting W0118 08:55:15.512712 47237 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0118 08:55:15.512720 47237 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0118 08:55:15.512726 47237 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0118 08:55:15.512729 47237 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0118 08:55:15.512733 47237 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0118 08:55:15.512736 47237 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0118 08:55:15.512739 47237 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0118 08:55:15.512754 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512759 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512763 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.512767 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512770 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.512773 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512777 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.512781 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512784 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.512787 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512790 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512793 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512797 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512800 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.512803 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.512806 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.557373 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.557398 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.557468 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.557483 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.557541 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.557551 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.557614 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.557624 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.557710 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.557720 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.557776 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.557786 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.557843 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.557853 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.557906 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.557921 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.557982 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.557992 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558048 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558062 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558116 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558130 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558189 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558204 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558288 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558299 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558357 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558368 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558424 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558436 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558494 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558505 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558562 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558572 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558638 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558653 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558710 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558724 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558785 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558798 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558861 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558873 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.558931 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.558942 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559002 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559013 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559069 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559079 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559137 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559146 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559205 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559216 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559270 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559280 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559338 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559350 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559425 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559437 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559491 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559501 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559557 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559567 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559623 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559633 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559713 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559725 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559786 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559797 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559857 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559868 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559928 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.559940 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.559999 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560009 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560065 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560075 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560137 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560148 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560206 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560216 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560273 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560283 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560356 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560366 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560407 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560415 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560471 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560482 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560539 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560550 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560604 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560614 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560674 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560684 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560740 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560750 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560807 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560818 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560873 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560884 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.560942 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.560952 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561008 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561017 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561090 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561100 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561159 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561169 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561222 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561231 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561285 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561295 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561349 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561360 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561415 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561425 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561481 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561490 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561554 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561564 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561623 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561633 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561689 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561699 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561755 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561765 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561820 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561828 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561880 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561888 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.561942 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.561952 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562007 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562016 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562075 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562085 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562140 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562149 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562203 