This job view page is being replaced by Spyglass soon. Check out the new job view.
PRjustinsb: nodeup download should try all mirrors
ResultFAILURE
Tests 5 failed / 65 succeeded
Started2019-08-22 04:21
Elapsed2m48s
Revision
Buildergke-prow-ssd-pool-1a225945-l1d7
Refs master:54e2d9f6
7447:e0b00fb8
pod40f65e5b-c494-11e9-9618-0693243a609e
infra-commit42d4af367
pod40f65e5b-c494-11e9-9618-0693243a609e
repok8s.io/kops
repo-commitdafa4ee180b282a51cf3cb0ac0e2ddf2d088d414
repos{u'k8s.io/kops': u'master:54e2d9f645da205edb6df3a0373ea953aae5a563,7447:e0b00fb855cd2264ecf3b8e34d710ec732642cb5'}

Test Failures


//cmd/kops/go_default_test:shard_1_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_1_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 04:24:13.408507    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.408655    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.408707    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.408752    1552 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.408803    1552 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.605323    1552 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:13.605765    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:13.666597    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.666850    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.666903    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.666956    1552 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.666994    1552 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.830832    1552 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:13.831300    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:13.840578    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.840705    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.840759    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.840818    1552 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.840861    1552 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.887113    1552 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:13.887266    1552 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:13.887400    1552 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:13.887426    1552 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:13.887501    1552 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:13.887531    1552 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:13.887808    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:13.894292    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.894399    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.894460    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.894518    1552 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.894553    1552 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.922762    1552 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:13.922854    1552 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:13.922986    1552 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:13.923017    1552 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:13.923054    1552 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:13.923074    1552 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:13.923390    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:13.973145    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.973302    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.973373    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.980952    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:14.361567    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:14.504493    1552 executor.go:103] Tasks: 0 done / 90 total; 37 can run
I0822 04:24:14.523935    1552 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:14.523965    1552 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:14.523986    1552 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:14.540033    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:14.593964    1552 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:14.596609    1552 executor.go:103] Tasks: 37 done / 90 total; 25 can run
W0822 04:24:14.599561    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.599942    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.600026    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.600726    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.600910    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.601016    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
I0822 04:24:14.608193    1552 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:14.664066    1552 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:14.677540    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:14.680225    1552 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:14.684426    1552 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:14.705719    1552 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:14.707391    1552 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:14.708501    1552 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:14.710653    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:14.723197    1552 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:14.724991    1552 executor.go:103] Tasks: 62 done / 90 total; 24 can run
I0822 04:24:14.725396    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.725605    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.729269    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.729432    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.731008    1552 executor.go:103] Tasks: 86 done / 90 total; 3 can run
I0822 04:24:14.731568    1552 executor.go:103] Tasks: 89 done / 90 total; 1 can run
I0822 04:24:14.731767    1552 executor.go:103] Tasks: 90 done / 90 total; 0 can run
I0822 04:24:14.742417    1552 target.go:312] Terraform output is in /tmp/test556637835/out
I0822 04:24:14.762514    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:14.765095    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:14.765178    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:14.770790    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:14.809587    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:14.950417    1552 executor.go:103] Tasks: 0 done / 90 total; 37 can run
I0822 04:24:14.951773    1552 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:14.951797    1552 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:14.951826    1552 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:14.975838    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:14.988761    1552 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:14.993664    1552 executor.go:103] Tasks: 37 done / 90 total; 25 can run
W0822 04:24:14.995609    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.995907    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.996034    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.996657    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.997023    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
W0822 04:24:14.997162    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder
I0822 04:24:15.008653    1552 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:15.008757    1552 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:15.016128    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:15.016418    1552 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:15.058980    1552 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:15.060044    1552 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:15.062279    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:15.064813    1552 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:15.066160    1552 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:15.069082    1552 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:15.070612    1552 executor.go:103] Tasks: 62 done / 90 total; 24 can run
I0822 04:24:15.071600    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.071759    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.071665    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.072107    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.074140    1552 executor.go:103] Tasks: 86 done / 90 total; 3 can run
I0822 04:24:15.074637    1552 executor.go:103] Tasks: 89 done / 90 total; 1 can run
I0822 04:24:15.074792    1552 executor.go:103] Tasks: 90 done / 90 total; 0 can run
I0822 04:24:15.101935    1552 target.go:312] Terraform output is in /tmp/test308181749/out
I0822 04:24:15.105829    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:15.105968    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:15.106017    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:15.142822    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:15.217078    1552 zones.go:91] ListHostedZonesPages {

}
W0822 04:24:15.404008    1552 firewall.go:250] Opening etcd port on masters for access from the nodes, for calico.  This is unsafe in untrusted environments.
I0822 04:24:15.414049    1552 executor.go:103] Tasks: 0 done / 110 total; 41 can run
I0822 04:24:15.416069    1552 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:15.416091    1552 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:15.416107    1552 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:15.433861    1552 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:15.434278    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:15.435881    1552 executor.go:103] Tasks: 41 done / 110 total; 32 can run
W0822 04:24:15.436570    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 04:24:15.436843    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 04:24:15.437018    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 04:24:15.445173    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 04:24:15.474199    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
I0822 04:24:15.455270    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
W0822 04:24:15.474544    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
I0822 04:24:15.461984    1552 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:15.476081    1552 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:15.476214    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:15.462492    1552 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:15.468651    1552 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:15.473965    1552 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:15.482454    1552 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:15.484071    1552 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:15.501296    1552 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:15.515490    1552 executor.go:103] Tasks: 73 done / 110 total; 29 can run
I0822 04:24:15.516574    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.516846    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.519897    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.520032    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.520147    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.520223    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.521808    1552 executor.go:103] Tasks: 102 done / 110 total; 5 can run
I0822 04:24:15.522488    1552 executor.go:103] Tasks: 107 done / 110 total; 3 can run
I0822 04:24:15.522738    1552 executor.go:103] Tasks: 110 done / 110 total; 0 can run
I0822 04:24:15.579751    1552 target.go:312] Terraform output is in /tmp/test148674287/out
I0822 04:24:15.581923    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:15.581972    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:15.581999    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:15.621781    1552 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 04:24:15.671898    1552 zones.go:91] ListHostedZonesPages {

}
W0822 04:24:15.873490    1552 firewall.go:250] Opening etcd port on masters for access from the nodes, for calico.  This is unsafe in untrusted environments.
I0822 04:24:15.883508    1552 executor.go:103] Tasks: 0 done / 110 total; 41 can run
I0822 04:24:15.884075    1552 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:15.884096    1552 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:15.884116    1552 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:15.888977    1552 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:15.890554    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:15.891690    1552 executor.go:103] Tasks: 41 done / 110 total; 32 can run
W0822 04:24:15.894541    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 04:24:15.894691    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 04:24:15.894762    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 04:24:15.895019    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 04:24:15.895142    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
W0822 04:24:15.895192    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder
I0822 04:24:15.928708    1552 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:15.941302    1552 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:15.969227    1552 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:15.980875    1552 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:15.995363    1552 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:15.997791    1552 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:16.013820    1552 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:16.017331    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:16.023519    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:16.026742    1552 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:16.028130    1552 executor.go:103] Tasks: 73 done / 110 total; 29 can run
I0822 04:24:16.028772    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.028773    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.028955    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.029010    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.029088    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.028894    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.033248    1552 executor.go:103] Tasks: 102 done / 110 total; 5 can run
I0822 04:24:16.034010    1552 executor.go:103] Tasks: 107 done / 110 total; 3 can run
I0822 04:24:16.034279    1552 executor.go:103] Tasks: 110 done / 110 total; 0 can run
I0822 04:24:16.128723    1552 target.go:312] Terraform output is in /tmp/test238881529/out
I0822 04:24:16.130686    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.130784    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.130835    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.145481    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.184129    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.280424    1552 executor.go:103] Tasks: 0 done / 90 total; 39 can run
I0822 04:24:16.290303    1552 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:16.300595    1552 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:16.300682    1552 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:16.309847    1552 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:16.313628    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:16.314990    1552 executor.go:103] Tasks: 39 done / 90 total; 27 can run
W0822 04:24:16.315132    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 04:24:16.315293    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 04:24:16.315371    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 04:24:16.326580    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 04:24:16.326795    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 04:24:16.326908    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
I0822 04:24:16.332954    1552 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:16.335348    1552 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:16.340259    1552 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:16.351003    1552 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:16.370050    1552 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:16.371048    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:16.380272    1552 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:16.408739    1552 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:16.412536    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:16.428143    1552 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:16.449348    1552 executor.go:103] Tasks: 66 done / 90 total; 20 can run
I0822 04:24:16.450048    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.450164    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.451465    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.451567    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.452705    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.452815    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.454125    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.454214    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.457559    1552 executor.go:103] Tasks: 86 done / 90 total; 4 can run
I0822 04:24:16.458035    1552 executor.go:103] Tasks: 90 done / 90 total; 0 can run
I0822 04:24:16.474547    1552 target.go:312] Terraform output is in /tmp/test661330323/out
I0822 04:24:16.475949    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.476001    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.476030    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.500701    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.540867    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.640695    1552 executor.go:103] Tasks: 0 done / 80 total; 35 can run
W0822 04:24:16.641822    1552 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 04:24:16.641855    1552 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.additionalcidr.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:16.641893    1552 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.additionalcidr.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 04:24:16.643006    1552 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 04:24:16.643035    1552 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:16.643056    1552 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
I0822 04:24:16.686898    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:16.691428    1552 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:16.692988    1552 executor.go:103] Tasks: 35 done / 80 total; 26 can run
W0822 04:24:16.694631    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 04:24:16.710560    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
I0822 04:24:16.717662    1552 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:16.730486    1552 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
W0822 04:24:16.732056    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
W0822 04:24:16.732644    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionalcidr.example.com" for IAM policy builder
I0822 04:24:16.744908    1552 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:16.746215    1552 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:16.747719    1552 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:16.744946    1552 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:16.757191    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:16.764526    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:16.773660    1552 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:16.779380    1552 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:16.780972    1552 executor.go:103] Tasks: 61 done / 80 total; 17 can run
I0822 04:24:16.781258    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.781363    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.782649    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.782775    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.785486    1552 executor.go:103] Tasks: 78 done / 80 total; 2 can run
I0822 04:24:16.785857    1552 executor.go:103] Tasks: 80 done / 80 total; 0 can run
I0822 04:24:16.788525    1552 target.go:171] Cloudformation output is in /tmp/test240376637/out
--- FAIL: TestAdditionalCIDR (0.69s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1bmastersadditionalcidrexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/additional_cidr/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesadditionalcidrexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/additional_cidr/cloudformation.json.extracted.yaml
I0822 04:24:16.816882    1552 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.817003    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.817036    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.825048    1552 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.7.16
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.7.16

*********************************************************************************

I0822 04:24:16.863806    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.936800    1552 executor.go:103] Tasks: 0 done / 75 total; 34 can run
I0822 04:24:16.937219    1552 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 04:24:16.937364    1552 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:16.937422    1552 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 04:24:16.937518    1552 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:16.937596    1552 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 04:24:16.940764    1552 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:16.940811    1552 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsSupport",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.940832    1552 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsHostnames",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.942841    1552 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "masters.sharedvpc.example.com"
}
I0822 04:24:16.946637    1552 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "nodes.sharedvpc.example.com"
}
I0822 04:24:16.941428    1552 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-main.sharedvpc.example.com"]
    }]
}
I0822 04:24:16.948433    1552 volumes.go:33] CreateVolume: {
  AvailabilityZone: "us-test-1a",
  Encrypted: false,
  Size: 20,
  TagSpecifications: [{
      ResourceType: "volume",
      Tags: [
        {
          Key: "k8s.io/role/master",
          Value: "1"
        },
        {
          Key: "kubernetes.io/cluster/sharedvpc.example.com",
          Value: "owned"
        },
        {
          Key: "Name",
          Value: "us-test-1a.etcd-main.sharedvpc.example.com"
        },
        {
          Key: "KubernetesCluster",
          Value: "sharedvpc.example.com"
        },
        {
          Key: "k8s.io/etcd/main",
          Value: "us-test-1a/us-test-1a"
        }
      ]
    }],
  VolumeType: "gp2"
}
I0822 04:24:16.948572    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-1"]
    }]
}
I0822 04:24:16.948615    1552 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-events.sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:16.948736    1552 volumes.go:33] CreateVolume: {
  AvailabilityZone: "us-test-1a",
  Encrypted: false,
  Size: 20,
  TagSpecifications: [{
      ResourceType: "volume",
      Tags: [
        {
          Key: "k8s.io/etcd/events",
          Value: "us-test-1a/us-test-1a"
        },
        {
          Key: "k8s.io/role/master",
          Value: "1"
        },
        {
          Key: "kubernetes.io/cluster/sharedvpc.example.com",
          Value: "owned"
        },
        {
          Key: "Name",
          Value: "us-test-1a.etcd-events.sharedvpc.example.com"
        },
        {
          Key: "KubernetesCluster",
          Value: "sharedvpc.example.com"
        }
      ]
    }],
  VolumeType: "gp2"
}
I0822 04:24:16.948816    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-2"]
    }]
}
I0822 04:24:16.965420    1552 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:16.967814    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:16.972628    1552 executor.go:103] Tasks: 34 done / 75 total; 23 can run
W0822 04:24:16.974621    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
W0822 04:24:16.974814    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
I0822 04:24:16.974895    1552 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:DescribeInstances\",\n        \"ec2:DescribeRegions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ChangeResourceRecordSets\",\n        \"route53:ListResourceRecordSets\",\n        \"route53:GetHostedZone\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:GetChange\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::change/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ecr:GetAuthorizationToken\",\n        \"ecr:BatchCheckLayerAvailability\",\n        \"ecr:GetDownloadUrlForLayer\",\n        \"ecr:GetRepositoryPolicy\",\n        \"ecr:DescribeRepositories\",\n        \"ecr:ListImages\",\n        \"ecr:BatchGetImage\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "nodes.sharedvpc.example.com",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 04:24:16.975534    1552 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
W0822 04:24:16.976008    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
W0822 04:24:16.976225    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
I0822 04:24:16.976342    1552 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:*\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"autoscaling:DescribeAutoScalingGroups\",\n        \"autoscaling:DescribeAutoScalingInstances\",\n        \"autoscaling:DescribeLaunchConfigurations\",\n        \"autoscaling:DescribeTags\",\n        \"autoscaling:SetDesiredCapacity\",\n        \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n        \"autoscaling:UpdateAutoScalingGroup\",\n        \"ec2:DescribeLaunchTemplateVersions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:*\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"iam:ListServerCertificates\",\n        \"iam:GetServerCertificate\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ChangeResourceRecordSets\",\n        \"route53:ListResourceRecordSets\",\n        \"route53:GetHostedZone\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:GetChange\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::change/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ecr:GetAuthorizationToken\",\n        \"ecr:BatchCheckLayerAvailability\",\n        \"ecr:GetDownloadUrlForLayer\",\n        \"ecr:GetRepositoryPolicy\",\n        \"ecr:DescribeRepositories\",\n        \"ecr:ListImages\",\n        \"ecr:BatchGetImage\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "masters.sharedvpc.example.com",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 04:24:16.977572    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["nodes.sharedvpc.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["nodes.sharedvpc.example.com"]
    }
  ]
}
I0822 04:24:16.977760    1552 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for nodes",
  GroupName: "nodes.sharedvpc.example.com",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.977826    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:16.977864    1552 tags.go:48] CreateTags {
  Resources: ["sg-1"],
  Tags: [{
      Key: "Name",
      Value: "nodes.sharedvpc.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "sharedvpc.example.com"
    },{
      Key: "kubernetes.io/cluster/sharedvpc.example.com",
      Value: "owned"
    }]
}
I0822 04:24:16.977913    1552 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 04:24:16.978055    1552 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "nodes.sharedvpc.example.com",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 04:24:16.979939    1552 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:16.985593    1552 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:16.986920    1552 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag:Name",
      Values: ["sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:16.989480    1552 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/sharedvpc.example.com"]
    },{
      Name: "tag:kubernetes.io/kops/role",
      Values: ["public"]
    }]
}
I0822 04:24:16.989600    1552 routetable.go:107] CreateRouteTable: {
  VpcId: "vpc-12345678"
}
I0822 04:24:16.989628    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["rtb-1"]
    }]
}
I0822 04:24:16.989659    1552 tags.go:48] CreateTags {
  Resources: ["rtb-1"],
  Tags: [
    {
      Key: "kubernetes.io/cluster/sharedvpc.example.com",
      Value: "owned"
    },
    {
      Key: "kubernetes.io/kops/role",
      Value: "public"
    },
    {
      Key: "Name",
      Value: "sharedvpc.example.com"
    },
    {
      Key: "KubernetesCluster",
      Value: "sharedvpc.example.com"
    }
  ]
}
I0822 04:24:16.989764    1552 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },{
      Name: "tag:Name",
      Values: ["us-test-1a.sharedvpc.example.com"]
    }]
}
I0822 04:24:16.989899    1552 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "172.20.32.0/19",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.989925    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-1"]
    }]
}
I0822 04:24:16.989946    1552 tags.go:48] CreateTags {
  Resources: ["subnet-1"],
  Tags: [
    {
      Key: "kubernetes.io/role/elb",
      Value: "1"
    },
    {
      Key: "Name",
      Value: "us-test-1a.sharedvpc.example.com"
    },
    {
      Key: "KubernetesCluster",
      Value: "sharedvpc.example.com"
    },
    {
      Key: "kubernetes.io/cluster/sharedvpc.example.com",
      Value: "owned"
    },
    {
      Key: "SubnetType",
      Value: "Public"
    }
  ]
}
I0822 04:24:16.991992    1552 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:16.994740    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:16.997061    1552 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "masters.sharedvpc.example.com",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 04:24:16.997190    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["masters.sharedvpc.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["masters.sharedvpc.example.com"]
    }
  ]
}
I0822 04:24:16.997362    1552 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for masters",
  GroupName: "masters.sharedvpc.example.com",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.997400    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:16.997434    1552 tags.go:48] CreateTags {
  Resources: ["sg-2"],
  Tags: [{
      Key: "kubernetes.io/cluster/sharedvpc.example.com",
      Value: "owned"
    },{
      Key: "Name",
      Value: "masters.sharedvpc.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "sharedvpc.example.com"
    }]
}
I0822 04:24:16.997520    1552 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
I0822 04:24:17.000122    1552 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:17.016888    1552 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:17.018396    1552 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:17.021831    1552 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:17.040151    1552 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:17.048413    1552 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:17.051645    1552 executor.go:103] Tasks: 57 done / 75 total; 16 can run
I0822 04:24:17.051765    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.051925    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 4003,
      IpProtocol: "tcp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 04:24:17.052120    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.052190    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.052517    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.052645    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 443,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 443
    }]
}
I0822 04:24:17.052715    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.052799    1552 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-2",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 04:24:17.052860    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.052950    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 1,
      IpProtocol: "udp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 04:24:17.053082    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.053148    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.053523    1552 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 04:24:17.053619    1552 routetable.go:149] CreateRoute: {
  DestinationCidrBlock: "0.0.0.0/0",
  GatewayId: "igw-1",
  RouteTableId: "rtb-1"
}
I0822 04:24:17.053679    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.053765    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
I0822 04:24:17.053816    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.053890    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    }]
}
I0822 04:24:17.053944    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.054022    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    }]
}
I0822 04:24:17.054072    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.054150    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 2382,
      IpProtocol: "tcp",
      ToPort: 4000,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 04:24:17.054199    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.054270    1552 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 04:24:17.054329    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.054405    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 1,
      IpProtocol: "tcp",
      ToPort: 2379,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 04:24:17.054530    1552 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 04:24:17.054610    1552 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "association.subnet-id",
      Values: ["subnet-1"]
    }]
}
I0822 04:24:17.054672    1552 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-1",
  SubnetId: "subnet-1"
}
I0822 04:24:17.054723    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.054815    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
I0822 04:24:17.055488    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.055604    1552 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 04:24:17.055930    1552 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: true,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 128,
        VolumeType: "gp2"
      }
    }],
  IamInstanceProfile: "nodes.sharedvpc.example.com",
  ImageId: "ami-12345678",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "t2.medium",
  KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "nodes.sharedvpc.example.com-20190822042417",
  SecurityGroups: ["sg-1"],
  UserData: "#!/bin/bash
# Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