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562212 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562265 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562274 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562329 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562338 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562390 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562398 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562448 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562457 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562508 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562517 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562574 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562583 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562651 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562661 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562712 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562724 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562777 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562785 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562836 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562845 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562895 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562904 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.562957 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.562972 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563037 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563048 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563108 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563118 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563178 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563188 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563239 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563253 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563306 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563314 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563368 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563376 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563432 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563440 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563494 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563502 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563554 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563562 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563618 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563625 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563679 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563687 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563741 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563750 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563807 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563815 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563870 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563878 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563935 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.563943 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.563997 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.564005 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0118 08:55:15.564059 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0118 08:55:15.564068 47237 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRecoversFromBadNesting (0.05s) PASS ok k8s.io/kops/protokube/pkg/gossip/dns/hosts 0.116s === RUN TestSerializeEmptyCluster --- PASS: TestSerializeEmptyCluster (0.00s) PASS ok k8s.io/kops/tests/codecs 0.044s === RUN TestKopsUpgrades --- PASS: TestKopsUpgrades (0.01s) === RUN TestKubernetesUpgrades --- PASS: TestKubernetesUpgrades (0.00s) === RUN TestFindImage --- PASS: TestFindImage (0.00s) === RUN TestRecommendedKubernetesVersion --- PASS: TestRecommendedKubernetesVersion (0.00s) === RUN TestOrdering --- PASS: TestOrdering (0.00s) === RUN TestChannelsSelfConsistent --- PASS: TestChannelsSelfConsistent (0.02s) === RUN TestChannelImages === RUN TestChannelImages/stable-channel === RUN TestChannelImages/alpha-channel --- PASS: TestChannelImages (0.00s) --- PASS: TestChannelImages/stable-channel (0.00s) --- PASS: TestChannelImages/alpha-channel (0.00s) PASS ok k8s.io/kops/tests/integration/channel 0.070s === RUN TestConversionMinimal === RUN TestConversionMinimal/legacy-v1alpha2-v1alpha2 --- PASS: TestConversionMinimal (0.01s) --- PASS: TestConversionMinimal/legacy-v1alpha2-v1alpha2 (0.01s) PASS ok k8s.io/kops/tests/integration/conversion 0.032s === RUN Test_tryResourceAsString --- PASS: Test_tryResourceAsString (0.00s) === RUN Test_DryrunTarget_PrintReport --- PASS: Test_DryrunTarget_PrintReport (0.00s) === RUN TestWriteFile I0118 08:55:17.928254 464 files.go:57] Writing file "/tmp/TestWriteFile3106875998/001/SubDir/test1.tmp" I0118 08:55:17.928525 464 files.go:113] Changing file mode for "/tmp/TestWriteFile3106875998/001/SubDir/test1.tmp" to -rw-r--r-- --- PASS: TestWriteFile (0.00s) === RUN TestBigInt_Format --- PASS: TestBigInt_Format (0.00s) === RUN TestVFSCAStoreRoundTrip --- PASS: TestVFSCAStoreRoundTrip (0.00s) === RUN TestAddItem === RUN TestAddItem/first_primary === RUN TestAddItem/first_secondary === RUN TestAddItem/firstBigSerial_primary === RUN TestAddItem/firstBigSerial_secondary === RUN TestAddItem/after_primary === RUN TestAddItem/after_secondary === RUN TestAddItem/bigSerialAfter_primary === RUN TestAddItem/bigSerialAfter_secondary === RUN TestAddItem/before_primary === RUN TestAddItem/before_secondary === RUN TestAddItem/first_certonly_primary === RUN TestAddItem/first_certonly_secondary === RUN TestAddItem/after_certonly_primary === RUN TestAddItem/after_certonly_secondary === RUN TestAddItem/before_certonly_primary === RUN TestAddItem/before_certonly_secondary --- PASS: TestAddItem (0.00s) --- PASS: TestAddItem/first_primary (0.00s) --- PASS: TestAddItem/first_secondary (0.00s) --- PASS: TestAddItem/firstBigSerial_primary (0.00s) --- PASS: TestAddItem/firstBigSerial_secondary (0.00s) --- PASS: TestAddItem/after_primary (0.00s) --- PASS: TestAddItem/after_secondary (0.00s) --- PASS: TestAddItem/bigSerialAfter_primary (0.00s) --- PASS: TestAddItem/bigSerialAfter_secondary (0.00s) --- PASS: TestAddItem/before_primary (0.00s) --- PASS: TestAddItem/before_secondary (0.00s) --- PASS: TestAddItem/first_certonly_primary (0.00s) --- PASS: TestAddItem/first_certonly_secondary (0.00s) --- PASS: TestAddItem/after_certonly_primary (0.00s) --- PASS: TestAddItem/after_certonly_secondary (0.00s) --- PASS: TestAddItem/before_certonly_primary (0.00s) --- PASS: TestAddItem/before_certonly_secondary (0.00s) PASS ok k8s.io/kops/upup/pkg/fi 0.029s === RUN TestBootstrapChannelBuilder_BuildTasks I0118 08:55:22.087284 809 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:22.087459 809 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:22.087488 809 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:22.087523 809 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:22.087550 809 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:22.087581 809 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:22.087601 809 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:22.087612 809 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:22.087638 809 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:22.087659 809 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:22.092525 809 zones.go:93] ListHostedZonesPages { } I0118 08:55:22.155906 809 zones.go:93] ListHostedZonesPages { } I0118 08:55:22.297559 809 zones.go:93] ListHostedZonesPages { } I0118 08:55:22.458719 809 zones.go:93] ListHostedZonesPages { } I0118 08:55:22.587138 809 zones.go:93] ListHostedZonesPages { } I0118 08:55:22.704344 809 zones.go:93] ListHostedZonesPages { } I0118 08:55:22.844783 809 zones.go:93] ListHostedZonesPages { } I0118 08:55:23.022422 809 zones.go:93] ListHostedZonesPages { } I0118 08:55:23.638824 809 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_BuildTasks (1.69s) === RUN TestBootstrapChannelBuilder_ServiceAccountIAM I0118 08:55:23.780160 809 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:23.780384 809 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:23.780464 809 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:23.780506 809 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:23.780541 809 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:23.780579 809 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:23.780610 809 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:23.780633 809 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:23.780662 809 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:23.780684 809 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:23.780708 809 featureflag.go:167] Unknown FeatureFlag "+UseServiceAccountExternalPermissions" I0118 08:55:23.782212 809 zones.go:93] ListHostedZonesPages { } I0118 08:55:23.951390 809 featureflag.go:167] Unknown FeatureFlag "-UseServiceAccountExternalPermissions" --- PASS: TestBootstrapChannelBuilder_ServiceAccountIAM (0.17s) === RUN TestBootstrapChannelBuilder_AWSCloudController I0118 08:55:23.951607 809 featureflag.go:164] FeatureFlag "ImageDigest"=false I0118 08:55:23.951856 809 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:23.951915 809 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0118 08:55:23.951956 809 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0118 08:55:23.951987 809 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0118 08:55:23.952027 809 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0118 