set -o errexit
set -o nounset
set -o pipefail

NODEUP_URL=https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-nodeup,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/nodeup
NODEUP_HASH=bb41724c37d15ab7e039e06230e742b9b38d0808

export AWS_REGION=us-test-1




function ensure-install-dir() {
  INSTALL_DIR="/var/cache/kubernetes-install"
  # On ContainerOS, we install to /var/lib/toolbox install (because of noexec)
  if [[ -d /var/lib/toolbox ]]; then
    INSTALL_DIR="/var/lib/toolbox/kubernetes-install"
  fi
  mkdir -p ${INSTALL_DIR}
  cd ${INSTALL_DIR}
}

# Retry a download until we get it. Takes a hash and a set of URLs.
#
# $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
# $2+ are the URLs to download.
download-or-bust() {
  local -r hash="$1"
  shift 1

  urls=( $* )
  while true; do
    for url in "${urls[@]}"; do
      local file="${url##*/}"

      if [[ -e "${file}" ]]; then
        echo "== File exists for ${url} =="

      # CoreOS runs this script in a container without which (but has curl)
      # Note also that busybox wget doesn't support wget --version, but busybox doesn't normally have curl
      # So we default to wget unless we see curl
      elif [[ $(curl --version) ]]; then
        if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
          echo "== Failed to curl ${url}. Retrying. =="
          continue
        fi
      else
        if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
          echo "== Failed to wget ${url}. Retrying. =="
          continue
        fi
      fi

      if [[ -n "${hash}" ]] && ! validate-hash "${file}" "${hash}"; then
        echo "== Hash validation of ${url} failed. Retrying. =="
        rm -f "${file}"
      else
        if [[ -n "${hash}" ]]; then
          echo "== Downloaded ${url} (SHA1 = ${hash}) =="
        else
          echo "== Downloaded ${url} =="
        fi
        return
      fi
    done

    echo "All downloads failed; sleeping before retrying"
    sleep 60
  done
}

validate-hash() {
  local -r file="$1"
  local -r expected="$2"
  local actual

  actual=$(sha1sum ${file} | awk '{ print $1 }') || true
  if [[ "${actual}" != "${expected}" ]]; then
    echo "== ${file} corrupted, sha1 ${actual} doesn't match expected ${expected} =="
    return 1
  fi
}

function split-commas() {
  echo $1 | tr "," "\n"
}

function try-download-release() {
  # TODO(zmerlynn): Now we REALLY have no excuse not to do the reboot
  # optimization.

  local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
  local -r nodeup_filename="${nodeup_urls[0]##*/}"
  if [[ -n "${NODEUP_HASH:-}" ]]; then
    local -r nodeup_hash="${NODEUP_HASH}"
  else
  # TODO: Remove?
    echo "Downloading sha1 (not found in env)"
    download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
    local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
  fi

  echo "Downloading nodeup (${nodeup_urls[@]})"
  download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"

  chmod +x nodeup
}

function download-release() {
  # In case of failure checking integrity of release, retry.
  until try-download-release; do
    sleep 15
    echo "Couldn't download release. Retrying..."
  done

  echo "Running nodeup"
  # We can't run in the foreground because of https://github.com/docker/docker/issues/23793
  ( cd ${INSTALL_DIR}; ./nodeup --install-systemd-unit --conf=${INSTALL_DIR}/kube_env.yaml --v=8  )
}

####################################################################################

/bin/systemd-machine-id-setup || echo "failed to set up ensure machine-id configured"

echo "== nodeup node config starting =="
ensure-install-dir

cat > cluster_spec.yaml << '__EOF_CLUSTER_SPEC'
cloudConfig: null
docker:
  ipMasq: false
  ipTables: false
  logDriver: json-file
  logLevel: warn
  logOpt:
  - max-size=10m
  - max-file=5
  storage: overlay,aufs
  version: 1.12.6
kubeProxy:
  clusterCIDR: 100.96.0.0/11
  cpuRequest: 100m
  hostnameOverride: '@aws'
  image: gcr.io/google_containers/kube-proxy:v1.7.12
  logLevel: 2
kubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginMTU: 9001
  networkPluginName: kubenet
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  requireKubeconfig: true

__EOF_CLUSTER_SPEC

cat > ig_spec.yaml << '__EOF_IG_SPEC'
kubelet: null
nodeLabels: null
taints: null

__EOF_IG_SPEC

cat > kube_env.yaml << '__EOF_KUBE_ENV'
Assets:
- 46df13bed113e2a157103e1d718c2518f9e76250@https://storage.googleapis.com/kubernetes-release/release/v1.7.12/bin/linux/amd64/kubelet
- 385229d4189e4f7978de42f237d6c443c0534edd@https://storage.googleapis.com/kubernetes-release/release/v1.7.12/bin/linux/amd64/kubectl
- 1d9788b0f5420e1a219aad2cb8681823fc515e7c@https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz
- 42b15a0a0a56531750bde3c7b08d0cf27c170c48@https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-utils.tar.gz,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/utils.tar.gz
ClusterName: sharedvpc.example.com
ConfigBase: memfs://clusters.example.com/sharedvpc.example.com
InstanceGroupName: nodes
Tags:
- _automatic_upgrades
- _aws
channels:
- memfs://clusters.example.com/sharedvpc.example.com/addons/bootstrap-channel.yaml
protokubeImage:
  hash: 0b1f26208f8f6cc02468368706d0236670fec8a2
  name: protokube:1.8.1
  sources:
  - https://github.com/kubernetes/kops/releases/download/1.8.1/images-protokube.tar.gz
  - https://kubeupv2.s3.amazonaws.com/kops/1.8.1/images/protokube.tar.gz

__EOF_KUBE_ENV

download-release
echo "== nodeup node config done =="
"
}
I0822 04:24:17.058123    1552 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: true,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 64,
        VolumeType: "gp2"
      }
    },{
      DeviceName: "/dev/sdc",
      VirtualName: "ephemeral0"
    }],
  IamInstanceProfile: "masters.sharedvpc.example.com",
  ImageId: "ami-12345678",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "m3.medium",
  KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "master-us-test-1a.masters.sharedvpc.example.com-20190822042417",
  SecurityGroups: ["sg-2"],
  UserData: "#!/bin/bash
# Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

set -o errexit
set -o nounset
set -o pipefail

NODEUP_URL=https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-nodeup,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/nodeup
NODEUP_HASH=bb41724c37d15ab7e039e06230e742b9b38d0808

export AWS_REGION=us-test-1




function ensure-install-dir() {
  INSTALL_DIR="/var/cache/kubernetes-install"
  # On ContainerOS, we install to /var/lib/toolbox install (because of noexec)
  if [[ -d /var/lib/toolbox ]]; then
    INSTALL_DIR="/var/lib/toolbox/kubernetes-install"
  fi
  mkdir -p ${INSTALL_DIR}
  cd ${INSTALL_DIR}
}

# Retry a download until we get it. Takes a hash and a set of URLs.
#
# $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
# $2+ are the URLs to download.
download-or-bust() {
  local -r hash="$1"
  shift 1

  urls=( $* )
  while true; do
    for url in "${urls[@]}"; do
      local file="${url##*/}"

      if [[ -e "${file}" ]]; then
        echo "== File exists for ${url} =="

      # CoreOS runs this script in a container without which (but has curl)
      # Note also that busybox wget doesn't support wget --version, but busybox doesn't normally have curl
      # So we default to wget unless we see curl
      elif [[ $(curl --version) ]]; then
        if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
          echo "== Failed to curl ${url}. Retrying. =="
          continue
        fi
      else
        if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
          echo "== Failed to wget ${url}. Retrying. =="
          continue
        fi
      fi

      if [[ -n "${hash}" ]] && ! validate-hash "${file}" "${hash}"; then
        echo "== Hash validation of ${url} failed. Retrying. =="
        rm -f "${file}"
      else
        if [[ -n "${hash}" ]]; then
          echo "== Downloaded ${url} (SHA1 = ${hash}) =="
        else
          echo "== Downloaded ${url} =="
        fi
        return
      fi
    done

    echo "All downloads failed; sleeping before retrying"
    sleep 60
  done
}

validate-hash() {
  local -r file="$1"
  local -r expected="$2"
  local actual

  actual=$(sha1sum ${file} | awk '{ print $1 }') || true
  if [[ "${actual}" != "${expected}" ]]; then
    echo "== ${file} corrupted, sha1 ${actual} doesn't match expected ${expected} =="
    return 1
  fi
}

function split-commas() {
  echo $1 | tr "," "\n"
}

function try-download-release() {
  # TODO(zmerlynn): Now we REALLY have no excuse not to do the reboot
  # optimization.

  local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
  local -r nodeup_filename="${nodeup_urls[0]##*/}"
  if [[ -n "${NODEUP_HASH:-}" ]]; then
    local -r nodeup_hash="${NODEUP_HASH}"
  else
  # TODO: Remove?
    echo "Downloading sha1 (not found in env)"
    download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
    local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
  fi

  echo "Downloading nodeup (${nodeup_urls[@]})"
  download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"

  chmod +x nodeup
}

function download-release() {
  # In case of failure checking integrity of release, retry.
  until try-download-release; do
    sleep 15
    echo "Couldn't download release. Retrying..."
  done

  echo "Running nodeup"
  # We can't run in the foreground because of https://github.com/docker/docker/issues/23793
  ( cd ${INSTALL_DIR}; ./nodeup --install-systemd-unit --conf=${INSTALL_DIR}/kube_env.yaml --v=8  )
}

####################################################################################

/bin/systemd-machine-id-setup || echo "failed to set up ensure machine-id configured"

echo "== nodeup node config starting =="
ensure-install-dir

cat > cluster_spec.yaml << '__EOF_CLUSTER_SPEC'
cloudConfig: null
docker:
  ipMasq: false
  ipTables: false
  logDriver: json-file
  logLevel: warn
  logOpt:
  - max-size=10m
  - max-file=5
  storage: overlay,aufs
  version: 1.12.6
encryptionConfig: null
etcdClusters:
  events:
    image: gcr.io/google_containers/etcd:2.2.1
    version: 2.2.1
  main:
    image: gcr.io/google_containers/etcd:2.2.1
    version: 2.2.1
kubeAPIServer:
  address: 127.0.0.1
  admissionControl:
  - Initializers
  - NamespaceLifecycle
  - LimitRanger
  - ServiceAccount
  - PersistentVolumeLabel
  - DefaultStorageClass
  - DefaultTolerationSeconds
  - NodeRestriction
  - ResourceQuota
  allowPrivileged: true
  anonymousAuth: false
  apiServerCount: 1
  authorizationMode: AlwaysAllow
  cloudProvider: aws
  etcdServers:
  - http://127.0.0.1:4001
  etcdServersOverrides:
  - /events#http://127.0.0.1:4002
  image: gcr.io/google_containers/kube-apiserver:v1.7.12
  insecurePort: 8080
  kubeletPreferredAddressTypes:
  - InternalIP
  - Hostname
  - ExternalIP
  logLevel: 2
  requestheaderAllowedNames:
  - aggregator
  requestheaderExtraHeaderPrefixes:
  - X-Remote-Extra-
  requestheaderGroupHeaders:
  - X-Remote-Group
  requestheaderUsernameHeaders:
  - X-Remote-User
  securePort: 443
  serviceClusterIPRange: 100.64.0.0/13
  storageBackend: etcd2
kubeControllerManager:
  allocateNodeCIDRs: true
  attachDetachReconcileSyncPeriod: 1m0s
  cloudProvider: aws
  clusterCIDR: 100.96.0.0/11
  clusterName: sharedvpc.example.com
  configureCloudRoutes: true
  image: gcr.io/google_containers/kube-controller-manager:v1.7.12
  leaderElection:
    leaderElect: true
  logLevel: 2
  useServiceAccountCredentials: true
kubeProxy:
  clusterCIDR: 100.96.0.0/11
  cpuRequest: 100m
  hostnameOverride: '@aws'
  image: gcr.io/google_containers/kube-proxy:v1.7.12
  logLevel: 2
kubeScheduler:
  image: gcr.io/google_containers/kube-scheduler:v1.7.12
  leaderElection:
    leaderElect: true
  logLevel: 2
kubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginMTU: 9001
  networkPluginName: kubenet
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  requireKubeconfig: true
masterKubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginMTU: 9001
  networkPluginName: kubenet
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  registerSchedulable: false
  requireKubeconfig: true

__EOF_CLUSTER_SPEC

cat > ig_spec.yaml << '__EOF_IG_SPEC'
kubelet: null
nodeLabels: null
taints: null