08:55:23.952062 809 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0118 08:55:23.952086 809 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0118 08:55:23.952115 809 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0118 08:55:23.952138 809 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0118 08:55:23.953632 809 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_AWSCloudController (0.14s) === RUN TestContainerdVersionUrl === RUN TestContainerdVersionUrl/1.4.1- === RUN TestContainerdVersionUrl/1.4.1-arm === RUN TestContainerdVersionUrl/-amd64 === RUN TestContainerdVersionUrl/-arm64 === RUN TestContainerdVersionUrl/1.1.1-amd64 === RUN TestContainerdVersionUrl/1.1.1-arm64 === RUN TestContainerdVersionUrl/1.6.5-amd64 === RUN TestContainerdVersionUrl/1.5.5-arm64 --- PASS: TestContainerdVersionUrl (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1- (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-arm (0.00s) --- PASS: TestContainerdVersionUrl/-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.6.5-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.5.5-arm64 (0.00s) === RUN TestDeepValidate_OK --- PASS: TestDeepValidate_OK (0.00s) === RUN TestDeepValidate_NoNodeZones --- PASS: TestDeepValidate_NoNodeZones (0.00s) === RUN TestDeepValidate_NoMasterZones --- PASS: TestDeepValidate_NoMasterZones (0.00s) === RUN TestDeepValidate_BadZone deepvalidate_test.go:58: Zone validation not checked by DeepValidate --- SKIP: TestDeepValidate_BadZone (0.00s) === RUN TestDeepValidate_MixedRegion deepvalidate_test.go:70: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_MixedRegion (0.00s) === RUN TestDeepValidate_RegionAsZone deepvalidate_test.go:84: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_RegionAsZone (0.00s) === RUN TestDeepValidate_NotIncludedZone --- PASS: TestDeepValidate_NotIncludedZone (0.00s) === RUN TestDeepValidate_DuplicateZones --- PASS: TestDeepValidate_DuplicateZones (0.00s) === RUN TestDeepValidate_ExtraMasterZone --- PASS: TestDeepValidate_ExtraMasterZone (0.00s) === RUN TestDeepValidate_EvenEtcdClusterSize --- PASS: TestDeepValidate_EvenEtcdClusterSize (0.00s) === RUN TestDeepValidate_MissingEtcdMember --- PASS: TestDeepValidate_MissingEtcdMember (0.00s) === RUN TestPopulateClusterSpec_Proxy --- PASS: TestPopulateClusterSpec_Proxy (0.00s) === RUN TestPrecreateDNSNames --- PASS: TestPrecreateDNSNames (0.00s) === RUN TestDockerVersionUrlHash === RUN TestDockerVersionUrlHash/19.03.13-amd64 === RUN TestDockerVersionUrlHash/19.03.13-arm64 === RUN TestDockerVersionUrlHash/18.06.3-amd64 === RUN TestDockerVersionUrlHash/18.06.3-arm64 === RUN TestDockerVersionUrlHash/17.03.1-amd64 === RUN TestDockerVersionUrlHash/17.03.1-arm64 --- PASS: TestDockerVersionUrlHash (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-arm64 (0.00s) === RUN TestDockerVersionUrl === RUN TestDockerVersionUrl/19.03.13- === RUN TestDockerVersionUrl/19.03.13-arm === RUN TestDockerVersionUrl/-amd64 === RUN TestDockerVersionUrl/-arm64 === RUN TestDockerVersionUrl/18.06.3-amd64 === RUN TestDockerVersionUrl/18.06.3-arm64 === RUN TestDockerVersionUrl/19.03.13-amd64 === RUN TestDockerVersionUrl/19.03.13-arm64 --- PASS: TestDockerVersionUrl (0.00s) --- PASS: TestDockerVersionUrl/19.03.13- (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm (0.00s) --- PASS: TestDockerVersionUrl/-amd64 (0.00s) --- PASS: TestDockerVersionUrl/-arm64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm64 (0.00s) === RUN TestDockerVersionHash === RUN TestDockerVersionHash/19.03.13- === RUN TestDockerVersionHash/19.03.13-arm === RUN TestDockerVersionHash/-amd64 === RUN TestDockerVersionHash/-arm64 === RUN TestDockerVersionHash/1.1.1-amd64 === RUN TestDockerVersionHash/1.1.1-arm64 === RUN TestDockerVersionHash/19.03.13-amd64 === RUN TestDockerVersionHash/19.03.13-arm64 --- PASS: TestDockerVersionHash (0.00s) --- PASS: TestDockerVersionHash/19.03.13- (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm (0.00s) --- PASS: TestDockerVersionHash/-amd64 (0.00s) --- PASS: TestDockerVersionHash/-arm64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-amd64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-arm64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm64 (0.00s) === RUN TestDockerVersionsHashesAmd64 docker_test.go:245: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesAmd64 (0.00s) === RUN TestDockerVersionsHashesArm64 docker_test.go:260: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesArm64 (0.00s) === RUN Test_FindCNIAssetFromEnvironmentVariable --- PASS: Test_FindCNIAssetFromEnvironmentVariable (0.00s) === RUN Test_FindCNIAssetFromDefaults122 --- PASS: Test_FindCNIAssetFromDefaults122 (0.86s) === RUN TestRemoveSharedPrefix --- PASS: TestRemoveSharedPrefix (0.00s) === RUN TestCreateEtcdCluster --- PASS: TestCreateEtcdCluster (0.00s) === RUN TestSetupNetworking W0118 08:55:24.979947 809 new_cluster.go:1152] flannel UDP mode is not recommended; consider flannel-vxlan instead --- PASS: TestSetupNetworking (0.01s) === RUN TestDefaultImage --- PASS: TestDefaultImage (0.00s) === RUN TestPopulateCluster_Default_NoError --- PASS: TestPopulateCluster_Default_NoError (0.00s) === RUN TestPopulateCluster_Subnets === RUN TestPopulateCluster_Subnets/100.64.0.0/10 === RUN TestPopulateCluster_Subnets/10.0.0.0/9 === RUN TestPopulateCluster_Subnets/10.0.0.0/8 === RUN TestPopulateCluster_Subnets/::/0 --- PASS: TestPopulateCluster_Subnets (0.01s) --- PASS: TestPopulateCluster_Subnets/100.64.0.0/10 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/9 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/8 (0.00s) --- PASS: TestPopulateCluster_Subnets/::/0 (0.00s) === RUN TestPopulateCluster_Docker_Spec --- PASS: TestPopulateCluster_Docker_Spec (0.00s) === RUN TestPopulateCluster_StorageDefault --- PASS: TestPopulateCluster_StorageDefault (0.00s) === RUN TestPopulateCluster_EvictionHard --- PASS: TestPopulateCluster_EvictionHard (0.00s) === RUN TestPopulateCluster_Custom_CIDR --- PASS: TestPopulateCluster_Custom_CIDR (0.00s) === RUN TestPopulateCluster_IsolateMasters --- PASS: TestPopulateCluster_IsolateMasters (0.00s) === RUN TestPopulateCluster_IsolateMastersFalse --- PASS: TestPopulateCluster_IsolateMastersFalse (0.00s) === RUN TestPopulateCluster_Name_Required --- PASS: TestPopulateCluster_Name_Required (0.00s) === RUN TestPopulateCluster_Zone_Required --- PASS: TestPopulateCluster_Zone_Required (0.00s) === RUN TestPopulateCluster_NetworkCIDR_Required --- PASS: TestPopulateCluster_NetworkCIDR_Required (0.00s) === RUN TestPopulateCluster_NonMasqueradeCIDR_Required --- PASS: TestPopulateCluster_NonMasqueradeCIDR_Required (0.00s) === RUN TestPopulateCluster_CloudProvider_Required --- PASS: TestPopulateCluster_CloudProvider_Required (0.00s) === RUN TestPopulateCluster_APIServerCount --- PASS: TestPopulateCluster_APIServerCount (0.00s) === RUN TestPopulateCluster_AnonymousAuth --- PASS: TestPopulateCluster_AnonymousAuth (0.00s) === RUN TestPopulateCluster_DockerVersion --- PASS: TestPopulateCluster_DockerVersion (0.00s) === RUN TestPopulateCluster_KubeController_High_Enough_Version --- PASS: TestPopulateCluster_KubeController_High_Enough_Version (0.00s) === RUN TestPopulateInstanceGroup_Name_Required --- PASS: TestPopulateInstanceGroup_Name_Required (0.00s) === RUN TestPopulateInstanceGroup_Role_Required --- PASS: TestPopulateInstanceGroup_Role_Required (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision --- PASS: TestPopulateInstanceGroup_AddTaintsCollision (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision3 --- PASS: TestPopulateInstanceGroup_AddTaintsCollision3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard --- PASS: TestPopulateInstanceGroup_EvictionHard (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard3 --- PASS: TestPopulateInstanceGroup_EvictionHard3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard4 --- PASS: TestPopulateInstanceGroup_EvictionHard4 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard2 --- PASS: TestPopulateInstanceGroup_EvictionHard2 (0.00s) === RUN TestPopulateInstanceGroup_AddTaints --- PASS: TestPopulateInstanceGroup_AddTaints (0.00s) === RUN TestMachineArchitecture === RUN TestMachineArchitecture/t2.micro-amd64 === RUN TestMachineArchitecture/t3.micro-amd64 === RUN TestMachineArchitecture/a1.large-arm64 --- PASS: TestMachineArchitecture (0.00s) --- PASS: TestMachineArchitecture/t2.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/t3.