__EOF_IG_SPEC

cat > kube_env.yaml << '__EOF_KUBE_ENV'
Assets:
- 46df13bed113e2a157103e1d718c2518f9e76250@https://storage.googleapis.com/kubernetes-release/release/v1.7.12/bin/linux/amd64/kubelet
- 385229d4189e4f7978de42f237d6c443c0534edd@https://storage.googleapis.com/kubernetes-release/release/v1.7.12/bin/linux/amd64/kubectl
- 1d9788b0f5420e1a219aad2cb8681823fc515e7c@https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz
- 42b15a0a0a56531750bde3c7b08d0cf27c170c48@https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-utils.tar.gz,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/utils.tar.gz
ClusterName: sharedvpc.example.com
ConfigBase: memfs://clusters.example.com/sharedvpc.example.com
InstanceGroupName: master-us-test-1a
Tags:
- _automatic_upgrades
- _aws
channels:
- memfs://clusters.example.com/sharedvpc.example.com/addons/bootstrap-channel.yaml
protokubeImage:
  hash: 0b1f26208f8f6cc02468368706d0236670fec8a2
  name: protokube:1.8.1
  sources:
  - https://github.com/kubernetes/kops/releases/download/1.8.1/images-protokube.tar.gz
  - https://kubeupv2.s3.amazonaws.com/kops/1.8.1/images/protokube.tar.gz

__EOF_KUBE_ENV

download-release
echo "== nodeup node config done =="
"
}
I0822 04:24:17.058689    1552 executor.go:103] Tasks: 73 done / 75 total; 2 can run
I0822 04:24:17.058923    1552 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "nodes.sharedvpc.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 04:24:17.059093    1552 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "master-us-test-1a.masters.sharedvpc.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 04:24:17.059158    1552 executor.go:103] Tasks: 75 done / 75 total; 0 can run
I0822 04:24:17.059179    1552 dns.go:155] Pre-creating DNS records
I0822 04:24:17.059193    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:17.059217    1552 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 04:24:17.059259    1552 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [
      {
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "api.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "etcd-us-test-1a.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "etcd-events-us-test-1a.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "api.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      }
    ]
  },
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 04:24:17.063929    1552 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.7.16
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.7.16

*********************************************************************************

I0822 04:24:17.103784    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:17.171063    1552 executor.go:103] Tasks: 0 done / 75 total; 34 can run
I0822 04:24:17.171347    1552 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-events.sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.172696    1552 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:17.172848    1552 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:17.172919    1552 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:17.172941    1552 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsSupport",
  VpcId: "vpc-12345678"
}
I0822 04:24:17.172955    1552 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsHostnames",
  VpcId: "vpc-12345678"
}
I0822 04:24:17.172976    1552 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-main.sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.173123    1552 executor.go:103] Tasks: 34 done / 75 total; 23 can run
W0822 04:24:17.177564    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
I0822 04:24:17.178614    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },
    {
      Name: "tag:Name",
      Values: ["nodes.sharedvpc.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["nodes.sharedvpc.example.com"]
    }
  ]
}
I0822 04:24:17.178780    1552 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 04:24:17.178860    1552 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:17.178970    1552 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag:Name",
      Values: ["sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.179603    1552 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.sharedvpc.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.179843    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["masters.sharedvpc.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["masters.sharedvpc.example.com"]
    }
  ]
}
I0822 04:24:17.180004    1552 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
W0822 04:24:17.180359    1552 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder
I0822 04:24:17.188857    1552 executor.go:103] Tasks: 57 done / 75 total; 16 can run
I0822 04:24:17.188971    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.189104    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.189577    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.189703    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.189810    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.189921    1552 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.190559    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.190671    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.190741    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.190820    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.190890    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.190959    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.191027    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.191080    1552 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 04:24:17.191118    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.191172    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.191243    1552 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 04:24:17.191672    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.196763    1552 executor.go:103] Tasks: 73 done / 75 total; 2 can run
I0822 04:24:17.196958    1552 executor.go:103] Tasks: 75 done / 75 total; 0 can run
I0822 04:24:17.197165    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["ami-12345678"]
    }]
}
I0822 04:24:17.197226    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["ami-15000000"]
    }]
}
I0822 04:24:17.197308    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["eipalloc-12345678"]
    }]
}
I0822 04:24:17.197370    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["eipalloc-b2345678"]
    }]
}
I0822 04:24:17.197411    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["igw-1"]
    }]
}
I0822 04:24:17.197458    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["nat-a2345678"]
    }]
}
I0822 04:24:17.197498    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["nat-b2345678"]
    }]
}
I0822 04:24:17.197530    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["rtb-1"]
    }]
}
I0822 04:24:17.197564    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["rtb-12345678"]
    }]
}
I0822 04:24:17.197592    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.197622    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.197651    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sshkey-kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
    }]
}
I0822 04:24:17.197683    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-1"]
    }]
}
I0822 04:24:17.197715    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-12345678"]
    }]
}
I0822 04:24:17.197742    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-abcdef"]
    }]
}
I0822 04:24:17.197771    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-b2345678"]
    }]
}
I0822 04:24:17.197800    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-1"]
    }]
}
I0822 04:24:17.197832    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-2"]
    }]
}
I0822 04:24:17.197875    1552 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vpc-12345678"]
    }]
}
W0822 04:24:17.198583    1552 instances.go:27] MockEc2::DescribeInstances is stub-implemented
I0822 04:24:17.198640    1552 keypairs.go:81] DescribeKeyPairs: {

}
I0822 04:24:17.198680    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.198724    1552 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/sharedvpc.example.com"]
    }]
}
I0822 04:24:17.198774    1552 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.198824    1552 dhcpoptions.go:33] DescribeDhcpOptions: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.198877    1552 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.198915    1552 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.198949    1552 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/sharedvpc.example.com"]
    }]
}
I0822 04:24:17.198985    1552 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.199029    1552 vpcs.go:105] DescribeVpcs: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["sharedvpc.example.com"]
    }]
}
I0822 04:24:17.199061    1552 vpcs.go:105] DescribeVpcs: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/sharedvpc.example.com"]
    }]
}
W0822 04:24:17.199106    1552 api.go:53] PageSize not implemented
W0822 04:24:17.199134    1552 api.go:54] PageSize not implemented
W0822 04:24:17.199159    1552 api.go:103] PageSize not implemented
I0822 04:24:17.199184    1552 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:17.199215    1552 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 04:24:17.199263    1552 iaminstanceprofile.go:157] ListInstanceProfiles: {

}
I0822 04:24:17.199309    1552 iamrole.go:86] ListRoles: {

}
I0822 04:24:17.199369    1552 internetgateways.go:97] DescribeInternetGateways: {

}
I0822 04:24:17.199410    1552 routetable.go:54] DescribeRouteTables: {

}
I0822 04:24:17.199461    1552 routetable.go:54] DescribeRouteTables: {
  RouteTableIds: ["rtb-1"]
}
I0822 04:24:17.199762    1552 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "masters.sharedvpc.example.com",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 04:24:17.200002    1552 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "masters.sharedvpc.example.com"
}
I0822 04:24:17.199877    1552 volumes.go:193] DeleteVolume: {
  VolumeId: "vol-2"
}
I0822 04:24:17.200070    1552 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
I0822 04:24:17.199969    1552 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "etcd-us-test-1a.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "api.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "api.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "etcd-events-us-test-1a.internal.sharedvpc.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      }
    ]
  },
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 04:24:17.199914    1552 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "master-us-test-1a.masters.sharedvpc.example.com",
  ForceDelete: true
}
I0822 04:24:17.200136    1552 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "nodes.sharedvpc.example.com",
  ForceDelete: true
}
I0822 04:24:17.200114    1552 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [
    {
      FromPort: 4003,
      IpProtocol: "tcp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },
    {
      FromPort: 443,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 443
    },
    {
      FromPort: 1,
      IpProtocol: "udp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },
    {
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    },
    {
      FromPort: 2382,
      IpProtocol: "tcp",
      ToPort: 4000,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },
    {
      FromPort: 1,
      IpProtocol: "tcp",
      ToPort: 2379,
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },
    {
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }
  ]
}
W0822 04:24:17.200269    1552 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 04:24:17.200277    1552 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-2"
}
I0822 04:24:17.200290    1552 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 04:24:17.200339    1552 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "nodes.sharedvpc.example.com",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 04:24:17.200316    1552 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    },{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    },{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 04:24:17.200374    1552 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "nodes.sharedvpc.example.com"
}
W0822 04:24:17.200379    1552 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 04:24:17.200388    1552 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-1"
}
I0822 04:24:17.200394    1552 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "masters.sharedvpc.example.com"
}
I0822 04:24:17.200409    1552 volumes.go:193] DeleteVolume: {
  VolumeId: "vol-1"
}
I0822 04:24:17.200427    1552 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "masters.sharedvpc.example.com",
  RoleName: "masters.sharedvpc.example.com"
}
I0822 04:24:17.200525    1552 iamrole.go:133] DeleteRole: {
  RoleName: "masters.sharedvpc.example.com"
}
I0822 04:24:17.200546    1552 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 04:24:17.200565    1552 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "nodes.sharedvpc.example.com",
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 04:24:17.200573    1552 iamrole.go:133] DeleteRole: {
  RoleName: "nodes.sharedvpc.example.com"
}
I0822 04:24:17.200438    1552 keypairs.go:139] DeleteKeyPair: {
  KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"
}
iam-instance-profile:masters.sharedvpc.example.com	ok
volume:vol-2	ok
route53-record:Z1AFAKE1ZON3YO/etcd-us-test-1a.internal.sharedvpc.example.com.	ok
autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com	ok
autoscaling-group:nodes.sharedvpc.example.com	ok
security-group:sg-2	ok
iam-instance-profile:nodes.sharedvpc.example.com	ok
security-group:sg-1	ok
volume:vol-1	ok
iam-role:masters.sharedvpc.example.com	ok
iam-role:nodes.sharedvpc.example.com	ok
keypair:kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57	ok
I0822 04:24:17.200859    1552 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "master-us-test-1a.masters.sharedvpc.example.com-20190822042417"
}
autoscaling-config:master-us-test-1a.masters.sharedvpc.example.com-20190822042417	ok
I0822 04:24:17.200971    1552 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "nodes.sharedvpc.example.com-20190822042417"
}
autoscaling-config:nodes.sharedvpc.example.com-20190822042417	ok
I0822 04:24:17.200909    1552 subnets.go:217] DeleteSubnet: {
  SubnetId: "subnet-1"
}
subnet:subnet-1	ok
I0822 04:24:17.201083    1552 routetable.go:185] DeleteRouteTable: {
  RouteTableId: "rtb-1"
}
route-table:rtb-1	ok
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