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/a1.large-arm64 (0.00s) === RUN TestRuncVersionUrlHash === RUN TestRuncVersionUrlHash/1.100.0-amd64 === RUN TestRuncVersionUrlHash/1.100.0-arm64 === RUN TestRuncVersionUrlHash/1.1.0-amd64 === RUN TestRuncVersionUrlHash/1.1.0-arm64 --- PASS: TestRuncVersionUrlHash (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionUrl === RUN TestRuncVersionUrl/1.1.0- === RUN TestRuncVersionUrl/1.1.0-arm === RUN TestRuncVersionUrl/-amd64 === RUN TestRuncVersionUrl/-arm64 === RUN TestRuncVersionUrl/1.0.0-amd64 === RUN TestRuncVersionUrl/1.0.0-arm64 === RUN TestRuncVersionUrl/1.1.0-amd64 === RUN TestRuncVersionUrl/1.1.0-arm64 --- PASS: TestRuncVersionUrl (0.00s) --- PASS: TestRuncVersionUrl/1.1.0- (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm (0.00s) --- PASS: TestRuncVersionUrl/-amd64 (0.00s) --- PASS: TestRuncVersionUrl/-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm64 (0.00s) === RUN TestRuncVersionHash === RUN TestRuncVersionHash/1.1.0- === RUN TestRuncVersionHash/1.1.0-arm === RUN TestRuncVersionHash/-amd64 === RUN TestRuncVersionHash/-arm64 === RUN TestRuncVersionHash/1.0.0-amd64 === RUN TestRuncVersionHash/1.0.0-arm64 === RUN TestRuncVersionHash/1.100.0-amd64 === RUN TestRuncVersionHash/1.100.0-arm64 === RUN TestRuncVersionHash/1.1.0-amd64 === RUN TestRuncVersionHash/1.1.0-arm64 --- PASS: TestRuncVersionHash (0.00s) --- PASS: TestRuncVersionHash/1.1.0- (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm (0.00s) --- PASS: TestRuncVersionHash/-amd64 (0.00s) --- PASS: TestRuncVersionHash/-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionsHashesAmd64 runc_test.go:240: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesAmd64 (0.00s) === RUN TestRuncVersionsHashesArm64 runc_test.go:255: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesArm64 (0.00s) === RUN Test_AssignSubnets === RUN Test_AssignSubnets/test-1 === RUN Test_AssignSubnets/test-2 I0118 08:55:25.028160 809 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-3 I0118 08:55:25.028234 809 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet a I0118 08:55:25.028252 809 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-4 I0118 08:55:25.028314 809 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet b I0118 08:55:25.028330 809 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-5 I0118 08:55:25.028391 809 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-6 I0118 08:55:25.028455 809 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-7 I0118 08:55:25.028518 809 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0118 08:55:25.028532 809 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-8 I0118 08:55:25.028591 809 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0118 08:55:25.028610 809 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-9 === RUN Test_AssignSubnets/test-10 I0118 08:55:25.028729 809 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-11 === RUN Test_AssignSubnets/test-12 I0118 08:55:25.028834 809 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-13 I0118 08:55:25.028901 809 subnets.go:205] Assigned CIDR 10.0.0.0/14 to subnet a I0118 08:55:25.028914 809 subnets.go:205] Assigned CIDR 10.4.0.0/14 to subnet b I0118 08:55:25.028927 809 subnets.go:205] Assigned CIDR 10.8.0.0/14 to subnet c I0118 08:55:25.028944 809 subnets.go:224] Assigned CIDR 10.32.0.0/11 to subnet a I0118 08:55:25.028957 809 subnets.go:224] Assigned CIDR 10.64.0.0/11 to subnet b I0118 08:55:25.028967 809 subnets.go:224] Assigned CIDR 10.96.0.0/11 to subnet b I0118 08:55:25.028980 809 subnets.go:224] Assigned CIDR 10.128.0.0/11 to subnet c I0118 08:55:25.028990 809 subnets.go:224] Assigned CIDR 10.160.0.0/11 to subnet c --- PASS: Test_AssignSubnets (0.00s) --- PASS: Test_AssignSubnets/test-1 (0.00s) --- PASS: Test_AssignSubnets/test-2 (0.00s) --- PASS: Test_AssignSubnets/test-3 (0.00s) --- PASS: Test_AssignSubnets/test-4 (0.00s) --- PASS: Test_AssignSubnets/test-5 (0.00s) --- PASS: Test_AssignSubnets/test-6 (0.00s) --- PASS: Test_AssignSubnets/test-7 (0.00s) --- PASS: Test_AssignSubnets/test-8 (0.00s) --- PASS: Test_AssignSubnets/test-9 (0.00s) --- PASS: Test_AssignSubnets/test-10 (0.00s) --- PASS: Test_AssignSubnets/test-11 (0.00s) --- PASS: Test_AssignSubnets/test-12 (0.00s) --- PASS: Test_AssignSubnets/test-13 (0.00s) === RUN Test_TemplateFunctions_CloudControllerConfigArgv === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller (0.00s) === RUN Test_KarpenterInstanceTypes I0118 08:55:25.030197 809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: Test_KarpenterInstanceTypes (0.00s) === RUN TestKopsFeatureEnabled === RUN TestKopsFeatureEnabled/Missing_feature === RUN TestKopsFeatureEnabled/Existing_feature I0118 08:55:25.030395 809 featureflag.go:164] FeatureFlag "Scaleway"=true --- PASS: TestKopsFeatureEnabled (0.00s) --- PASS: TestKopsFeatureEnabled/Missing_feature (0.00s) --- PASS: TestKopsFeatureEnabled/Existing_feature (0.00s) === RUN Test_BuildMirroredAsset === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup --- PASS: Test_BuildMirroredAsset (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup (0.00s) === RUN TestValidateFull_Default_Validates --- PASS: TestValidateFull_Default_Validates (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_NoDot --- PASS: TestValidateFull_ClusterName_InvalidDNS_NoDot (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_Invalid --- PASS: TestValidateFull_ClusterName_InvalidDNS_Invalid (0.00s) === RUN TestValidateFull_ClusterName_Required --- PASS: TestValidateFull_ClusterName_Required (0.00s) === RUN TestValidateFull_UpdatePolicy_Valid === RUN TestValidateFull_UpdatePolicy_Valid/missing === RUN TestValidateFull_UpdatePolicy_Valid/automatic === RUN TestValidateFull_UpdatePolicy_Valid/external --- PASS: TestValidateFull_UpdatePolicy_Valid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/missing (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/automatic (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/external (0.00s) === RUN TestValidateFull_UpdatePolicy_Invalid === RUN TestValidateFull_UpdatePolicy_Invalid/empty === RUN TestValidateFull_UpdatePolicy_Invalid/populated --- PASS: TestValidateFull_UpdatePolicy_Invalid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/empty (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/populated (0.00s) === RUN Test_Validate_Kubenet_With_14 --- PASS: Test_Validate_Kubenet_With_14 (0.00s) === RUN TestValidate_ClusterName_Import --- PASS: TestValidate_ClusterName_Import (0.00s) === RUN TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity --- PASS: TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup 3.025s === RUN TestGetASGTagsToDelete --- PASS: TestGetASGTagsToDelete (0.00s) === RUN TestProcessCompare --- PASS: TestProcessCompare (0.00s) === RUN TestAutoscalingGroupTerraformRender I0118 08:55:22.078630 810 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender3653882856/001 I0118 08:55:22.079237 810 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender3653882856/001 I0118 08:55:22.079431 810 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender3653882856/001 --- PASS: TestAutoscalingGroupTerraformRender (0.00s) === RUN TestTGsARNsChunks --- PASS: TestTGsARNsChunks (0.00s) === RUN TestGetEBSVolumeTagsToDelete --- PASS: TestGetEBSVolumeTagsToDelete (0.00s) === RUN TestSharedEgressOnlyInternetGatewayDoesNotRename I0118 08:55:22.082035 810 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0118 08:55:22.082100 810 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0118 08:55:22.082130 810 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] }], VpcId: "vpc-1" } I0118 08:55:22.082213 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.082294 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.082337 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.082353 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.082505 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:55:22.082530 810 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0118 08:55:22.082553 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.082592 810 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0118 08:55:22.082646 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0118 08:55:22.082698 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.082732 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.082767 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.082781 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.082807 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.082840 810 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0118 08:55:22.082889 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedEgressOnlyInternetGatewayDoesNotRename (0.00s) === RUN TestElasticIPCreate I0118 08:55:22.083046 810 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0118 08:55:22.083086 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.083178 810 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0118 08:55:22.083212 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:55:22.083235 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.083256 810 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0118 08:55:22.083305 810 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0118 08:55:22.083451 810 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0118 08:55:22.083488 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:55:22.083512 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.083533 810 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0118 08:55:22.083565 810 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:55:22.083642 810 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "eip1" }] }] } I0118 08:55:22.083675 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:55:22.083688 810 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedElasticIp", Value: "192.0.2.1" },{ Key: "AssociatedElasticIpAllocationId", Value: "eipalloc-1" }] } I0118 08:55:22.083708 810 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0118 08:55:22.083747 810 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0118 08:55:22.083770 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.083793 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.083801 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.083815 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.083827 810 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0118 08:55:22.083847 810 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0118 08:55:22.083876 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.083889 810 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0118 08:55:22.083908 810 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:55:22.083933 810 address.go:120] DescribeAddresses: { Filters: [{ Name: "public-ip", Values: ["192.0.2.1"] }] } I0118 08:55:22.083946 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0118 08:55:22.083965 810 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestElasticIPCreate (0.00s) === RUN TestSharedInternetGatewayDoesNotRename I0118 08:55:22.083996 810 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0118 