//cmd/kops/go_default_test:shard_3_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_3_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 04:24:15.448042    1797 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:15.448127    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:15.448166    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:15.448202    1797 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:15.448242    1797 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:15.501325    1797 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:15.501849    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:15.579852    1797 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:15.579892    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:15.579914    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:15.579939    1797 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:15.579954    1797 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:15.667996    1797 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:15.668099    1797 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:15.668180    1797 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:15.668203    1797 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:15.668263    1797 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:15.668286    1797 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:15.668323    1797 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:15.668344    1797 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:15.668647    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:15.675710    1797 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:15.675778    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:15.675822    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:15.680914    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.240806    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.316072    1797 executor.go:103] Tasks: 0 done / 77 total; 35 can run
W0822 04:24:16.316626    1797 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 04:24:16.316699    1797 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:16.316770    1797 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 04:24:16.318421    1797 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 04:24:16.318999    1797 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:16.319038    1797 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
I0822 04:24:16.329653    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:16.331176    1797 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:16.334190    1797 executor.go:103] Tasks: 35 done / 77 total; 24 can run
I0822 04:24:16.344804    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:16.355638    1797 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
W0822 04:24:16.359246    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:16.359767    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 04:24:16.363284    1797 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:16.364061    1797 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
W0822 04:24:16.364683    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:16.364862    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 04:24:16.366638    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:16.375282    1797 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:16.379551    1797 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:16.384773    1797 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:16.405060    1797 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:16.406694    1797 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:16.414099    1797 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 04:24:16.415727    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.416517    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.416031    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.419563    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.423695    1797 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 04:24:16.424744    1797 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 04:24:16.429268    1797 target.go:171] Cloudformation output is in /tmp/test760131781/out
--- FAIL: TestMinimalCloudformation (0.77s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersminimalexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/minimal-cloudformation/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesminimalexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/minimal-cloudformation/cloudformation.json.extracted.yaml
I0822 04:24:16.441758    1797 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.442050    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.442173    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.456120    1797 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 04:24:16.507488    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.649982    1797 executor.go:103] Tasks: 0 done / 116 total; 42 can run
I0822 04:24:16.650821    1797 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:16.650836    1797 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:16.650858    1797 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:16.678239    1797 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:16.678757    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:16.680869    1797 executor.go:103] Tasks: 42 done / 116 total; 35 can run
W0822 04:24:16.682515    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 04:24:16.682643    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 04:24:16.682697    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 04:24:16.684536    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 04:24:16.684729    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
W0822 04:24:16.684841    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder
I0822 04:24:16.690840    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:16.701500    1797 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:16.707768    1797 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:16.712930    1797 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:16.720717    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:16.728827    1797 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:16.755480    1797 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:16.762802    1797 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:16.764590    1797 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:16.767622    1797 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:16.773000    1797 executor.go:103] Tasks: 77 done / 116 total; 31 can run
I0822 04:24:16.773219    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.775944    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.773549    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.775647    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.776222    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.776149    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.781104    1797 executor.go:103] Tasks: 108 done / 116 total; 6 can run
I0822 04:24:16.783248    1797 executor.go:103] Tasks: 114 done / 116 total; 2 can run
I0822 04:24:16.783902    1797 executor.go:103] Tasks: 116 done / 116 total; 0 can run
I0822 04:24:16.795555    1797 target.go:312] Terraform output is in /tmp/test396159807/out
I0822 04:24:16.800130    1797 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.800258    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.800318    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.822411    1797 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 04:24:16.873353    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.990024    1797 executor.go:103] Tasks: 0 done / 80 total; 35 can run
I0822 04:24:16.994776    1797 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:16.994804    1797 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:16.994832    1797 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:17.009416    1797 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:17.016074    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:17.017655    1797 executor.go:103] Tasks: 35 done / 80 total; 24 can run
W0822 04:24:17.021699    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 04:24:17.060658    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 04:24:17.061669    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
I0822 04:24:17.048692    1797 vfs_castore.go:729] Issuing new certificate: "kubecfg"
W0822 04:24:17.062432    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 04:24:17.063767    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 04:24:17.063940    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
I0822 04:24:17.064637    1797 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:17.065469    1797 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:17.051481    1797 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:17.060138    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:17.069873    1797 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:17.075750    1797 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:17.085670    1797 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:17.091462    1797 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:17.094365    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:17.095423    1797 executor.go:103] Tasks: 59 done / 80 total; 16 can run
I0822 04:24:17.095721    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.096293    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.096098    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.096509    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.098326    1797 executor.go:103] Tasks: 75 done / 80 total; 2 can run
I0822 04:24:17.098778    1797 executor.go:103] Tasks: 77 done / 80 total; 3 can run
I0822 04:24:17.101877    1797 executor.go:103] Tasks: 80 done / 80 total; 0 can run
I0822 04:24:17.110720    1797 target.go:312] Terraform output is in /tmp/test332128201/out
I0822 04:24:17.112068    1797 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:17.112156    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:17.112225    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:17.119891    1797 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 04:24:17.188777    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:17.312176    1797 executor.go:103] Tasks: 0 done / 80 total; 35 can run
W0822 04:24:17.315750    1797 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 04:24:17.315989    1797 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:17.316098    1797 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 04:24:17.327478    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:17.328773    1797 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 04:24:17.328852    1797 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:17.328896    1797 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
I0822 04:24:17.331575    1797 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:17.332830    1797 executor.go:103] Tasks: 35 done / 80 total; 24 can run
W0822 04:24:17.333814    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
I0822 04:24:17.375316    1797 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
W0822 04:24:17.336561    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 04:24:17.400113    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
W0822 04:24:17.404763    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder
I0822 04:24:17.354549    1797 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:17.359755    1797 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:17.361451    1797 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:17.362838    1797 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:17.363423    1797 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:17.365472    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:17.410806    1797 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:17.437581    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:17.439592    1797 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:17.453007    1797 executor.go:103] Tasks: 59 done / 80 total; 16 can run
I0822 04:24:17.453898    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.454016    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.454119    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.454207    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.456705    1797 executor.go:103] Tasks: 75 done / 80 total; 2 can run
I0822 04:24:17.456974    1797 executor.go:103] Tasks: 77 done / 80 total; 3 can run
I0822 04:24:17.457212    1797 executor.go:103] Tasks: 80 done / 80 total; 0 can run
I0822 04:24:17.459159    1797 target.go:171] Cloudformation output is in /tmp/test091139299/out
--- FAIL: TestExternalLoadBalancer (0.67s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersexternallbexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/externallb/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesexternallbexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/externallb/cloudformation.json.extracted.yaml
I0822 04:24:17.466203    1797 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:17.466378    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:17.466520    1797 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:17.478995    1797 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 04:24:17.529571    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:17.752871    1797 executor.go:103] Tasks: 0 done / 100 total; 41 can run
I0822 04:24:17.753373    1797 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "nodes.private-shared-subnet.example.com"
}
I0822 04:24:17.756859    1797 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "masters.private-shared-subnet.example.com"
}
I0822 04:24:17.757246    1797 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:17.757415    1797 volumes.go:33] CreateVolume: {
  AvailabilityZone: "us-test-1a",
  Encrypted: false,
  Size: 20,
  TagSpecifications: [{
      ResourceType: "volume",
      Tags: [
        {
          Key: "KubernetesCluster",
          Value: "private-shared-subnet.example.com"
        },
        {
          Key: "k8s.io/etcd/main",
          Value: "us-test-1a/us-test-1a"
        },
        {
          Key: "k8s.io/role/master",
          Value: "1"
        },
        {
          Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
          Value: "owned"
        },
        {
          Key: "Name",
          Value: "us-test-1a.etcd-main.private-shared-subnet.example.com"
        }
      ]
    }],
  VolumeType: "gp2"
}
I0822 04:24:17.757587    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-1"]
    }]
}
I0822 04:24:17.762170    1797 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:17.767149    1797 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:17.767147    1797 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 04:24:17.767376    1797 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 04:24:17.767402    1797 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:17.767531    1797 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 04:24:17.767611    1797 iaminstanceprofile.go:53] CreateInstanceProfile: {
  InstanceProfileName: "bastions.private-shared-subnet.example.com"
}
I0822 04:24:17.767656    1797 iamrole.go:55] CreateRole: {
  AssumeRolePolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n      \"Action\": \"sts:AssumeRole\"\n    }\n  ]\n}",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 04:24:17.767795    1797 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:17.767924    1797 volumes.go:33] CreateVolume: {
  AvailabilityZone: "us-test-1a",
  Encrypted: false,
  Size: 20,
  TagSpecifications: [{
      ResourceType: "volume",
      Tags: [
        {
          Key: "k8s.io/etcd/events",
          Value: "us-test-1a/us-test-1a"
        },
        {
          Key: "k8s.io/role/master",
          Value: "1"
        },
        {
          Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
          Value: "owned"
        },
        {
          Key: "Name",
          Value: "us-test-1a.etcd-events.private-shared-subnet.example.com"
        },
        {
          Key: "KubernetesCluster",
          Value: "private-shared-subnet.example.com"
        }
      ]
    }],
  VolumeType: "gp2"
}
I0822 04:24:17.768033    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-2"]
    }]
}
I0822 04:24:17.768204    1797 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:17.768269    1797 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsSupport",
  VpcId: "vpc-12345678"
}
I0822 04:24:17.768313    1797 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsHostnames",
  VpcId: "vpc-12345678"
}
I0822 04:24:17.786760    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:17.788184    1797 executor.go:103] Tasks: 41 done / 100 total; 29 can run
W0822 04:24:17.788560    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
W0822 04:24:17.788741    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
I0822 04:24:17.788827    1797 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:DescribeInstances\",\n        \"ec2:DescribeRegions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ChangeResourceRecordSets\",\n        \"route53:ListResourceRecordSets\",\n        \"route53:GetHostedZone\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:GetChange\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::change/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ecr:GetAuthorizationToken\",\n        \"ecr:BatchCheckLayerAvailability\",\n        \"ecr:GetDownloadUrlForLayer\",\n        \"ecr:GetRepositoryPolicy\",\n        \"ecr:DescribeRepositories\",\n        \"ecr:ListImages\",\n        \"ecr:BatchGetImage\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "nodes.private-shared-subnet.example.com",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 04:24:17.788961    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["masters.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["masters.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:17.789121    1797 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for masters",
  GroupName: "masters.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 04:24:17.789148    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.789176    1797 tags.go:48] CreateTags {
  Resources: ["sg-1"],
  Tags: [{
      Key: "Name",
      Value: "masters.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    }]
}
I0822 04:24:17.789217    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 04:24:17.789272    1797 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:17.789358    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["bastion.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["bastion.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:17.789553    1797 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for bastion",
  GroupName: "bastion.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 04:24:17.789591    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.789617    1797 tags.go:48] CreateTags {
  Resources: ["sg-2"],
  Tags: [{
      Key: "Name",
      Value: "bastion.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    }]
}
I0822 04:24:17.789655    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
I0822 04:24:17.789673    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["api-elb.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["api-elb.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:17.789788    1797 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for api ELB",
  GroupName: "api-elb.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 04:24:17.789817    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-3"]
    }]
}
I0822 04:24:17.789835    1797 tags.go:48] CreateTags {
  Resources: ["sg-3"],
  Tags: [{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    },{
      Key: "Name",
      Value: "api-elb.private-shared-subnet.example.com"
    }]
}
I0822 04:24:17.789868    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-3"]
}
I0822 04:24:17.799637    1797 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "masters.private-shared-subnet.example.com",
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 04:24:17.799844    1797 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "bastions.private-shared-subnet.example.com",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 04:24:17.800548    1797 subnets.go:109] DescribeSubnets: {
  SubnetIds: ["subnet-12345678"]
}
I0822 04:24:17.800682    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-12345678"]
    }]
}
I0822 04:24:17.800755    1797 tags.go:48] CreateTags {
  Resources: ["subnet-12345678"],
  Tags: [{
      Key: "SubnetType",
      Value: "Private"
    },{
      Key: "kubernetes.io/role/internal-elb",
      Value: "1"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "shared"
    }]
}
W0822 04:24:17.800914    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
W0822 04:24:17.801110    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
I0822 04:24:17.801217    1797 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:*\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"autoscaling:DescribeAutoScalingGroups\",\n        \"autoscaling:DescribeAutoScalingInstances\",\n        \"autoscaling:DescribeLaunchConfigurations\",\n        \"autoscaling:DescribeTags\",\n        \"autoscaling:SetDesiredCapacity\",\n        \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n        \"autoscaling:UpdateAutoScalingGroup\",\n        \"ec2:DescribeLaunchTemplateVersions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"elasticloadbalancing:*\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"iam:ListServerCertificates\",\n        \"iam:GetServerCertificate\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ChangeResourceRecordSets\",\n        \"route53:ListResourceRecordSets\",\n        \"route53:GetHostedZone\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:GetChange\"\n      ],\n      \"Resource\": [\n        \"arn:aws:route53:::change/*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"route53:ListHostedZones\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    },\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ecr:GetAuthorizationToken\",\n        \"ecr:BatchCheckLayerAvailability\",\n        \"ecr:GetDownloadUrlForLayer\",\n        \"ecr:GetRepositoryPolicy\",\n        \"ecr:DescribeRepositories\",\n        \"ecr:ListImages\",\n        \"ecr:BatchGetImage\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "masters.private-shared-subnet.example.com",
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 04:24:17.801376    1797 iaminstanceprofile.go:93] AddRoleToInstanceProfile: {
  InstanceProfileName: "nodes.private-shared-subnet.example.com",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 04:24:17.802867    1797 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:17.803036    1797 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:17.803061    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:17.803179    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["bastion-elb.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["bastion-elb.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:17.803381    1797 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for bastion ELB",
  GroupName: "bastion-elb.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 04:24:17.803433    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-4"]
    }]
}
I0822 04:24:17.803612    1797 tags.go:48] CreateTags {
  Resources: ["sg-4"],
  Tags: [{
      Key: "Name",
      Value: "bastion-elb.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    }]
}
I0822 04:24:17.803686    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-4"]
}
I0822 04:24:17.807529    1797 subnets.go:109] DescribeSubnets: {
  SubnetIds: ["subnet-abcdef"]
}
I0822 04:24:17.808565    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-abcdef"]
    }]
}
I0822 04:24:17.813484    1797 tags.go:48] CreateTags {
  Resources: ["subnet-abcdef"],
  Tags: [{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "shared"
    },{
      Key: "SubnetType",
      Value: "Utility"
    },{
      Key: "kubernetes.io/role/elb",
      Value: "1"
    }]
}
I0822 04:24:17.813600    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "tag:Name",
      Values: ["nodes.private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["nodes.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:17.814376    1797 securitygroups.go:40] CreateSecurityGroup: {
  Description: "Security group for nodes",
  GroupName: "nodes.private-shared-subnet.example.com",
  VpcId: "vpc-12345678"
}
I0822 04:24:17.814423    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-5"]
    }]
}
I0822 04:24:17.815497    1797 tags.go:48] CreateTags {
  Resources: ["sg-5"],
  Tags: [{
      Key: "Name",
      Value: "nodes.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    }]
}
I0822 04:24:17.815594    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-5"]
}
I0822 04:24:17.813936    1797 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:17.835835    1797 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:17.838054    1797 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:17.814145    1797 iamrolepolicy.go:69] PutRolePolicy: {
  PolicyDocument: "{\n  \"Version\": \"2012-10-17\",\n  \"Statement\": [\n    {\n      \"Effect\": \"Allow\",\n      \"Action\": [\n        \"ec2:DescribeRegions\"\n      ],\n      \"Resource\": [\n        \"*\"\n      ]\n    }\n  ]\n}",
  PolicyName: "bastions.private-shared-subnet.example.com",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 04:24:17.846476    1797 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:17.846947    1797 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:17.855236    1797 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:17.860356    1797 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:17.861969    1797 executor.go:103] Tasks: 70 done / 100 total; 24 can run
I0822 04:24:17.862099    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.862184    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.862255    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.862256    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 1,
      IpProtocol: "udp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 04:24:17.862313    1797 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: true,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 32,
        VolumeType: "gp2"
      }
    }],
  IamInstanceProfile: "bastions.private-shared-subnet.example.com",
  ImageId: "ami-15000000",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "t2.micro",
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "bastion.private-shared-subnet.example.com-20190822042417",
  SecurityGroups: ["sg-2"]
}
I0822 04:24:17.862342    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 04:24:17.862420    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.862504    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.862593    1797 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-2",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 04:24:17.862599    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.862631    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 2382,
      IpProtocol: "tcp",
      ToPort: 4000,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 04:24:17.862653    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.862665    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-5",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 04:24:17.862711    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 04:24:17.862797    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-5",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
I0822 04:24:17.862848    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.862921    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 4003,
      IpProtocol: "tcp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 04:24:17.862975    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-4"]
    }]
}
I0822 04:24:17.863066    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-4",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    }]
}
W0822 04:24:17.863157    1797 api.go:53] PageSize not implemented
I0822 04:24:17.863252    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 04:24:17.863325    1797 tags.go:74] AddTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"],
  Tags: [{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    },{
      Key: "Name",
      Value: "api.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    }]
}
I0822 04:24:17.863364    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 04:24:17.863382    1797 healthcheck.go:31] ConfigureHealthCheck: {
  HealthCheck: {
    HealthyThreshold: 2,
    Interval: 10,
    Target: "SSL:443",
    Timeout: 5,
    UnhealthyThreshold: 2
  },
  LoadBalancerName: "api-private-shared-subnet-n2f8ak"
}
I0822 04:24:17.863421    1797 attributes.go:31] ModifyLoadBalancerAttributes: {
  LoadBalancerAttributes: {
    AccessLog: {
      Enabled: false
    },
    ConnectionDraining: {
      Enabled: false,
      Timeout: 300
    },
    ConnectionSettings: {
      IdleTimeout: 300
    },
    CrossZoneLoadBalancing: {
      Enabled: false
    }
  },
  LoadBalancerName: "api-private-shared-subnet-n2f8ak"
}
I0822 04:24:17.863518    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.863617    1797 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 04:24:17.863675    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.863762    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 443,
      IpProtocol: "tcp",
      ToPort: 443,
      UserIdGroupPairs: [{
          GroupId: "sg-3"
        }]
    }]
}
I0822 04:24:17.863831    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.863918    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 04:24:17.863969    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 04:24:17.864052    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      FromPort: 3,
      IpProtocol: "icmp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 4
    }]
}
I0822 04:24:17.864107    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.864187    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    }]
}
I0822 04:24:17.864274    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-4"]
    }]
}
I0822 04:24:17.864365    1797 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-4",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
W0822 04:24:17.864568    1797 api.go:53] PageSize not implemented
I0822 04:24:17.864592    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 04:24:17.864768    1797 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: false,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 64,
        VolumeType: "gp2"
      }
    },{
      DeviceName: "/dev/sdc",
      VirtualName: "ephemeral0"
    }],
  IamInstanceProfile: "masters.private-shared-subnet.example.com",
  ImageId: "ami-15000000",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "m3.medium",
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "master-us-test-1a.masters.private-shared-subnet.example.com-20190822042417",
  SecurityGroups: ["sg-1"],
  UserData: "#!/bin/bash
# Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

set -o errexit
set -o nounset
set -o pipefail

NODEUP_URL=https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-nodeup,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/nodeup
NODEUP_HASH=bb41724c37d15ab7e039e06230e742b9b38d0808

export AWS_REGION=us-test-1




function ensure-install-dir() {
  INSTALL_DIR="/var/cache/kubernetes-install"
  # On ContainerOS, we install to /var/lib/toolbox install (because of noexec)
  if [[ -d /var/lib/toolbox ]]; then
    INSTALL_DIR="/var/lib/toolbox/kubernetes-install"
  fi
  mkdir -p ${INSTALL_DIR}
  cd ${INSTALL_DIR}
}

# Retry a download until we get it. Takes a hash and a set of URLs.
#
# $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
# $2+ are the URLs to download.
download-or-bust() {
  local -r hash="$1"
  shift 1

  urls=( $* )
  while true; do
    for url in "${urls[@]}"; do
      local file="${url##*/}"

      if [[ -e "${file}" ]]; then
        echo "== File exists for ${url} =="

      # CoreOS runs this script in a container without which (but has curl)
      # Note also that busybox wget doesn't support wget --version, but busybox doesn't normally have curl
      # So we default to wget unless we see curl
      elif [[ $(curl --version) ]]; then
        if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
          echo "== Failed to curl ${url}. Retrying. =="
          continue
        fi
      else
        if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
          echo "== Failed to wget ${url}. Retrying. =="
          continue
        fi
      fi

      if [[ -n "${hash}" ]] && ! validate-hash "${file}" "${hash}"; then
        echo "== Hash validation of ${url} failed. Retrying. =="
        rm -f "${file}"
      else
        if [[ -n "${hash}" ]]; then
          echo "== Downloaded ${url} (SHA1 = ${hash}) =="
        else
          echo "== Downloaded ${url} =="
        fi
        return
      fi
    done

    echo "All downloads failed; sleeping before retrying"
    sleep 60
  done
}

validate-hash() {
  local -r file="$1"
  local -r expected="$2"
  local actual

  actual=$(sha1sum ${file} | awk '{ print $1 }') || true
  if [[ "${actual}" != "${expected}" ]]; then
    echo "== ${file} corrupted, sha1 ${actual} doesn't match expected ${expected} =="
    return 1
  fi
}

function split-commas() {
  echo $1 | tr "," "\n"
}

function try-download-release() {
  # TODO(zmerlynn): Now we REALLY have no excuse not to do the reboot
  # optimization.

  local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
  local -r nodeup_filename="${nodeup_urls[0]##*/}"
  if [[ -n "${NODEUP_HASH:-}" ]]; then
    local -r nodeup_hash="${NODEUP_HASH}"
  else
  # TODO: Remove?
    echo "Downloading sha1 (not found in env)"
    download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
    local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
  fi

  echo "Downloading nodeup (${nodeup_urls[@]})"
  download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"

  chmod +x nodeup
}

function download-release() {
  # In case of failure checking integrity of release, retry.
  until try-download-release; do
    sleep 15
    echo "Couldn't download release. Retrying..."
  done

  echo "Running nodeup"
  # We can't run in the foreground because of https://github.com/docker/docker/issues/23793
  ( cd ${INSTALL_DIR}; ./nodeup --install-systemd-unit --conf=${INSTALL_DIR}/kube_env.yaml --v=8  )
}

####################################################################################

/bin/systemd-machine-id-setup || echo "failed to set up ensure machine-id configured"

echo "== nodeup node config starting =="
ensure-install-dir

cat > cluster_spec.yaml << '__EOF_CLUSTER_SPEC'
cloudConfig: null
docker:
  ipMasq: false
  ipTables: false
  logDriver: json-file
  logLevel: warn
  logOpt:
  - max-size=10m
  - max-file=5
  storage: overlay,aufs
  version: 1.13.1
encryptionConfig: null
etcdClusters:
  events:
    image: gcr.io/google_containers/etcd:2.2.1
    version: 2.2.1
  main:
    image: gcr.io/google_containers/etcd:2.2.1
    version: 2.2.1
kubeAPIServer:
  address: 127.0.0.1
  admissionControl:
  - Initializers
  - NamespaceLifecycle
  - LimitRanger
  - ServiceAccount
  - PersistentVolumeLabel
  - DefaultStorageClass
  - DefaultTolerationSeconds
  - NodeRestriction
  - ResourceQuota
  allowPrivileged: true
  anonymousAuth: false
  apiServerCount: 1
  authorizationMode: AlwaysAllow
  cloudProvider: aws
  etcdServers:
  - http://127.0.0.1:4001
  etcdServersOverrides:
  - /events#http://127.0.0.1:4002
  image: gcr.io/google_containers/kube-apiserver:v1.8.2
  insecurePort: 8080
  kubeletPreferredAddressTypes:
  - InternalIP
  - Hostname
  - ExternalIP
  logLevel: 2
  requestheaderAllowedNames:
  - aggregator
  requestheaderExtraHeaderPrefixes:
  - X-Remote-Extra-
  requestheaderGroupHeaders:
  - X-Remote-Group
  requestheaderUsernameHeaders:
  - X-Remote-User
  securePort: 443
  serviceClusterIPRange: 100.64.0.0/13
  storageBackend: etcd2
kubeControllerManager:
  allocateNodeCIDRs: true
  attachDetachReconcileSyncPeriod: 1m0s
  cloudProvider: aws
  clusterCIDR: 100.96.0.0/11
  clusterName: private-shared-subnet.example.com
  configureCloudRoutes: false
  image: gcr.io/google_containers/kube-controller-manager:v1.8.2
  leaderElection:
    leaderElect: true
  logLevel: 2
  useServiceAccountCredentials: true
kubeProxy:
  clusterCIDR: 100.96.0.0/11
  cpuRequest: 100m
  hostnameOverride: '@aws'
  image: gcr.io/google_containers/kube-proxy:v1.8.2
  logLevel: 2
kubeScheduler:
  image: gcr.io/google_containers/kube-scheduler:v1.8.2
  leaderElection:
    leaderElect: true
  logLevel: 2
kubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginName: cni
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  requireKubeconfig: true
masterKubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginName: cni
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  registerSchedulable: false
  requireKubeconfig: true

__EOF_CLUSTER_SPEC

cat > ig_spec.yaml << '__EOF_IG_SPEC'
kubelet: null
nodeLabels: null
taints: null

__EOF_IG_SPEC

cat > kube_env.yaml << '__EOF_KUBE_ENV'
Assets:
- 2f6ec469e61125a837ad447cab012600ef08f0b2@https://storage.googleapis.com/kubernetes-release/release/v1.8.2/bin/linux/amd64/kubelet
- 20f145a084a7afc80569f5852cc1bcd377e0e562@https://storage.googleapis.com/kubernetes-release/release/v1.8.2/bin/linux/amd64/kubectl
- 1d9788b0f5420e1a219aad2cb8681823fc515e7c@https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz
- 42b15a0a0a56531750bde3c7b08d0cf27c170c48@https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-utils.tar.gz,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/utils.tar.gz
ClusterName: private-shared-subnet.example.com
ConfigBase: memfs://clusters.example.com/private-shared-subnet.example.com
InstanceGroupName: master-us-test-1a
Tags:
- _automatic_upgrades
- _aws
channels:
- memfs://clusters.example.com/private-shared-subnet.example.com/addons/bootstrap-channel.yaml
protokubeImage:
  hash: 0b1f26208f8f6cc02468368706d0236670fec8a2
  name: protokube:1.8.1
  sources:
  - https://github.com/kubernetes/kops/releases/download/1.8.1/images-protokube.tar.gz
  - https://kubeupv2.s3.amazonaws.com/kops/1.8.1/images/protokube.tar.gz

__EOF_KUBE_ENV

download-release
echo "== nodeup node config done =="
"
}
I0822 04:24:17.864421    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:17.865568    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-4"
        }]
    }]
}
I0822 04:24:17.865661    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 04:24:17.865785    1797 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-3",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 04:24:17.865865    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 04:24:17.865988    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      FromPort: 443,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 443
    }]
}
I0822 04:24:17.866044    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:17.866142    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [{
      FromPort: 1,
      IpProtocol: "tcp",
      ToPort: 2379,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }]
}
I0822 04:24:17.866186    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 04:24:17.866263    1797 securitygroups.go:227] AuthorizeSecurityGroupEgress: {
  GroupId: "sg-5",
  IpPermissions: [{
      IpProtocol: "-1",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }]
    }]
}
I0822 04:24:17.866311    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 04:24:17.866326    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"]
}
I0822 04:24:17.866365    1797 tags.go:74] AddTags {
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"],
  Tags: [{
      Key: "Name",
      Value: "bastion.private-shared-subnet.example.com"
    },{
      Key: "KubernetesCluster",
      Value: "private-shared-subnet.example.com"
    },{
      Key: "kubernetes.io/cluster/private-shared-subnet.example.com",
      Value: "owned"
    }]
}
I0822 04:24:17.866480    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"]
}
I0822 04:24:17.866525    1797 healthcheck.go:31] ConfigureHealthCheck: {
  HealthCheck: {
    HealthyThreshold: 2,
    Interval: 10,
    Target: "TCP:22",
    Timeout: 5,
    UnhealthyThreshold: 2
  },
  LoadBalancerName: "bastion-private-shared-su-5ol32q"
}
I0822 04:24:17.866558    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.866637    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.866586    1797 attributes.go:31] ModifyLoadBalancerAttributes: {
  LoadBalancerAttributes: {
    AccessLog: {
      Enabled: false
    },
    ConnectionDraining: {
      Enabled: false,
      Timeout: 300
    },
    ConnectionSettings: {
      IdleTimeout: 300
    },
    CrossZoneLoadBalancing: {
      Enabled: false
    }
  },
  LoadBalancerName: "bastion-private-shared-su-5ol32q"
}
I0822 04:24:17.866388    1797 securitygroups.go:282] AuthorizeSecurityGroupIngress: {
  GroupId: "sg-5",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
I0822 04:24:17.869556    1797 launchconfigurations.go:76] CreateLaunchConfiguration: {
  AssociatePublicIpAddress: false,
  BlockDeviceMappings: [{
      DeviceName: "/dev/xvda",
      Ebs: {
        DeleteOnTermination: true,
        VolumeSize: 128,
        VolumeType: "gp2"
      }
    }],
  IamInstanceProfile: "nodes.private-shared-subnet.example.com",
  ImageId: "ami-15000000",
  InstanceMonitoring: {
    Enabled: false
  },
  InstanceType: "t2.medium",
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  LaunchConfigurationName: "nodes.private-shared-subnet.example.com-20190822042417",
  SecurityGroups: ["sg-5"],
  UserData: "#!/bin/bash
# Copyright 2016 The Kubernetes Authors All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

set -o errexit
set -o nounset
set -o pipefail

NODEUP_URL=https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-nodeup,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/nodeup
NODEUP_HASH=bb41724c37d15ab7e039e06230e742b9b38d0808

export AWS_REGION=us-test-1




function ensure-install-dir() {
  INSTALL_DIR="/var/cache/kubernetes-install"
  # On ContainerOS, we install to /var/lib/toolbox install (because of noexec)
  if [[ -d /var/lib/toolbox ]]; then
    INSTALL_DIR="/var/lib/toolbox/kubernetes-install"
  fi
  mkdir -p ${INSTALL_DIR}
  cd ${INSTALL_DIR}
}

# Retry a download until we get it. Takes a hash and a set of URLs.
#
# $1 is the sha1 of the URL. Can be "" if the sha1 is unknown.
# $2+ are the URLs to download.
download-or-bust() {
  local -r hash="$1"
  shift 1

  urls=( $* )
  while true; do
    for url in "${urls[@]}"; do
      local file="${url##*/}"

      if [[ -e "${file}" ]]; then
        echo "== File exists for ${url} =="

      # CoreOS runs this script in a container without which (but has curl)
      # Note also that busybox wget doesn't support wget --version, but busybox doesn't normally have curl
      # So we default to wget unless we see curl
      elif [[ $(curl --version) ]]; then
        if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
          echo "== Failed to curl ${url}. Retrying. =="
          continue
        fi
      else
        if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
          echo "== Failed to wget ${url}. Retrying. =="
          continue
        fi
      fi

      if [[ -n "${hash}" ]] && ! validate-hash "${file}" "${hash}"; then
        echo "== Hash validation of ${url} failed. Retrying. =="
        rm -f "${file}"
      else
        if [[ -n "${hash}" ]]; then
          echo "== Downloaded ${url} (SHA1 = ${hash}) =="
        else
          echo "== Downloaded ${url} =="
        fi
        return
      fi
    done

    echo "All downloads failed; sleeping before retrying"
    sleep 60
  done
}

validate-hash() {
  local -r file="$1"
  local -r expected="$2"
  local actual

  actual=$(sha1sum ${file} | awk '{ print $1 }') || true
  if [[ "${actual}" != "${expected}" ]]; then
    echo "== ${file} corrupted, sha1 ${actual} doesn't match expected ${expected} =="
    return 1
  fi
}

function split-commas() {
  echo $1 | tr "," "\n"
}

function try-download-release() {
  # TODO(zmerlynn): Now we REALLY have no excuse not to do the reboot
  # optimization.

  local -r nodeup_urls=( $(split-commas "${NODEUP_URL}") )
  local -r nodeup_filename="${nodeup_urls[0]##*/}"
  if [[ -n "${NODEUP_HASH:-}" ]]; then
    local -r nodeup_hash="${NODEUP_HASH}"
  else
  # TODO: Remove?
    echo "Downloading sha1 (not found in env)"
    download-or-bust "" "${nodeup_urls[@]/%/.sha1}"
    local -r nodeup_hash=$(cat "${nodeup_filename}.sha1")
  fi

  echo "Downloading nodeup (${nodeup_urls[@]})"
  download-or-bust "${nodeup_hash}" "${nodeup_urls[@]}"

  chmod +x nodeup
}

function download-release() {
  # In case of failure checking integrity of release, retry.
  until try-download-release; do
    sleep 15
    echo "Couldn't download release. Retrying..."
  done

  echo "Running nodeup"
  # We can't run in the foreground because of https://github.com/docker/docker/issues/23793
  ( cd ${INSTALL_DIR}; ./nodeup --install-systemd-unit --conf=${INSTALL_DIR}/kube_env.yaml --v=8  )
}

####################################################################################

/bin/systemd-machine-id-setup || echo "failed to set up ensure machine-id configured"

echo "== nodeup node config starting =="
ensure-install-dir

cat > cluster_spec.yaml << '__EOF_CLUSTER_SPEC'
cloudConfig: null
docker:
  ipMasq: false
  ipTables: false
  logDriver: json-file
  logLevel: warn
  logOpt:
  - max-size=10m
  - max-file=5
  storage: overlay,aufs
  version: 1.13.1
kubeProxy:
  clusterCIDR: 100.96.0.0/11
  cpuRequest: 100m
  hostnameOverride: '@aws'
  image: gcr.io/google_containers/kube-proxy:v1.8.2
  logLevel: 2
kubelet:
  allowPrivileged: true
  cgroupRoot: /
  cloudProvider: aws
  clusterDNS: 100.64.0.10
  clusterDomain: cluster.local
  enableDebuggingHandlers: true
  evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
  featureGates:
    ExperimentalCriticalPodAnnotation: "true"
  hostnameOverride: '@aws'
  kubeconfigPath: /var/lib/kubelet/kubeconfig
  logLevel: 2
  networkPluginName: cni
  nonMasqueradeCIDR: 100.64.0.0/10
  podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
  podManifestPath: /etc/kubernetes/manifests
  requireKubeconfig: true

__EOF_CLUSTER_SPEC

cat > ig_spec.yaml << '__EOF_IG_SPEC'
kubelet: null
nodeLabels: null
taints: null

__EOF_IG_SPEC

cat > kube_env.yaml << '__EOF_KUBE_ENV'
Assets:
- 2f6ec469e61125a837ad447cab012600ef08f0b2@https://storage.googleapis.com/kubernetes-release/release/v1.8.2/bin/linux/amd64/kubelet
- 20f145a084a7afc80569f5852cc1bcd377e0e562@https://storage.googleapis.com/kubernetes-release/release/v1.8.2/bin/linux/amd64/kubectl
- 1d9788b0f5420e1a219aad2cb8681823fc515e7c@https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz
- 42b15a0a0a56531750bde3c7b08d0cf27c170c48@https://github.com/kubernetes/kops/releases/download/1.8.1/linux-amd64-utils.tar.gz,https://kubeupv2.s3.amazonaws.com/kops/1.8.1/linux/amd64/utils.tar.gz
ClusterName: private-shared-subnet.example.com
ConfigBase: memfs://clusters.example.com/private-shared-subnet.example.com
InstanceGroupName: nodes
Tags:
- _automatic_upgrades
- _aws
channels:
- memfs://clusters.example.com/private-shared-subnet.example.com/addons/bootstrap-channel.yaml
protokubeImage:
  hash: 0b1f26208f8f6cc02468368706d0236670fec8a2
  name: protokube:1.8.1
  sources:
  - https://github.com/kubernetes/kops/releases/download/1.8.1/images-protokube.tar.gz
  - https://kubeupv2.s3.amazonaws.com/kops/1.8.1/images/protokube.tar.gz