08:55:22.084014 810 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0118 08:55:22.084026 810 internetgateways.go:66] CreateInternetGateway: { } I0118 08:55:22.084035 810 tags.go:42] CreateTags { Resources: ["igw-1"], Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] } I0118 08:55:22.084062 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.084082 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.084102 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.084109 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.084144 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:55:22.084157 810 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0118 08:55:22.084173 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.084225 810 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0118 08:55:22.084267 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0118 08:55:22.084298 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.084325 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.084346 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.084353 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.084369 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.084387 810 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0118 08:55:22.084416 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedInternetGatewayDoesNotRename (0.00s) === RUN TestLaunchTemplateTerraformRender I0118 08:55:22.084805 810 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender1888286039/001 I0118 08:55:22.084994 810 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender1888286039/001 --- PASS: TestLaunchTemplateTerraformRender (0.00s) === RUN TestParseRemovalRule --- PASS: TestParseRemovalRule (0.00s) === RUN TestPortRemovalRule --- PASS: TestPortRemovalRule (0.00s) === RUN TestPortRemovalRule_Zero --- PASS: TestPortRemovalRule_Zero (0.00s) === RUN TestSecurityGroupCreate I0118 08:55:22.085281 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.085306 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.085355 810 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0118 08:55:22.085378 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:55:22.085390 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.085402 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.085437 810 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0118 08:55:22.085545 810 securitygroups.go:40] CreateSecurityGroup: { Description: "Description", GroupName: "sg1", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "sg1" }] }], VpcId: "vpc-1" } I0118 08:55:22.085569 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0118 08:55:22.085591 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0118 08:55:22.085622 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.085649 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.085672 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.085680 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.085694 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.085707 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.085728 810 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0118 08:55:22.085765 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSecurityGroupCreate (0.00s) === RUN Test_Subnet_ValidateRequired --- PASS: Test_Subnet_ValidateRequired (0.00s) === RUN Test_Subnet_CannotChangeSubnet --- PASS: Test_Subnet_CannotChangeSubnet (0.00s) === RUN TestSubnetCreate I0118 08:55:22.085891 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.085913 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.085956 810 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0118 08:55:22.085974 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:55:22.085986 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.085999 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.086018 810 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0118 08:55:22.086065 810 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0118 08:55:22.086085 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:55:22.086097 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.086108 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0118 08:55:22.086143 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.086164 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.086185 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.086193 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.086205 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.086217 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.086235 810 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0118 08:55:22.086262 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.086275 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSubnetCreate (0.00s) === RUN TestSubnetCreateIPv6 I0118 08:55:22.086333 810 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0118 08:55:22.086362 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.086411 810 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0118 08:55:22.086430 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:55:22.086442 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.086455 810 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0118 08:55:22.086495 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.086581 810 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0118 08:55:22.086602 810 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0118 08:55:22.086650 810 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0118 08:55:22.086675 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:55:22.086687 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.086699 810 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0118 08:55:22.086740 810 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0118 08:55:22.086762 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.086783 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.086791 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.086805 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.086817 810 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0118 08:55:22.086835 810 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0118 08:55:22.086875 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.086923 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.086993 810 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6 (0.00s) === RUN TestSubnetCreateIPv6NetNum I0118 08:55:22.087091 810 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0118 08:55:22.087123 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.087197 810 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0118 08:55:22.087229 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:55:22.087253 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.087275 810 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0118 08:55:22.087304 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.087349 810 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0118 08:55:22.087364 810 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0118 08:55:22.087444 810 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0118 08:55:22.087474 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:55:22.087485 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.087497 810 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0118 08:55:22.087536 810 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0118 08:55:22.087559 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.087582 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.087590 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.087604 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.087616 810 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0118 08:55:22.087635 810 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0118 08:55:22.087687 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.087699 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.087722 810 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6NetNum (0.00s) === RUN TestSharedSubnetCreateDoesNotCreateNew I0118 08:55:22.087764 810 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "ExistingVPC" }] }] } I0118 08:55:22.087796 810 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "ExistingSubnet" }] }], VpcId: "vpc-1" } I0118 08:55:22.087834 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.087855 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.087873 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.087881 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.087914 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:55:22.087927 810 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0118 08:55:22.087942 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.087961 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.088019 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0118 08:55:22.088033 810 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0118 08:55:22.088048 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0118 08:55:22.088084 810 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0118 08:55:22.088105 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.088124 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.088132 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.088148 810 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0118 08:55:22.088165 810 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0118 08:55:22.088192 810 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedSubnetCreateDoesNotCreateNew (0.00s) === RUN TestVPCCreate I0118 08:55:22.088245 810 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.088266 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.088307 810 vpcs.go:89] CreateVpc: { CidrBlock: "172.21.