__EOF_KUBE_ENV

download-release
echo "== nodeup node config done =="
"
}
I0822 04:24:17.870171    1797 executor.go:103] Tasks: 94 done / 100 total; 4 can run
I0822 04:24:17.870353    1797 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "Z1AFAKE1ZON3YO"
}
I0822 04:24:17.870760    1797 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [{
        Action: "UPSERT",
        ResourceRecordSet: {
          AliasTarget: {
            DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com",
            EvaluateTargetHealth: false,
            HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB"
          },
          Name: "api.private-shared-subnet.example.com",
          Type: "A"
        }
      }]
  },
  HostedZoneId: "Z1AFAKE1ZON3YO"
}
I0822 04:24:17.870554    1797 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "nodes.private-shared-subnet.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 04:24:17.871051    1797 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "bastion.private-shared-subnet.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 04:24:17.871223    1797 group.go:100] EnableMetricsCollection: {
  AutoScalingGroupName: "master-us-test-1a.masters.private-shared-subnet.example.com",
  Granularity: "1Minute",
  Metrics: [
    "GroupDesiredCapacity",
    "GroupInServiceInstances",
    "GroupMaxSize",
    "GroupMinSize",
    "GroupPendingInstances",
    "GroupStandbyInstances",
    "GroupTerminatingInstances",
    "GroupTotalInstances"
  ]
}
I0822 04:24:17.871324    1797 executor.go:103] Tasks: 98 done / 100 total; 2 can run
I0822 04:24:17.871504    1797 attach.go:32] AttachLoadBalancers: {
  AutoScalingGroupName: "master-us-test-1a.masters.private-shared-subnet.example.com",
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 04:24:17.871625    1797 attach.go:32] AttachLoadBalancers: {
  AutoScalingGroupName: "bastion.private-shared-subnet.example.com",
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"]
}
I0822 04:24:17.871676    1797 executor.go:103] Tasks: 100 done / 100 total; 0 can run
I0822 04:24:17.871717    1797 dns.go:155] Pre-creating DNS records
I0822 04:24:17.871745    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:17.871793    1797 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 04:24:17.871850    1797 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [{
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "api.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },{
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "etcd-us-test-1a.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },{
        Action: "CREATE",
        ResourceRecordSet: {
          Name: "etcd-events-us-test-1a.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      }]
  },
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 04:24:17.874999    1797 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 04:24:17.927469    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:18.024673    1797 executor.go:103] Tasks: 0 done / 100 total; 41 can run
I0822 04:24:18.025027    1797 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"]
    },{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.025210    1797 vpcs.go:105] DescribeVpcs: {
  VpcIds: ["vpc-12345678"]
}
I0822 04:24:18.025263    1797 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsSupport",
  VpcId: "vpc-12345678"
}
I0822 04:24:18.025295    1797 vpcs.go:160] DescribeVpcs: {
  Attribute: "enableDnsHostnames",
  VpcId: "vpc-12345678"
}
I0822 04:24:18.025332    1797 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },{
      Name: "tag:Name",
      Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.025522    1797 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:18.025860    1797 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:18.027109    1797 executor.go:103] Tasks: 41 done / 100 total; 29 can run
I0822 04:24:18.027232    1797 subnets.go:109] DescribeSubnets: {
  SubnetIds: ["subnet-abcdef"]
}
I0822 04:24:18.027321    1797 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:18.027536    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["bastion.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["bastion.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:18.027660    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
W0822 04:24:18.029210    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
I0822 04:24:18.029552    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "tag:Name",
      Values: ["masters.private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["masters.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:18.029715    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 04:24:18.029806    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["nodes.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["nodes.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:18.029932    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-5"]
}
I0822 04:24:18.030769    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["bastion-elb.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["bastion-elb.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:18.030928    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-4"]
}
W0822 04:24:18.032169    1797 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder
I0822 04:24:18.032149    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [
    {
      Name: "tag:Name",
      Values: ["api-elb.private-shared-subnet.example.com"]
    },
    {
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    },
    {
      Name: "vpc-id",
      Values: ["vpc-12345678"]
    },
    {
      Name: "group-name",
      Values: ["api-elb.private-shared-subnet.example.com"]
    }
  ]
}
I0822 04:24:18.032327    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-3"]
}
I0822 04:24:18.032492    1797 subnets.go:109] DescribeSubnets: {
  SubnetIds: ["subnet-12345678"]
}
I0822 04:24:18.032582    1797 executor.go:103] Tasks: 70 done / 100 total; 24 can run
I0822 04:24:18.032660    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 04:24:18.032742    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-4"]
    }]
}
I0822 04:24:18.032820    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:18.032877    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:18.032929    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 04:24:18.033003    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:18.033053    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:18.033114    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
W0822 04:24:18.033184    1797 api.go:53] PageSize not implemented
I0822 04:24:18.033207    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak","bastion-private-shared-su-5ol32q"]
}
I0822 04:24:18.033256    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 04:24:18.033283    1797 attributes.go:52] DescribeLoadBalancerAttributes: {
  LoadBalancerName: "api-private-shared-subnet-n2f8ak"
}
I0822 04:24:18.033363    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
I0822 04:24:18.033424    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:18.033522    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 04:24:18.033617    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:18.033698    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:18.034357    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:18.034503    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-4"]
    }]
}
I0822 04:24:18.034589    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:18.034668    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-3"]
    }]
}
W0822 04:24:18.034754    1797 api.go:53] PageSize not implemented
I0822 04:24:18.034771    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak","bastion-private-shared-su-5ol32q"]
}
I0822 04:24:18.034837    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["bastion-private-shared-su-5ol32q"]
}
I0822 04:24:18.034862    1797 attributes.go:52] DescribeLoadBalancerAttributes: {
  LoadBalancerName: "bastion-private-shared-su-5ol32q"
}
I0822 04:24:18.034935    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-5"]
    }]
}
I0822 04:24:18.035029    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:18.035122    1797 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:18.035360    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:18.035474    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:18.035550    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:18.035598    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:18.035661    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "group-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:18.036269    1797 executor.go:103] Tasks: 94 done / 100 total; 4 can run
I0822 04:24:18.036472    1797 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "Z1AFAKE1ZON3YO"
}
I0822 04:24:18.036532    1797 dnsname.go:111] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com"
I0822 04:24:18.036564    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"]
}
I0822 04:24:18.036618    1797 executor.go:103] Tasks: 98 done / 100 total; 2 can run
I0822 04:24:18.036708    1797 executor.go:103] Tasks: 100 done / 100 total; 0 can run
I0822 04:24:18.036891    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["ami-12345678"]
    }]
}
I0822 04:24:18.036930    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["ami-15000000"]
    }]
}
I0822 04:24:18.036952    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["eipalloc-12345678"]
    }]
}
I0822 04:24:18.036973    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["eipalloc-b2345678"]
    }]
}
I0822 04:24:18.037000    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["igw-1"]
    }]
}
I0822 04:24:18.037021    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["nat-a2345678"]
    }]
}
I0822 04:24:18.037041    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["nat-b2345678"]
    }]
}
I0822 04:24:18.037061    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["rtb-12345678"]
    }]
}
I0822 04:24:18.037082    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-1"]
    }]
}
I0822 04:24:18.037104    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-2"]
    }]
}
I0822 04:24:18.037124    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-3"]
    }]
}
I0822 04:24:18.037145    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-4"]
    }]
}
I0822 04:24:18.037174    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sg-5"]
    }]
}
I0822 04:24:18.037200    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["sshkey-kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
    }]
}
I0822 04:24:18.037223    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-12345678"]
    }]
}
I0822 04:24:18.037247    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-abcdef"]
    }]
}
I0822 04:24:18.037268    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["subnet-b2345678"]
    }]
}
I0822 04:24:18.037294    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-1"]
    }]
}
I0822 04:24:18.037317    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vol-2"]
    }]
}
I0822 04:24:18.037340    1797 tags.go:166] DescribeTags {
  Filters: [{
      Name: "resource-id",
      Values: ["vpc-12345678"]
    }]
}
W0822 04:24:18.037946    1797 instances.go:27] MockEc2::DescribeInstances is stub-implemented
I0822 04:24:18.037993    1797 keypairs.go:81] DescribeKeyPairs: {

}
I0822 04:24:18.038021    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.038057    1797 securitygroups.go:105] DescribeSecurityGroups: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.038105    1797 volumes.go:119] DescribeVolumes: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.038140    1797 dhcpoptions.go:33] DescribeDhcpOptions: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.038184    1797 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.038211    1797 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.038236    1797 routetable.go:54] DescribeRouteTables: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.038260    1797 subnets.go:109] DescribeSubnets: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.038289    1797 vpcs.go:105] DescribeVpcs: {
  Filters: [{
      Name: "tag:KubernetesCluster",
      Values: ["private-shared-subnet.example.com"]
    }]
}
I0822 04:24:18.038311    1797 vpcs.go:105] DescribeVpcs: {
  Filters: [{
      Name: "tag-key",
      Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"]
    }]
}
W0822 04:24:18.038336    1797 api.go:53] PageSize not implemented
I0822 04:24:18.038352    1797 tags.go:31] DescribeTags {
  LoadBalancerNames: ["api-private-shared-subnet-n2f8ak","bastion-private-shared-su-5ol32q"]
}
W0822 04:24:18.038387    1797 api.go:54] PageSize not implemented
W0822 04:24:18.038405    1797 api.go:103] PageSize not implemented
I0822 04:24:18.038423    1797 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:18.038466    1797 records.go:48] ListResourceRecordSetsPages {
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
I0822 04:24:18.038510    1797 iaminstanceprofile.go:157] ListInstanceProfiles: {

}
I0822 04:24:18.038539    1797 iamrole.go:86] ListRoles: {

}
I0822 04:24:18.038580    1797 internetgateways.go:97] DescribeInternetGateways: {

}
I0822 04:24:18.038609    1797 routetable.go:54] DescribeRouteTables: {

}
I0822 04:24:18.038902    1797 records.go:89] ChangeResourceRecordSets {
  ChangeBatch: {
    Changes: [
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "api.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          AliasTarget: {
            DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com",
            EvaluateTargetHealth: false,
            HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB"
          },
          Name: "api.private-shared-subnet.example.com",
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "etcd-us-test-1a.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      },
      {
        Action: "DELETE",
        ResourceRecordSet: {
          Name: "etcd-events-us-test-1a.internal.private-shared-subnet.example.com.",
          ResourceRecords: [{
              Value: "203.0.113.123"
            }],
          TTL: 10,
          Type: "A"
        }
      }
    ]
  },
  HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO"
}
route53-record:Z1AFAKE1ZON3YO/api.internal.private-shared-subnet.example.com.	ok
I0822 04:24:18.039037    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-5"]
}
I0822 04:24:18.039064    1797 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "nodes.private-shared-subnet.example.com",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 04:24:18.039419    1797 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "nodes.private-shared-subnet.example.com"
}
iam-instance-profile:nodes.private-shared-subnet.example.com	ok
I0822 04:24:18.039476    1797 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 04:24:18.039519    1797 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "masters.private-shared-subnet.example.com",
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 04:24:18.039544    1797 iamrole.go:133] DeleteRole: {
  RoleName: "masters.private-shared-subnet.example.com"
}
iam-role:masters.private-shared-subnet.example.com	ok
I0822 04:24:18.039577    1797 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "bastions.private-shared-subnet.example.com",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 04:24:18.039604    1797 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "bastions.private-shared-subnet.example.com"
}
iam-instance-profile:bastions.private-shared-subnet.example.com	ok
I0822 04:24:18.039633    1797 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 04:24:18.039657    1797 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "nodes.private-shared-subnet.example.com",
  RoleName: "nodes.private-shared-subnet.example.com"
}
I0822 04:24:18.039676    1797 iamrole.go:133] DeleteRole: {
  RoleName: "nodes.private-shared-subnet.example.com"
}
iam-role:nodes.private-shared-subnet.example.com	ok
I0822 04:24:18.039705    1797 iamrolepolicy.go:104] ListRolePolicies: {
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 04:24:18.039728    1797 iamrolepolicy.go:152] DeleteRolePolicy: {
  PolicyName: "bastions.private-shared-subnet.example.com",
  RoleName: "bastions.private-shared-subnet.example.com"
}
I0822 04:24:18.039975    1797 iamrole.go:133] DeleteRole: {
  RoleName: "bastions.private-shared-subnet.example.com"
}
iam-role:bastions.private-shared-subnet.example.com	ok
I0822 04:24:18.040006    1797 iaminstanceprofile.go:121] RemoveRoleFromInstanceProfile: {
  InstanceProfileName: "masters.private-shared-subnet.example.com",
  RoleName: "masters.private-shared-subnet.example.com"
}
I0822 04:24:18.040033    1797 iaminstanceprofile.go:205] DeleteInstanceProfile: {
  InstanceProfileName: "masters.private-shared-subnet.example.com"
}
iam-instance-profile:masters.private-shared-subnet.example.com	ok
I0822 04:24:18.039114    1797 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "master-us-test-1a.masters.private-shared-subnet.example.com",
  ForceDelete: true
}
autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com	ok
I0822 04:24:18.040097    1797 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "bastion.private-shared-subnet.example.com",
  ForceDelete: true
}
autoscaling-group:bastion.private-shared-subnet.example.com	ok
I0822 04:24:18.040137    1797 group.go:209] DeleteAutoScalingGroup: {
  AutoScalingGroupName: "nodes.private-shared-subnet.example.com",
  ForceDelete: true
}
autoscaling-group:nodes.private-shared-subnet.example.com	ok
I0822 04:24:18.039189    1797 api.go:149] DeleteLoadBalancer: {
  LoadBalancerName: "api-private-shared-subnet-n2f8ak"
}
load-balancer:api-private-shared-subnet-n2f8ak	ok
I0822 04:24:18.040199    1797 api.go:149] DeleteLoadBalancer: {
  LoadBalancerName: "bastion-private-shared-su-5ol32q"
}
load-balancer:bastion-private-shared-su-5ol32q	ok
I0822 04:24:18.039337    1797 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-5",
  IpPermissions: [{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    },{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    },{
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    }]
}
W0822 04:24:18.040317    1797 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 04:24:18.040344    1797 volumes.go:193] DeleteVolume: {
  VolumeId: "vol-2"
}
volume:vol-2	ok
I0822 04:24:18.040400    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-2"]
}
I0822 04:24:18.040458    1797 keypairs.go:139] DeleteKeyPair: {
  KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"
}
I0822 04:24:18.040505    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-1"]
}
I0822 04:24:18.040541    1797 volumes.go:193] DeleteVolume: {
  VolumeId: "vol-1"
}
I0822 04:24:18.040570    1797 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-5"
}
I0822 04:24:18.040595    1797 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-2",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-4"
        }]
    }]
}
W0822 04:24:18.040646    1797 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 04:24:18.040662    1797 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-2"
}
I0822 04:24:18.040693    1797 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-1",
  IpPermissions: [
    {
      FromPort: 1,
      IpProtocol: "udp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    },
    {
      FromPort: 2382,
      IpProtocol: "tcp",
      ToPort: 4000,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    },
    {
      FromPort: 4003,
      IpProtocol: "tcp",
      ToPort: 65535,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    },
    {
      FromPort: 443,
      IpProtocol: "tcp",
      ToPort: 443,
      UserIdGroupPairs: [{
          GroupId: "sg-3"
        }]
    },
    {
      IpProtocol: "-1",
      UserIdGroupPairs: [{
          GroupId: "sg-1"
        }]
    },
    {
      FromPort: 22,
      IpProtocol: "tcp",
      ToPort: 22,
      UserIdGroupPairs: [{
          GroupId: "sg-2"
        }]
    },
    {
      FromPort: 1,
      IpProtocol: "tcp",
      ToPort: 2379,
      UserIdGroupPairs: [{
          GroupId: "sg-5"
        }]
    }
  ]
}
W0822 04:24:18.040791    1797 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 04:24:18.040807    1797 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-1"
}
keypair:kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57	ok
volume:vol-1	ok
security-group:sg-5	ok
security-group:sg-2	ok
security-group:sg-1	ok
I0822 04:24:18.040923    1797 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "bastion.private-shared-subnet.example.com-20190822042417"
}
autoscaling-config:bastion.private-shared-subnet.example.com-20190822042417	ok
I0822 04:24:18.040969    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-3"]
}
I0822 04:24:18.041081    1797 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-3",
  IpPermissions: [{
      FromPort: 3,
      IpProtocol: "icmp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 4
    },{
      FromPort: 443,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 443
    }]
}
W0822 04:24:18.041133    1797 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 04:24:18.041147    1797 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-3"
}
I0822 04:24:18.041164    1797 securitygroups.go:105] DescribeSecurityGroups: {
  GroupIds: ["sg-4"]
}
I0822 04:24:18.041189    1797 securitygroups.go:193] RevokeSecurityGroupIngress: {
  GroupId: "sg-4",
  IpPermissions: [{
      FromPort: 22,
      IpProtocol: "tcp",
      IpRanges: [{
          CidrIp: "0.0.0.0/0"
        }],
      ToPort: 22
    }]
}
W0822 04:24:18.041226    1797 securitygroups.go:211] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions
I0822 04:24:18.041239    1797 securitygroups.go:74] DeleteSecurityGroup: {
  GroupId: "sg-4"
}
I0822 04:24:18.041271    1797 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "master-us-test-1a.masters.private-shared-subnet.example.com-20190822042417"
}
I0822 04:24:18.041309    1797 launchconfigurations.go:124] DeleteLaunchConfiguration: {
  LaunchConfigurationName: "nodes.private-shared-subnet.example.com-20190822042417"
}
security-group:sg-3	ok
security-group:sg-4	ok
autoscaling-config:master-us-test-1a.masters.private-shared-subnet.example.com-20190822042417	ok
autoscaling-config:nodes.private-shared-subnet.example.com-20190822042417	ok
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


//cmd/kops/go_default_test:shard_4_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_4_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 04:24:16.283245    1854 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.283312    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.283346    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.283377    1854 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.283406    1854 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.374474    1854 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:16.374500    1854 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 04:24:16.374509    1854 subnets.go:184] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c
I0822 04:24:16.375254    1854 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.445578    1854 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.445684    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.445734    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.445785    1854 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.445834    1854 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.470963    1854 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:16.471050    1854 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 04:24:16.471078    1854 subnets.go:184] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c
I0822 04:24:16.471490    1854 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.481922    1854 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.482021    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.482064    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.482118    1854 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.482154    1854 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.509534    1854 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:16.509609    1854 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 04:24:16.509635    1854 subnets.go:184] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c
I0822 04:24:16.509988    1854 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.535565    1854 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.535613    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.535639    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.535670    1854 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.535698    1854 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:16.632510    1854 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:16.632601    1854 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 04:24:16.632642    1854 subnets.go:184] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c
I0822 04:24:16.633036    1854 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.682069    1854 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.682112    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.682137    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.695153    1854 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:17.220862    1854 zones.go:91] ListHostedZonesPages {

}
W0822 04:24:17.288520    1854 task.go:108] overriding task *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-node-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}, lifecycle ExistsAndWarnIfChanges
W0822 04:24:17.288707    1854 task.go:108] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-node-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"minimal.example.com","creationTimestamp":"2016-12-10T22:42:27Z"},"spec":{"channel":"stable","configBase":"memfs://clusters.example.com/minimal.example.com","cloudProvider":"aws","kubernetesVersion":"1.4.12","subnets":[{"name":"us-test-1a","cidr":"172.20.32.0/19","zone":"us-test-1a","type":"Public"}],"masterPublicName":"api.minimal.example.com","masterInternalName":"api.internal.minimal.example.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"memfs://clusters.example.com/minimal.example.com/secrets","keyStore":"memfs://clusters.example.com/minimal.example.com/pki","configStore":"memfs://clusters.example.com/minimal.example.com","dnsZone":"Z1AFAKE1ZON3YO","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Legacy","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"version":"2.2.1","image":"gcr.io/google_containers/etcd:2.2.1"},{"name":"events","provider":"Legacy","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"version":"2.2.1","image":"gcr.io/google_containers/etcd:2.2.1"}],"docker":{"ipMasq":false,"ipTables":false,"logLevel":"warn","storage":"overlay,aufs","version":"1.11.2"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"gcr.io/google_containers/kube-apiserver:v1.4.12","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"address":"127.0.0.1","admissionControl":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"storageBackend":"etcd2","authorizationMode":"AlwaysAllow"},"kubeControllerManager":{"master":"127.0.0.1:8080","logLevel":2,"image":"gcr.io/google_containers/kube-controller-manager:v1.4.12","cloudProvider":"aws","clusterName":"minimal.example.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s"},"kubeScheduler":{"master":"http://127.0.0.1:8080","logLevel":2,"image":"gcr.io/google_containers/kube-scheduler:v1.4.12","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"gcr.io/google_containers/kube-proxy:v1.4.12","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"apiServers":"https://api.internal.minimal.example.com","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"docker","babysitDaemons":true,"reconcileCIDR":true,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"masterKubelet":{"apiServers":"http://127.0.0.1:8080","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"docker","babysitDaemons":true,"podCIDR":"10.123.45.0/28","reconcileCIDR":true,"registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}},"iam":{"legacy":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-test-1","ResourceARN":null,"Role":"Node"},"DNSZone":{"Name":"Z1AFAKE1ZON3YO","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z1AFAKE1ZON3YO","Private":null,"PrivateVPC":null}}}, lifecycle ExistsAndWarnIfChanges
W0822 04:24:17.289079    1854 task.go:108] overriding task *awstasks.IAMInstanceProfileRole {"Name":"kops-custom-node-role","Lifecycle":"Sync","InstanceProfile":{"Name":"kops-custom-node-role","Lifecycle":"Sync","ID":null,"Shared":true},"Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}}, lifecycle ExistsAndWarnIfChanges
W0822 04:24:17.289161    1854 task.go:108] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.kops-custom-node-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Name":"","Resource":""}}, lifecycle ExistsAndWarnIfChanges
W0822 04:24:17.289250    1854 task.go:108] overriding task *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-master-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}, lifecycle ExistsAndWarnIfChanges
W0822 04:24:17.289321    1854 task.go:108] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-master-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"minimal.example.com","creationTimestamp":"2016-12-10T22:42:27Z"},"spec":{"channel":"stable","configBase":"memfs://clusters.example.com/minimal.example.com","cloudProvider":"aws","kubernetesVersion":"1.4.12","subnets":[{"name":"us-test-1a","cidr":"172.20.32.0/19","zone":"us-test-1a","type":"Public"}],"masterPublicName":"api.minimal.example.com","masterInternalName":"api.internal.minimal.example.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"memfs://clusters.example.com/minimal.example.com/secrets","keyStore":"memfs://clusters.example.com/minimal.example.com/pki","configStore":"memfs://clusters.example.com/minimal.example.com","dnsZone":"Z1AFAKE1ZON3YO","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Legacy","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"version":"2.2.1","image":"gcr.io/google_containers/etcd:2.2.1"},{"name":"events","provider":"Legacy","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"version":"2.2.1","image":"gcr.io/google_containers/etcd:2.2.1"}],"docker":{"ipMasq":false,"ipTables":false,"logLevel":"warn","storage":"overlay,aufs","version":"1.11.2"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"gcr.io/google_containers/kube-apiserver:v1.4.12","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"address":"127.0.0.1","admissionControl":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"storageBackend":"etcd2","authorizationMode":"AlwaysAllow"},"kubeControllerManager":{"master":"127.0.0.1:8080","logLevel":2,"image":"gcr.io/google_containers/kube-controller-manager:v1.4.12","cloudProvider":"aws","clusterName":"minimal.example.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s"},"kubeScheduler":{"master":"http://127.0.0.1:8080","logLevel":2,"image":"gcr.io/google_containers/kube-scheduler:v1.4.12","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"gcr.io/google_containers/kube-proxy:v1.4.12","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"apiServers":"https://api.internal.minimal.example.com","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"docker","babysitDaemons":true,"reconcileCIDR":true,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"masterKubelet":{"apiServers":"http://127.0.0.1:8080","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"docker","babysitDaemons":true,"podCIDR":"10.123.45.0/28","reconcileCIDR":true,"registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}},"iam":{"legacy":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-test-1","ResourceARN":null,"Role":"Master"},"DNSZone":{"Name":"Z1AFAKE1ZON3YO","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z1AFAKE1ZON3YO","Private":null,"PrivateVPC":null}}}, lifecycle ExistsAndWarnIfChanges
W0822 04:24:17.289514    1854 task.go:108] overriding task *awstasks.IAMInstanceProfileRole {"Name":"kops-custom-master-role","Lifecycle":"Sync","InstanceProfile":{"Name":"kops-custom-master-role","Lifecycle":"Sync","ID":null,"Shared":true},"Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}}, lifecycle ExistsAndWarnIfChanges
W0822 04:24:17.289554    1854 task.go:108] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.kops-custom-master-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Name":"","Resource":""}}, lifecycle ExistsAndWarnIfChanges
I0822 04:24:17.298427    1854 executor.go:103] Tasks: 0 done / 77 total; 35 can run
I0822 04:24:17.298895    1854 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 04:24:17.298919    1854 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:17.298945    1854 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
W0822 04:24:17.301835    1854 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 04:24:17.301856    1854 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:17.301892    1854 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 04:24:17.336097    1854 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:17.343064    1854 vfs_castore.go:729] Issuing new certificate: "ca"
W0822 04:24:17.344544    1854 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
W0822 04:24:17.344621    1854 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
I0822 04:24:17.344665    1854 executor.go:103] Tasks: 35 done / 77 total; 24 can run
W0822 04:24:17.359868    1854 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 04:24:17.378859    1854 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:17.379177    1854 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
W0822 04:24:17.381765    1854 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 04:24:17.382717    1854 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:17.384094    1854 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:17.388180    1854 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:17.389103    1854 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:17.391544    1854 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:17.400422    1854 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:17.410044    1854 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:17.410231    1854 vfs_castore.go:729] Issuing new certificate: "master"
W0822 04:24:17.415085    1854 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
W0822 04:24:17.415161    1854 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
W0822 04:24:17.415190    1854 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
W0822 04:24:17.415215    1854 executor.go:122] Lifecycle set to ExistsAndWarnIfChanges and object was not found.
I0822 04:24:17.415268    1854 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 04:24:17.416143    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.417156    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.417322    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.417472    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.421001    1854 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 04:24:17.421752    1854 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 04:24:17.426171    1854 target.go:171] Cloudformation output is in /tmp/test198184421/out
--- FAIL: TestExistingIAMCloudformation (0.75s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesminimalexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/existing_iam_cloudformation/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersminimalexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/existing_iam_cloudformation/cloudformation.json.extracted.yaml
I0822 04:24:17.434339    1854 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:17.434487    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:17.434543    1854 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:17.444512    1854 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 04:24:17.482971    1854 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:17.639568    1854 executor.go:103] Tasks: 0 done / 101 total; 41 can run
I0822 04:24:17.655891    1854 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:17.655936    1854 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:17.655960    1854 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:17.663082    1854 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:17.665906    1854 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:17.668234    1854 executor.go:103] Tasks: 41 done / 101 total; 30 can run
W0822 04:24:17.683607    1854 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
W0822 04:24:17.683802    1854 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
W0822 04:24:17.683886    1854 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
W0822 04:24:17.684124    1854 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
W0822 04:24:17.684285    1854 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
W0822 04:24:17.684401    1854 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder
I0822 04:24:17.694792    1854 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:17.695533    1854 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:17.698684    1854 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:17.703216    1854 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:17.707983    1854 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:17.709010    1854 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:17.709345    1854 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:17.704219    1854 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:17.721838    1854 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:17.728175    1854 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:17.736269    1854 executor.go:103] Tasks: 71 done / 101 total; 24 can run
I0822 04:24:17.737655    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.737874    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.737741    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.738711    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.739737    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.739900    1854 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-01-09"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.743568    1854 executor.go:103] Tasks: 95 done / 101 total; 4 can run
I0822 04:24:17.747779    1854 executor.go:103] Tasks: 99 done / 101 total; 2 can run
I0822 04:24:17.748190    1854 executor.go:103] Tasks: 101 done / 101 total; 0 can run
I0822 04:24:17.775745    1854 target.go:312] Terraform output is in /tmp/test078284639/out
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


//cmd/kops/go_default_test:shard_6_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_6_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 04:24:13.287017    1643 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.287234    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.287893    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.287976    1643 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.288031    1643 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
W0822 04:24:13.366615    1643 create_cluster.go:720] Running with masters in the same AZs; redundancy will be reduced
I0822 04:24:13.366832    1643 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:13.366879    1643 subnets.go:184] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b
I0822 04:24:13.367368    1643 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:13.421836    1643 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.421927    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.421982    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.429384    1643 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:13.848794    1643 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:13.920435    1643 executor.go:103] Tasks: 0 done / 77 total; 35 can run
I0822 04:24:13.922688    1643 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 04:24:13.922792    1643 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:13.922878    1643 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
W0822 04:24:13.923061    1643 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 04:24:13.923080    1643 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.additionaluserdata.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:13.923112    1643 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.additionaluserdata.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 04:24:13.927963    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:13.930814    1643 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:13.938569    1643 executor.go:103] Tasks: 35 done / 77 total; 24 can run
W0822 04:24:13.947173    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionaluserdata.example.com" for IAM policy builder
W0822 04:24:13.947745    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionaluserdata.example.com" for IAM policy builder
W0822 04:24:13.948918    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionaluserdata.example.com" for IAM policy builder
I0822 04:24:13.951336    1643 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:13.953590    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:13.954305    1643 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:13.958013    1643 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:13.958297    1643 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:13.961606    1643 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:13.962968    1643 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:13.970805    1643 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
W0822 04:24:13.969942    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/additionaluserdata.example.com" for IAM policy builder
I0822 04:24:13.971579    1643 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:13.982653    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:13.996939    1643 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 04:24:14.001998    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.003498    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.002320    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.005157    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.005908    1643 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 04:24:14.006271    1643 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 04:24:14.008077    1643 target.go:171] Cloudformation output is in /tmp/test226549400/out
--- FAIL: TestAdditionalUserData (0.59s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersadditionaluserdataexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/additional_user-data/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationnodesadditionaluserdataexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/additional_user-data/cloudformation.json.extracted.yaml
I0822 04:24:14.012286    1643 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:14.012368    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:14.012399    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:14.115943    1643 dns.go:94] Private DNS: skipping DNS validation
I0822 04:24:14.286522    1643 executor.go:103] Tasks: 0 done / 110 total; 41 can run
I0822 04:24:14.302828    1643 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:14.303917    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:14.305324    1643 executor.go:103] Tasks: 41 done / 110 total; 29 can run
I0822 04:24:14.305737    1643 dnszone.go:242] Check for existing route53 zone to re-use with name "internal.example.com"
I0822 04:24:14.305791    1643 zones.go:40] GetHostedZone {
  Id: "/hostedzone/Z2AFAKE1ZON3NO"
}
I0822 04:24:14.305827    1643 dnszone.go:249] Existing zone "internal.example.com." found; will configure TF to reuse
I0822 04:24:14.305852    1643 dnszone.go:272] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding
I0822 04:24:14.312095    1643 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:14.329481    1643 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:14.338620    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:14.348237    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:14.348327    1643 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:14.348626    1643 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:14.349962    1643 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:14.363168    1643 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:14.369487    1643 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:14.371491    1643 executor.go:103] Tasks: 70 done / 110 total; 31 can run
W0822 04:24:14.372844    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
W0822 04:24:14.373041    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
W0822 04:24:14.373146    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
I0822 04:24:14.373348    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.373538    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
W0822 04:24:14.374298    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
W0822 04:24:14.374568    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
W0822 04:24:14.374691    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder
I0822 04:24:14.375391    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.375579    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.378089    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.378233    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.379426    1643 executor.go:103] Tasks: 101 done / 110 total; 6 can run
W0822 04:24:14.381322    1643 api.go:53] PageSize not implemented
W0822 04:24:14.381464    1643 keypair.go:140] Task did not have an address: *awstasks.LoadBalancer {"Name":"api.privatedns1.example.com","Lifecycle":"Sync","LoadBalancerName":"api-privatedns1-example-c-lq96ht","DNSName":null,"HostedZoneId":null,"Subnets":[{"Name":"utility-us-test-1a.privatedns1.example.com","ShortName":"utility-us-test-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"privatedns1.example.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"privatedns1.example.com","kubernetes.io/cluster/privatedns1.example.com":"owned"}},"AvailabilityZone":"us-test-1a","CIDR":"172.20.4.0/22","Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"utility-us-test-1a.privatedns1.example.com","SubnetType":"Utility","kubernetes.io/cluster/privatedns1.example.com":"owned","kubernetes.io/role/elb":"1"}}],"SecurityGroups":[{"Name":"api-elb.privatedns1.example.com","Lifecycle":"Sync","ID":null,"Description":"Security group for api ELB","VPC":{"Name":"privatedns1.example.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"privatedns1.example.com","kubernetes.io/cluster/privatedns1.example.com":"owned"}},"RemoveExtraRules":["port=443"],"Shared":null,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"api-elb.privatedns1.example.com","kubernetes.io/cluster/privatedns1.example.com":"owned"}}],"Listeners":{"443":{"InstancePort":443,"SSLCertificateID":""}},"Scheme":null,"HealthCheck":{"Target":"SSL:443","HealthyThreshold":2,"UnhealthyThreshold":2,"Interval":10,"Timeout":5},"AccessLog":null,"ConnectionDraining":null,"ConnectionSettings":{"IdleTimeout":300},"CrossZoneLoadBalancing":{"Enabled":false},"SSLCertificateID":"","Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"api.privatedns1.example.com","kubernetes.io/cluster/privatedns1.example.com":"owned"}}
I0822 04:24:14.392583    1643 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:14.394463    1643 executor.go:103] Tasks: 107 done / 110 total; 3 can run
I0822 04:24:14.395107    1643 executor.go:103] Tasks: 110 done / 110 total; 0 can run
I0822 04:24:14.409715    1643 target.go:312] Terraform output is in /tmp/test774926218/out
I0822 04:24:14.411389    1643 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:14.411544    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:14.411594    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:14.433756    1643 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.12.10
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.12.10

*********************************************************************************


*********************************************************************************

Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities.
It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'