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0118 08:55:22.088325 810 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0118 08:55:22.088344 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.088356 810 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0118 08:55:22.088377 810 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.088397 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0118 08:55:22.088418 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.088426 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.088438 810 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0118 08:55:22.088450 810 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestVPCCreate (0.00s) === RUN Test4758 --- PASS: Test4758 (0.00s) === RUN TestSharedVPCAdditionalCIDR I0118 08:55:22.088504 810 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "172.22.0.0/16", VpcId: "vpc-1" } I0118 08:55:22.088532 810 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.088552 810 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc-1"] }] } I0118 08:55:22.088573 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0118 08:55:22.088580 810 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0118 08:55:22.088596 810 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestSharedVPCAdditionalCIDR (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awstasks 0.057s === RUN TestValidateRegion --- PASS: TestValidateRegion (0.00s) === RUN TestFindRegion --- PASS: TestFindRegion (0.00s) === RUN TestEC2TagSpecification === RUN TestEC2TagSpecification/No_tags === RUN TestEC2TagSpecification/simple_tag --- PASS: TestEC2TagSpecification (0.00s) --- PASS: TestEC2TagSpecification/No_tags (0.00s) --- PASS: TestEC2TagSpecification/simple_tag (0.00s) === RUN Test_GetResourceName32 --- PASS: Test_GetResourceName32 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awsup 0.042s === RUN TestZoneToLocation === RUN TestZoneToLocation/test_case_0 === RUN TestZoneToLocation/test_case_1 === RUN TestZoneToLocation/test_case_2 --- PASS: TestZoneToLocation (0.00s) --- PASS: TestZoneToLocation/test_case_0 (0.00s) --- PASS: TestZoneToLocation/test_case_1 (0.00s) --- PASS: TestZoneToLocation/test_case_2 (0.00s) === RUN TestZoneToAvailabilityZoneNumber === RUN TestZoneToAvailabilityZoneNumber/test_case_0 === RUN TestZoneToAvailabilityZoneNumber/test_case_1 === RUN TestZoneToAvailabilityZoneNumber/test_case_2 --- PASS: TestZoneToAvailabilityZoneNumber (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_0 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_1 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_2 (0.00s) === RUN TestFindEtcdStatus --- PASS: TestFindEtcdStatus (0.00s) === RUN TestGetCloudGroups --- PASS: TestGetCloudGroups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azure 0.028s === RUN TestDiskRenderAzure I0118 08:55:22.063166 813 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRenderAzure (0.00s) === RUN TestDiskFind --- PASS: TestDiskFind (0.00s) === RUN TestDiskRun I0118 08:55:22.063482 813 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRun (0.00s) === RUN TestDiskCheckChanges === RUN TestDiskCheckChanges/test_case_0 === RUN TestDiskCheckChanges/test_case_1 === RUN TestDiskCheckChanges/test_case_2 === RUN TestDiskCheckChanges/test_case_3 --- PASS: TestDiskCheckChanges (0.00s) --- PASS: TestDiskCheckChanges/test_case_0 (0.00s) --- PASS: TestDiskCheckChanges/test_case_1 (0.00s) --- PASS: TestDiskCheckChanges/test_case_2 (0.00s) --- PASS: TestDiskCheckChanges/test_case_3 (0.00s) === RUN TestLoadBalancerRenderAzure I0118 08:55:22.063673 813 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRenderAzure (0.00s) === RUN TestLoadBalancerFind loadbalancer_test.go:124: *azuretasks.LoadBalancer {"Name":"loadbalancer","Lifecycle":"","ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Subnet":{"Name":"subnet","Lifecycle":"","ID":null,"ResourceGroup":null,"VirtualNetwork":null,"NatGateway":null,"NetworkSecurityGroup":null,"CIDR":null,"Shared":null},"External":true,"Tags":null,"ForAPIServer":false} --- PASS: TestLoadBalancerFind (0.00s) === RUN TestLoadBalancerRun I0118 08:55:22.064231 813 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRun (0.00s) === RUN TestLoadBalancerCheckChanges === RUN TestLoadBalancerCheckChanges/test_case_0 === RUN TestLoadBalancerCheckChanges/test_case_1 === RUN TestLoadBalancerCheckChanges/test_case_2 === RUN TestLoadBalancerCheckChanges/test_case_3 --- PASS: TestLoadBalancerCheckChanges (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_0 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_1 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_2 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_3 (0.00s) === RUN TestPublicIPAddressRenderAzure I0118 08:55:22.064500 813 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRenderAzure (0.00s) === RUN TestPublicIPAddressFind publicipaddress_test.go:102: *azuretasks.PublicIPAddress {"Name":"publicIPAddress","Lifecycle":"","ID":null,"ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Tags":null} --- PASS: TestPublicIPAddressFind (0.00s) === RUN TestPublicIPAddressRun I0118 08:55:22.064815 813 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRun (0.00s) === RUN TestPublicIPAddressCheckChanges === RUN TestPublicIPAddressCheckChanges/test_case_0 === RUN TestPublicIPAddressCheckChanges/test_case_1 === RUN TestPublicIPAddressCheckChanges/test_case_2 === RUN TestPublicIPAddressCheckChanges/test_case_3 --- PASS: TestPublicIPAddressCheckChanges (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_0 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_1 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_2 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_3 (0.00s) === RUN TestResourceGroupRenderAzure I0118 08:55:22.065057 813 resourcegroup.go:108] Creating a new Resource Group with name: rg I0118 08:55:22.065070 813 resourcegroup.go:110] Updating a Resource Group with name: rg --- PASS: TestResourceGroupRenderAzure (0.00s) === RUN TestResourceGroupFind --- PASS: TestResourceGroupFind (0.00s) === RUN TestResourceGroupRun I0118 08:55:22.065285 813 resourcegroup.go:108] Creating a new Resource Group with name: rg --- PASS: TestResourceGroupRun (0.00s) === RUN TestResourceGroupCheckChanges === RUN TestResourceGroupCheckChanges/test_case_0 === RUN TestResourceGroupCheckChanges/test_case_1 === RUN TestResourceGroupCheckChanges/test_case_2 === RUN TestResourceGroupCheckChanges/test_case_3 --- PASS: TestResourceGroupCheckChanges (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_0 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_1 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_2 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_3 (0.00s) === RUN TestRoleAssignmentRenderAzure --- PASS: TestRoleAssignmentRenderAzure (0.00s) === RUN TestRoleAssignmentFind --- PASS: TestRoleAssignmentFind (0.00s) === RUN TestRoleAssignmentFind_NoPrincipalID --- PASS: TestRoleAssignmentFind_NoPrincipalID (0.00s) === RUN TestRoleAssignmentCheckChanges === RUN TestRoleAssignmentCheckChanges/test_case_0 === RUN TestRoleAssignmentCheckChanges/test_case_1 === RUN TestRoleAssignmentCheckChanges/test_case_2 === RUN TestRoleAssignmentCheckChanges/test_case_3 --- PASS: TestRoleAssignmentCheckChanges (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_0 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_1 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_2 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_3 (0.00s) === RUN TestSubnetRenderAzure I0118 08:55:22.065787 813 subnet.go:126] Creating a new Subnet with name: vnet --- PASS: TestSubnetRenderAzure (0.00s) === RUN TestSubnetFind --- PASS: TestSubnetFind (0.00s) === RUN TestSubnetCheckChanges === RUN TestSubnetCheckChanges/test_case_0 === RUN TestSubnetCheckChanges/test_case_1 === RUN TestSubnetCheckChanges/test_case_2 === RUN TestSubnetCheckChanges/test_case_3 --- PASS: TestSubnetCheckChanges (0.00s) --- PASS: TestSubnetCheckChanges/test_case_0 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_1 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_2 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_3 (0.00s) === RUN TestVirtualNetworkRenderAzure I0118 08:55:22.066012 813 virtualnetwork.go:122] Creating a new Virtual Network with name: vnet --- PASS: TestVirtualNetworkRenderAzure (0.00s) === RUN TestVirtualNetworkFind --- PASS: TestVirtualNetworkFind (0.00s) === RUN TestVirtualNetworkRun I0118 08:55:22.066215 813 virtualnetwork.go:122] Creating a new Virtual Network with name: rg --- PASS: TestVirtualNetworkRun (0.00s) === RUN TestVirtualNetworkCheckChanges === RUN TestVirtualNetworkCheckChanges/test_case_0 === RUN TestVirtualNetworkCheckChanges/test_case_1 === RUN TestVirtualNetworkCheckChanges/test_case_2 === RUN TestVirtualNetworkCheckChanges/test_case_3 --- PASS: TestVirtualNetworkCheckChanges (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_0 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_1 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_2 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_3 (0.00s) === RUN TestSubnetIDParse --- PASS: TestSubnetIDParse (0.00s) === RUN TestLoadBalancerIDParse --- PASS: TestLoadBalancerIDParse (0.00s) === RUN TestVMScaleSetRenderAzure I0118 08:55:22.066547 813 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRenderAzure (0.00s) === RUN TestVMScaleSetFind --- PASS: TestVMScaleSetFind (0.00s) === RUN TestVMScaleSetRun I0118 08:55:22.066814 813 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRun (0.00s) === RUN TestVMScaleSetCheckChanges === RUN TestVMScaleSetCheckChanges/test_case_0 === RUN TestVMScaleSetCheckChanges/test_case_1 === RUN TestVMScaleSetCheckChanges/test_case_2 === RUN TestVMScaleSetCheckChanges/test_case_3 --- PASS: TestVMScaleSetCheckChanges (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_0 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_1 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_2 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_3 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azuretasks 0.035s === RUN Test_Find === RUN Test_Find/successfully_found_volume === RUN Test_Find/no_volume_found === RUN Test_Find/error_from_server --- PASS: Test_Find (0.00s) --- PASS: Test_Find/successfully_found_volume (0.00s) --- PASS: Test_Find/no_volume_found (0.00s) --- PASS: Test_Find/error_from_server (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/dotasks 0.029s === RUN TestProjectIAMBinding I0118 08:55:22.079522 815 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.079955 815 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0118 08:55:22.079972 815 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.080288 815 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0118 08:55:22.080305 815 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.080385 815 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestProjectIAMBinding (0.00s) === RUN TestServiceAccount I0118 08:55:22.080459 815 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.080523 815 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0118 08:55:22.080535 815 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.080611 815 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0118 08:55:22.080626 815 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.080656 815 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestServiceAccount (0.00s) === RUN TestStorageBucketIAM I0118 08:55:22.080721 815 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.080878 815 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0118 08:55:22.080892 815 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.081087 815 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0118 08:55:22.081103 815 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0118 08:55:22.081170 815 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestStorageBucketIAM (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/gcetasks 0.049s === RUN Test_OpenstackCloud_MakeCloud === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value --- PASS: Test_OpenstackCloud_MakeCloud (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value (0.00s) === RUN Test_OpenstackCloud_GetApiIngressStatus === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled --- PASS: Test_OpenstackCloud_GetApiIngressStatus (0.01s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled (0.00s) === RUN Test_BuildClients === RUN Test_BuildClients/Empty_openstack_spec_means_no_load_balancer === RUN Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned === RUN Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned === RUN Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned === RUN Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled --- PASS: Test_BuildClients (0.00s) --- PASS: Test_BuildClients/Empty_openstack_spec_means_no_load_balancer (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled (0.00s) === RUN Test_WaitForStatusActiveIsSuccessful --- PASS: Test_WaitForStatusActiveIsSuccessful (1.00s) === RUN Test_WaitForStatusActiveResultsInInstanceNotFound --- PASS: Test_WaitForStatusActiveResultsInInstanceNotFound (1.00s) === RUN Test_WaitForStatusActiveResultsInUnableToCreateServer --- PASS: Test_WaitForStatusActiveResultsInUnableToCreateServer (1.00s) === RUN Test_WaitForStatusActiveResultsInTimeout --- PASS: Test_WaitForStatusActiveResultsInTimeout (1.00s) === RUN TestGetMetadataFromMetadataServiceReturnsNotFoundError --- PASS: TestGetMetadataFromMetadataServiceReturnsNotFoundError (0.00s) === RUN TestGetMetadataFromMetadataService --- PASS: TestGetMetadataFromMetadataService (0.00s) === RUN TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound --- PASS: TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound (0.00s) === RUN TestGetMetadataFromConfigDrive --- PASS: TestGetMetadataFromConfigDrive (0.00s) === RUN TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound --- PASS: TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound (0.00s) === RUN TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenConfigDriveFails --- PASS: TestGetMetadataFromServiceEndpointWhenConfigDriveFails (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromConfigDriveWhenServiceEndpointFails --- PASS: TestGetMetadataFromConfigDriveWhenServiceEndpointFails (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstack 4.050s === RUN TestFilterPortsReturnsAllPorts --- PASS: TestFilterPortsReturnsAllPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPort --- PASS: TestFilterPortsReturnsOnlyTaggedPort (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPorts --- PASS: TestFilterPortsReturnsOnlyTaggedPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername --- PASS: TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil (0.00s) === RUN Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges --- PASS: Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges (0.00s) === RUN Test_Port_GetDependencies --- PASS: Test_Port_GetDependencies (0.00s) === RUN Test_NewPortTaskFromCloud === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs --- PASS: Test_NewPortTaskFromCloud (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs (0.00s) === RUN Test_Port_Find === RUN Test_Port_Find/nothing_found === RUN Test_Port_Find/port_found_no_tags === RUN Test_Port_Find/port_found_with_tags === RUN Test_Port_Find/multiple_ports_found === RUN Test_Port_Find/error_listing_ports === RUN Test_Port_Find/port_found_with_allowed_address_pairs --- PASS: Test_Port_Find (0.00s) --- PASS: Test_Port_Find/nothing_found (0.00s) --- PASS: Test_Port_Find/port_found_no_tags (0.00s) --- PASS: Test_Port_Find/port_found_with_tags (0.00s) --- PASS: Test_Port_Find/multiple_ports_found (0.00s) --- PASS: Test_Port_Find/error_listing_ports (0.00s) --- PASS: Test_Port_Find/port_found_with_allowed_address_pairs (0.00s) === RUN Test_Port_CheckChanges === RUN Test_Port_CheckChanges/actual_nil_all_required_fields_set === RUN Test_Port_CheckChanges/actual_nil_required_field_Name_nil === RUN Test_Port_CheckChanges/actual_nil_required_field_Network_nil === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set --- PASS: Test_Port_CheckChanges (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_all_required_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Name_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Network_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set (0.00s) === RUN Test_Port_RenderOpenstack === RUN Test_Port_RenderOpenstack/actual_not_nil === RUN Test_Port_RenderOpenstack/actual_nil_success === RUN Test_Port_RenderOpenstack/actual_nil_cloud_error === RUN Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success --- PASS: Test_Port_RenderOpenstack (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_not_nil (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_success (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_cloud_error (0.00s) --- PASS: Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success (0.00s) === RUN Test_Port_createOptsFromPortTask === RUN Test_Port_createOptsFromPortTask/all_fields_set === RUN Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups --- PASS: Test_Port_createOptsFromPortTask (0.00s) --- PASS: Test_Port_createOptsFromPortTask/all_fields_set (0.00s) --- PASS: Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstacktasks 0.038s === RUN TestCreateValidScalewayProfile === RUN TestCreateValidScalewayProfile/Only_environment_set === RUN TestCreateValidScalewayProfile/Only_profile_set === RUN TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID === RUN TestCreateValidScalewayProfile/Environment_should_override_whole_profile === RUN TestCreateValidScalewayProfile/Empty_profile_for_integration_tests --- PASS: TestCreateValidScalewayProfile (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_environment_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_profile_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_whole_profile (0.00s) --- PASS: TestCreateValidScalewayProfile/Empty_profile_for_integration_tests (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/scaleway 0.030s === RUN TestWriteLocalsOutputs === RUN TestWriteLocalsOutputs/empty_map === RUN TestWriteLocalsOutputs/single_output === RUN TestWriteLocalsOutputs/list_output --- PASS: TestWriteLocalsOutputs (0.00s) --- PASS: TestWriteLocalsOutputs/empty_map (0.00s) --- PASS: TestWriteLocalsOutputs/single_output (0.00s) --- PASS: TestWriteLocalsOutputs/list_output (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraform 0.028s === RUN TestGetOutputs === RUN TestGetOutputs/empty_map === RUN TestGetOutputs/single_output === RUN TestGetOutputs/list_output === RUN TestGetOutputs/duplicate_names === RUN TestGetOutputs/duplicate_values --- PASS: TestGetOutputs (0.00s) --- PASS: TestGetOutputs/empty_map (0.00s) --- PASS: TestGetOutputs/single_output (0.00s) --- PASS: TestGetOutputs/list_output (0.00s) --- PASS: TestGetOutputs/duplicate_names (0.00s) --- PASS: TestGetOutputs/duplicate_values (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter 0.004s === RUN TestKeypairDeps --- PASS: TestKeypairDeps (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/fitasks 0.028s === RUN TestArchiveDependencies --- PASS: TestArchiveDependencies (0.00s) === RUN TestBindMountCommands I0118 08:55:22.084998 821 bindmount.go:223] running mount command [mount --bind /containerized_mounter /containerized_mounter] I0118 08:55:22.085062 821 bindmount.go:232] running mount command [mount -o remount,exec /containerized_mounter] I0118 08:55:22.085069 821 bindmount.go:223] running mount command [mount --rbind /var/lib/kubelet/ /containerized_mounter/rootfs/var/lib/kubelet] I0118 08:55:22.085077 821 bindmount.go:243] running mount command [mount --make-rshared /containerized_mounter/rootfs/var/lib/kubelet] I0118 08:55:22.085083 821 bindmount.go:223] running mount command [mount --bind -o ro /proc /containerized_mounter/rootfs/proc] I0118 08:55:22.085089 821 bindmount.go:223] running mount command [mount --bind -o ro /dev /containerized_mounter/rootfs/dev] I0118 08:55:22.085095 821 bindmount.go:223] running mount command [mount --bind -o ro /etc/resolv.conf /containerized_mounter/rootfs/etc/resolv.conf] --- PASS: TestBindMountCommands (0.00s) === RUN TestBindMountDependencies --- PASS: TestBindMountDependencies (0.00s) === RUN TestFileDependencies === RUN TestFileDependencies/user === RUN TestFileDependencies/parentDir === RUN TestFileDependencies/afterFiles --- PASS: TestFileDependencies (0.00s) --- PASS: TestFileDependencies/user (0.00s) --- PASS: TestFileDependencies/parentDir (0.00s) --- PASS: TestFileDependencies/afterFiles (0.00s) === RUN TestIssueCertFileDependencies --- PASS: TestIssueCertFileDependencies (0.00s) === RUN TestLoadImageTask_Deps --- PASS: TestLoadImageTask_Deps (0.00s) === RUN TestServiceTask_Deps --- PASS: TestServiceTask_Deps (0.00s) === RUN TestServiceTask_UnknownTypes W0118 08:55:22.085395 821 service.go:110] Unhandled type *nodetasks.FakeTask in Service::GetDependencies: &{} --- PASS: TestServiceTask_UnknownTypes (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/nodeup/nodetasks 0.054s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) === RUN TestStringSlicesEqualIgnoreOrder --- PASS: TestStringSlicesEqualIgnoreOrder (0.00s) === RUN TestHashString --- PASS: TestHashString (0.00s) === RUN TestSanitizeString --- PASS: TestSanitizeString (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/utils 0.005s === RUN TestFindDistribution --- PASS: TestFindDistribution (0.00s) PASS ok k8s.io/kops/util/pkg/distributions 0.005s === RUN TestWithTee --- PASS: TestWithTee (0.00s) PASS ok k8s.io/kops/util/pkg/exec 0.005s === RUN TestNewHasher === RUN TestNewHasher/sha256 === RUN TestNewHasher/sha1 === RUN TestNewHasher/md5 --- PASS: TestNewHasher (0.00s) --- PASS: TestNewHasher/sha256 (0.00s) --- PASS: TestNewHasher/sha1 (0.00s) --- PASS: TestNewHasher/md5 (0.00s) === RUN TestMemberFromString === RUN TestMemberFromString/sha256_1 === RUN TestMemberFromString/sha256_2 === RUN TestMemberFromString/sha256_3 === RUN TestMemberFromString/sha1_1 === RUN TestMemberFromString/sha1_2 === RUN TestMemberFromString/sha1_3 === RUN TestMemberFromString/md5_1 === RUN TestMemberFromString/md5_2 === RUN TestMemberFromString/md5_3 --- PASS: TestMemberFromString (0.00s) --- PASS: TestMemberFromString/sha256_1 (0.00s) --- PASS: TestMemberFromString/sha256_2 (0.00s) --- PASS: TestMemberFromString/sha256_3 (0.00s) --- PASS: TestMemberFromString/sha1_1 (0.00s) --- PASS: TestMemberFromString/sha1_2 (0.00s) --- PASS: TestMemberFromString/sha1_3 (0.00s) --- PASS: TestMemberFromString/md5_1 (0.00s) --- PASS: TestMemberFromString/md5_2 (0.00s) --- PASS: TestMemberFromString/md5_3 (0.00s) === RUN TestFromString === RUN TestFromString/sha256 === RUN TestFromString/sha1 === RUN TestFromString/md5 === RUN TestFromString/unknown --- PASS: TestFromString (0.00s) --- PASS: TestFromString/sha256 (0.00s) --- PASS: TestFromString/sha1 (0.00s) --- PASS: TestFromString/md5 (0.00s) --- PASS: TestFromString/unknown (0.00s) PASS ok k8s.io/kops/util/pkg/hashing 0.005s === RUN TestKeys --- PASS: TestKeys (0.00s) === RUN TestSortedKeys --- PASS: TestSortedKeys (0.00s) PASS ok k8s.io/kops/util/pkg/maps 0.008s === RUN TestGetProxyEnvVars W0118 08:55:22.057783 830 proxy.go:34] EgressProxy set but no proxy host provided --- PASS: TestGetProxyEnvVars (0.00s) PASS ok k8s.io/kops/util/pkg/proxy 0.024s === RUN TestSet === RUN TestSet/simple_setting === RUN TestSet/setting_with_wildcard === RUN TestSet/creating_missing_objects === RUN TestSet/set_int === RUN TestSet/set_int32 === RUN TestSet/set_int64 === RUN TestSet/set_int_pointer === RUN TestSet/set_int32_pointer === RUN TestSet/set_int64_pointer === RUN TestSet/set_enum === RUN TestSet/set_enum_slice === RUN TestSet/append_enum_slice === RUN TestSet/set_env_var === RUN TestSet/set_env_var_with_val === RUN TestSet/set_duration --- PASS: TestSet (0.00s) --- PASS: TestSet/simple_setting (0.00s) --- PASS: TestSet/setting_with_wildcard (0.00s) --- PASS: TestSet/creating_missing_objects (0.00s) --- PASS: TestSet/set_int (0.00s) --- PASS: TestSet/set_int32 (0.00s) --- PASS: TestSet/set_int64 (0.00s) --- PASS: TestSet/set_int_pointer (0.00s) --- PASS: TestSet/set_int32_pointer (0.00s) --- PASS: TestSet/set_int64_pointer (0.00s) --- PASS: TestSet/set_enum (0.00s) --- PASS: TestSet/set_enum_slice (0.00s) --- PASS: TestSet/append_enum_slice (0.00s) --- PASS: TestSet/set_env_var (0.00s) --- PASS: TestSet/set_env_var_with_val (0.00s) --- PASS: TestSet/set_duration (0.00s) === RUN TestSetInvalidPath === RUN TestSetInvalidPath/setting_with_wildcard === RUN TestSetInvalidPath/creating_missing_objects === RUN TestSetInvalidPath/set_int === RUN TestSetInvalidPath/set_int32 === RUN TestSetInvalidPath/set_int64 --- PASS: TestSetInvalidPath (0.00s) --- PASS: TestSetInvalidPath/setting_with_wildcard (0.00s) --- PASS: TestSetInvalidPath/creating_missing_objects (0.00s) --- PASS: TestSetInvalidPath/set_int (0.00s) --- PASS: TestSetInvalidPath/set_int32 (0.00s) --- PASS: TestSetInvalidPath/set_int64 (0.00s) === RUN TestUnset === RUN TestUnset/simple_unsetting === RUN TestUnset/unsetting_with_wildcard === RUN TestUnset/uset_int === RUN TestUnset/unset_int32 === RUN TestUnset/unset_int64 === RUN TestUnset/unset_int_pointer === RUN TestUnset/unset_int32_pointer === RUN TestUnset/unset_int64_pointer === RUN TestUnset/unset_enum === RUN TestUnset/unset_enum_slice --- PASS: TestUnset (0.00s) --- PASS: TestUnset/simple_unsetting (0.00s) --- PASS: TestUnset/unsetting_with_wildcard (0.00s) --- PASS: TestUnset/uset_int (0.00s) --- PASS: TestUnset/unset_int32 (0.00s) --- PASS: TestUnset/unset_int64 (0.00s) --- PASS: TestUnset/unset_int_pointer (0.00s) --- PASS: TestUnset/unset_int32_pointer (0.00s) --- PASS: TestUnset/unset_int64_pointer (0.00s) --- PASS: TestUnset/unset_enum (0.00s) --- PASS: TestUnset/unset_enum_slice (0.00s) === RUN TestUnsetInvalidPath === RUN TestUnsetInvalidPath/usetting_with_wildcard === RUN TestUnsetInvalidPath/missing_objects --- PASS: TestUnsetInvalidPath (0.00s) --- PASS: TestUnsetInvalidPath/usetting_with_wildcard (0.00s) --- PASS: TestUnsetInvalidPath/missing_objects (0.00s) === RUN TestParseFieldPath === RUN TestParseFieldPath/test_Spec.Containers.Image === RUN TestParseFieldPath/test_Spec.Containers[0].Image === RUN TestParseFieldPath/test_Spec.Containers[*].Image --- PASS: TestParseFieldPath (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers.Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[0].Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[*].Image (0.00s) === RUN Test_Merge --- PASS: Test_Merge (0.00s) PASS ok k8s.io/kops/util/pkg/reflectutils 0.026s === RUN TestGetUniqueStrings --- PASS: TestGetUniqueStrings (0.00s) === RUN TestContains --- PASS: TestContains (0.00s) PASS ok k8s.io/kops/util/pkg/slice 0.004s === RUN TestSplitToSections --- PASS: TestSplitToSections (0.00s) PASS ok k8s.io/kops/util/pkg/text 0.003s === RUN TestAzureBlobPathBase === RUN TestAzureBlobPathBase/Test_case_0 === RUN TestAzureBlobPathBase/Test_case_1 === RUN TestAzureBlobPathBase/Test_case_2 --- PASS: TestAzureBlobPathBase (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_2 (0.00s) === RUN TestAzureBlobPathPath === RUN TestAzureBlobPathPath/Test_case_0 === RUN TestAzureBlobPathPath/Test_case_1 === RUN TestAzureBlobPathPath/Test_case_2 --- PASS: TestAzureBlobPathPath (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_2 (0.00s) === RUN TestAzureBlobPathJoin --- PASS: TestAzureBlobPathJoin (0.00s) === RUN TestCreateFile --- PASS: TestCreateFile (0.00s) === RUN TestWriteTo --- PASS: TestWriteTo (0.00s) === RUN TestMemFsCreateFile --- PASS: TestMemFsCreateFile (0.00s) === RUN TestMemFsReadDir --- PASS: TestMemFsReadDir (0.00s) === RUN TestMemFsReadTree --- PASS: TestMemFsReadTree (0.00s) === RUN Test_VFSPath --- PASS: Test_VFSPath (0.00s) === RUN Test_S3Path_Parse --- PASS: Test_S3Path_Parse (0.00s) PASS ok k8s.io/kops/util/pkg/vfs 0.028s === RUN TestGSRenderTerraform === RUN TestGSRenderTerraform/gs://foo/bar --- PASS: TestGSRenderTerraform (0.00s) --- PASS: TestGSRenderTerraform/gs://foo/bar (0.00s) === RUN TestS3RenderTerraform === RUN TestS3RenderTerraform/s3://foo/bar W0118 08:55:26.033454 1297 s3context.go:235] Unable to read bucket encryption policy for "foo" in region "us-east-1": will encrypt using AES256 --- PASS: TestS3RenderTerraform (0.00s) --- PASS: TestS3RenderTerraform/s3://foo/bar (0.00s) PASS ok k8s.io/kops/util/pkg/vfs/tests 0.052s >>> kops: Entering fakeroot... >>> kops*: Running postcheck for kops >>> kops*: Preparing package kops... >>> kops*: Stripping binaries >>> kops*: Scanning shared objects >>> kops*: Tracing dependencies... kubernetes >>> kops*: Package size: 145.5 MB >>> kops*: Compressing data... >>> kops*: Create checksum... >>> kops*: Create kops-1.28.4-r6.apk >>> kops: Build complete at Sat, 18 Jan 2025 08:58:17 +0000 elapsed time 0h 5m 0s >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Uninstalling dependencies... (1/4) Purging .makedepends-kops (20250118.085318) (2/4) Purging kubernetes (1.32.0-r1) (3/4) Purging go (1.23.5-r0) (4/4) Purging bash (5.2.37-r0) Executing bash-5.2.37-r0.pre-deinstall Executing busybox-1.37.0-r13.trigger OK: 399 MiB in 106 packages >>> kops: Updating the testing/x86_64 repository index... >>> kops: Signing the index...