See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api

*********************************************************************************

I0822 04:24:14.477863    1643 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:14.638470    1643 executor.go:103] Tasks: 0 done / 98 total; 48 can run
I0822 04:24:14.639717    1643 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:14.639736    1643 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:14.639753    1643 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:14.644352    1643 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main"
I0822 04:24:14.647615    1643 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:14.650409    1643 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events"
I0822 04:24:14.661587    1643 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main"
I0822 04:24:14.675262    1643 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca"
I0822 04:24:14.676701    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:14.724691    1643 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events"
I0822 04:24:14.726972    1643 executor.go:103] Tasks: 48 done / 98 total; 26 can run
W0822 04:24:14.727211    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:14.754857    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:14.755019    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:14.730695    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:14.755189    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 04:24:14.755206    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 04:24:14.755427    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
I0822 04:24:14.741208    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:14.748615    1643 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:14.755945    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:14.757390    1643 vfs_castore.go:729] Issuing new certificate: "master"
W0822 04:24:14.760497    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
I0822 04:24:14.771615    1643 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:14.774429    1643 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:14.775331    1643 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
W0822 04:24:14.777100    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
I0822 04:24:14.795330    1643 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
W0822 04:24:14.794286    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:14.799597    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 04:24:14.799625    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
I0822 04:24:14.802336    1643 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:14.808899    1643 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:14.821062    1643 executor.go:103] Tasks: 74 done / 98 total; 20 can run
I0822 04:24:14.821987    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.825341    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.826742    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.826854    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.827763    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.828128    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.828057    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.830560    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.831989    1643 executor.go:103] Tasks: 94 done / 98 total; 4 can run
I0822 04:24:14.832327    1643 executor.go:103] Tasks: 98 done / 98 total; 0 can run
I0822 04:24:14.855134    1643 target.go:312] Terraform output is in /tmp/test186923852/out
I0822 04:24:14.858758    1643 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:14.858854    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:14.858901    1643 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:14.893316    1643 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.12.10
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.12.10

*********************************************************************************


*********************************************************************************

Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities.
It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'

See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api

*********************************************************************************

I0822 04:24:14.936306    1643 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:15.152401    1643 executor.go:103] Tasks: 0 done / 98 total; 48 can run
I0822 04:24:15.163500    1643 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:15.165014    1643 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 04:24:15.165090    1643 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:15.165135    1643 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
W0822 04:24:15.165546    1643 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 04:24:15.165610    1643 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:15.165661    1643 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 04:24:15.173359    1643 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events"
I0822 04:24:15.178804    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:15.179057    1643 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events"
I0822 04:24:15.181323    1643 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main"
I0822 04:24:15.182293    1643 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca"
I0822 04:24:15.184876    1643 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main"
I0822 04:24:15.186494    1643 executor.go:103] Tasks: 48 done / 98 total; 26 can run
W0822 04:24:15.190551    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:15.192625    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
I0822 04:24:15.193679    1643 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:15.190657    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:15.191019    1643 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
W0822 04:24:15.191109    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
I0822 04:24:15.196932    1643 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:15.198936    1643 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:15.202124    1643 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:15.210194    1643 vfs_castore.go:729] Issuing new certificate: "master"
W0822 04:24:15.210496    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
I0822 04:24:15.211071    1643 vfs_castore.go:729] Issuing new certificate: "kops"
W0822 04:24:15.212540    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 04:24:15.214015    1643 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:15.214086    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 04:24:15.214118    1643 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
I0822 04:24:15.216418    1643 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:15.283246    1643 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:15.287001    1643 executor.go:103] Tasks: 74 done / 98 total; 20 can run
I0822 04:24:15.298113    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.298520    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.298882    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.299087    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.321650    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.323987    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.319626    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.330890    1643 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.339191    1643 executor.go:103] Tasks: 94 done / 98 total; 4 can run
I0822 04:24:15.342921    1643 executor.go:103] Tasks: 98 done / 98 total; 0 can run
I0822 04:24:15.356832    1643 target.go:171] Cloudformation output is in /tmp/test457705054/out
--- FAIL: TestMixedInstancesASG (0.95s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersmixedinstancesexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1bmastersmixedinstancesexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1cmastersmixedinstancesexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSEC2LaunchTemplatenodesmixedinstancesexamplecom.Properties.LaunchTemplateData.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances/cloudformation.json.extracted.yaml
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


//cmd/kops/go_default_test:shard_7_of_10 0.00s

bazel test //cmd/kops/go_default_test:shard_7_of_10
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
Executing tests from //cmd/kops:go_default_test
-----------------------------------------------------------------------------
I0822 04:24:13.391778    1658 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.391947    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.392003    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.392050    1658 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.392097    1658 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.516668    1658 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:13.516815    1658 subnets.go:198] Assigned CIDR 172.20.0.0/22 to subnet utility-us-test-1a
I0822 04:24:13.517281    1658 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:13.517408    1658 utils.go:198] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public"
I0822 04:24:13.648789    1658 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.649479    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.649537    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.649575    1658 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.10.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.649602    1658 subnets.go:91] CreateSubnet: {
  AvailabilityZone: "us-test-1a",
  CidrBlock: "10.11.0.0/24",
  VpcId: "vpc-12345678"
}
I0822 04:24:13.713960    1658 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a
I0822 04:24:13.714111    1658 subnets.go:198] Assigned CIDR 172.20.0.0/22 to subnet utility-us-test-1a
I0822 04:24:13.714576    1658 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:13.714669    1658 utils.go:198] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public"
I0822 04:24:13.725677    1658 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:13.725866    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:13.725918    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:13.763008    1658 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:14.299245    1658 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:14.445420    1658 executor.go:103] Tasks: 0 done / 77 total; 35 can run
I0822 04:24:14.483882    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:14.488384    1658 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:14.505522    1658 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:14.505660    1658 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:14.553525    1658 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:14.555125    1658 executor.go:103] Tasks: 35 done / 77 total; 24 can run
I0822 04:24:14.568263    1658 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:14.568951    1658 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
W0822 04:24:14.569140    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:14.569596    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:14.569769    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:14.570547    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:14.570817    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:14.571589    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 04:24:14.575868    1658 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:14.578485    1658 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:14.579493    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:14.581094    1658 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:14.592772    1658 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:14.594775    1658 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:14.598024    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:14.605543    1658 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:14.606921    1658 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 04:24:14.608268    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.608860    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.608749    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.610570    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.612484    1658 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 04:24:14.612901    1658 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 04:24:14.618592    1658 target.go:312] Terraform output is in /tmp/test307610144/out
I0822 04:24:14.619507    1658 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:14.619573    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:14.619611    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:14.624267    1658 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:14.676721    1658 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:14.765029    1658 executor.go:103] Tasks: 0 done / 77 total; 35 can run
I0822 04:24:14.779742    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:14.786274    1658 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:14.787588    1658 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:14.787949    1658 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:14.788006    1658 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:14.788061    1658 executor.go:103] Tasks: 35 done / 77 total; 24 can run
W0822 04:24:14.788736    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:14.821742    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:14.821942    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 04:24:14.818574    1658 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:14.823612    1658 vfs_castore.go:729] Issuing new certificate: "kops"
W0822 04:24:14.823846    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:14.823995    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:14.824081    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 04:24:14.828552    1658 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:14.865780    1658 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:14.873884    1658 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:14.911318    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:14.912296    1658 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:14.920786    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:14.920833    1658 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:14.929606    1658 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:14.930853    1658 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 04:24:14.932127    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.932241    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.932750    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.932899    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:14.935068    1658 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 04:24:14.935613    1658 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 04:24:14.944123    1658 target.go:312] Terraform output is in /tmp/test027774034/out
I0822 04:24:14.945318    1658 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:14.945405    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:14.945474    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:14.974189    1658 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 04:24:15.206424    1658 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:15.473830    1658 executor.go:103] Tasks: 0 done / 77 total; 35 can run
I0822 04:24:15.474869    1658 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:15.474929    1658 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:15.474955    1658 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:15.490914    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:15.532365    1658 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:15.534221    1658 executor.go:103] Tasks: 35 done / 77 total; 24 can run
W0822 04:24:15.537182    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:15.537413    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:15.537530    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:15.537709    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
W0822 04:24:15.537845    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 04:24:15.558720    1658 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:15.564468    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:15.567494    1658 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
W0822 04:24:15.575490    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder
I0822 04:24:15.577313    1658 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:15.589092    1658 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:15.590399    1658 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:15.589330    1658 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:15.594344    1658 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:15.597526    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:15.601951    1658 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:15.603337    1658 executor.go:103] Tasks: 59 done / 77 total; 16 can run
I0822 04:24:15.603770    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.604851    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.603969    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.606997    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.608041    1658 executor.go:103] Tasks: 75 done / 77 total; 2 can run
I0822 04:24:15.608359    1658 executor.go:103] Tasks: 77 done / 77 total; 0 can run
I0822 04:24:15.631587    1658 target.go:312] Terraform output is in /tmp/test969511252/out
I0822 04:24:15.632845    1658 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:15.632958    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:15.633008    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:15.639858    1658 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.8.15
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.8.15

*********************************************************************************

I0822 04:24:15.705879    1658 zones.go:91] ListHostedZonesPages {

}
W0822 04:24:15.850595    1658 firewall.go:250] Opening etcd port on masters for access from the nodes, for calico.  This is unsafe in untrusted environments.
I0822 04:24:15.859225    1658 executor.go:103] Tasks: 0 done / 110 total; 41 can run
I0822 04:24:15.886877    1658 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:15.886902    1658 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:15.887011    1658 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:15.896819    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:15.902861    1658 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:15.904781    1658 executor.go:103] Tasks: 41 done / 110 total; 32 can run
W0822 04:24:15.905084    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
W0822 04:24:15.925794    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
W0822 04:24:15.925901    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
W0822 04:24:15.907685    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
W0822 04:24:15.926129    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
W0822 04:24:15.926236    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder
I0822 04:24:15.914066    1658 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:15.926400    1658 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:15.931377    1658 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:15.933466    1658 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:15.945575    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:15.950381    1658 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:15.952833    1658 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:15.953853    1658 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:15.965718    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:15.968705    1658 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:15.970379    1658 executor.go:103] Tasks: 73 done / 110 total; 29 can run
I0822 04:24:15.973042    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.973457    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.974835    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.975521    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.971392    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.975853    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:15.978214    1658 executor.go:103] Tasks: 102 done / 110 total; 5 can run
I0822 04:24:15.979203    1658 executor.go:103] Tasks: 107 done / 110 total; 3 can run
I0822 04:24:15.980567    1658 executor.go:103] Tasks: 110 done / 110 total; 0 can run
I0822 04:24:15.997366    1658 target.go:312] Terraform output is in /tmp/test872106406/out
I0822 04:24:16.000056    1658 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.000190    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.000242    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.074405    1658 dns.go:94] Private DNS: skipping DNS validation
I0822 04:24:16.171272    1658 executor.go:103] Tasks: 0 done / 108 total; 40 can run
I0822 04:24:16.177282    1658 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:16.179462    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:16.181174    1658 executor.go:103] Tasks: 40 done / 108 total; 28 can run
I0822 04:24:16.181364    1658 internetgateways.go:97] DescribeInternetGateways: {
  Filters: [{
      Name: "attachment.vpc-id",
      Values: ["vpc-12345678"]
    }]
}
I0822 04:24:16.192652    1658 dnszone.go:242] Check for existing route53 zone to re-use with name "private.example.com"
I0822 04:24:16.192686    1658 zones.go:40] GetHostedZone {
  Id: "/hostedzone/Z3AFAKE1ZOMORE"
}
I0822 04:24:16.192713    1658 dnszone.go:249] Existing zone "private.example.com." found; will configure TF to reuse
I0822 04:24:16.192722    1658 dnszone.go:263] VPC "vpc-12345678" already associated with zone "private.example.com."
I0822 04:24:16.192743    1658 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:16.193151    1658 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:16.202954    1658 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:16.206157    1658 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:16.206649    1658 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:16.211003    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:16.213420    1658 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:16.214007    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:16.214793    1658 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:16.216253    1658 executor.go:103] Tasks: 68 done / 108 total; 31 can run
I0822 04:24:16.216686    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.216798    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.217018    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.217143    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
W0822 04:24:16.217416    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
W0822 04:24:16.217836    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
W0822 04:24:16.217976    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
I0822 04:24:16.217635    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
W0822 04:24:16.218031    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
W0822 04:24:16.218059    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
I0822 04:24:16.218041    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
W0822 04:24:16.218139    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder
I0822 04:24:16.220013    1658 executor.go:103] Tasks: 99 done / 108 total; 6 can run
W0822 04:24:16.220137    1658 api.go:53] PageSize not implemented
W0822 04:24:16.220172    1658 keypair.go:140] Task did not have an address: *awstasks.LoadBalancer {"Name":"api.privatedns2.example.com","Lifecycle":"Sync","LoadBalancerName":"api-privatedns2-example-c-6jft30","DNSName":null,"HostedZoneId":null,"Subnets":[{"Name":"utility-us-test-1a.privatedns2.example.com","ShortName":"utility-us-test-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"privatedns2.example.com","Lifecycle":"Sync","ID":"vpc-12345678","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":true,"Tags":null},"AvailabilityZone":"us-test-1a","CIDR":"172.20.4.0/22","Shared":false,"Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"utility-us-test-1a.privatedns2.example.com","SubnetType":"Utility","kubernetes.io/cluster/privatedns2.example.com":"owned","kubernetes.io/role/elb":"1"}}],"SecurityGroups":[{"Name":"api-elb.privatedns2.example.com","Lifecycle":"Sync","ID":null,"Description":"Security group for api ELB","VPC":{"Name":"privatedns2.example.com","Lifecycle":"Sync","ID":"vpc-12345678","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":true,"Tags":null},"RemoveExtraRules":["port=443"],"Shared":null,"Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"api-elb.privatedns2.example.com","kubernetes.io/cluster/privatedns2.example.com":"owned"}}],"Listeners":{"443":{"InstancePort":443,"SSLCertificateID":""}},"Scheme":null,"HealthCheck":{"Target":"SSL:443","HealthyThreshold":2,"UnhealthyThreshold":2,"Interval":10,"Timeout":5},"AccessLog":null,"ConnectionDraining":null,"ConnectionSettings":{"IdleTimeout":300},"CrossZoneLoadBalancing":{"Enabled":false},"SSLCertificateID":"","Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"api.privatedns2.example.com","kubernetes.io/cluster/privatedns2.example.com":"owned"}}
I0822 04:24:16.233964    1658 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:16.237583    1658 executor.go:103] Tasks: 105 done / 108 total; 3 can run
I0822 04:24:16.237968    1658 executor.go:103] Tasks: 108 done / 108 total; 0 can run
I0822 04:24:16.270372    1658 target.go:312] Terraform output is in /tmp/test975901128/out
I0822 04:24:16.275881    1658 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.276062    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.276121    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.294381    1658 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.12.10
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.12.10

*********************************************************************************


*********************************************************************************

Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities.
It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'

See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api

*********************************************************************************

I0822 04:24:16.348070    1658 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.507180    1658 executor.go:103] Tasks: 0 done / 98 total; 48 can run
I0822 04:24:16.508404    1658 dnszone.go:242] Check for existing route53 zone to re-use with name ""
I0822 04:24:16.508432    1658 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:16.508531    1658 dnszone.go:249] Existing zone "example.com." found; will configure TF to reuse
I0822 04:24:16.515213    1658 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:16.520142    1658 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main"
I0822 04:24:16.520423    1658 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca"
I0822 04:24:16.520902    1658 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events"
I0822 04:24:16.531429    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:16.536482    1658 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main"
I0822 04:24:16.552521    1658 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events"
I0822 04:24:16.566729    1658 executor.go:103] Tasks: 48 done / 98 total; 26 can run
W0822 04:24:16.576655    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:16.576696    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 04:24:16.576715    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 04:24:16.576901    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:16.576923    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 04:24:16.576930    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 04:24:16.577025    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:16.577044    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 04:24:16.577052    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 04:24:16.577696    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:16.577843    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:16.577929    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
I0822 04:24:16.578490    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I0822 04:24:16.586583    1658 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:16.606886    1658 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:16.618657    1658 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:16.626372    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:16.632604    1658 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:16.631206    1658 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:16.631753    1658 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:16.639167    1658 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:16.644789    1658 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:16.646316    1658 executor.go:103] Tasks: 74 done / 98 total; 20 can run
I0822 04:24:16.646735    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.647895    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.646963    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.649552    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.647226    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.650290    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.647777    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.655854    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:16.655984    1658 executor.go:103] Tasks: 94 done / 98 total; 4 can run
I0822 04:24:16.675013    1658 executor.go:103] Tasks: 98 done / 98 total; 0 can run
I0822 04:24:16.710708    1658 target.go:312] Terraform output is in /tmp/test167985210/out
I0822 04:24:16.712273    1658 internetgateways.go:66] CreateInternetGateway: {

}
I0822 04:24:16.712361    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-12345678"
}
I0822 04:24:16.712412    1658 subnets.go:166] AuthorizeSecurityGroupIngress: {
  RouteTableId: "rtb-12345678",
  SubnetId: "subnet-abcdef"
}
I0822 04:24:16.724423    1658 zones.go:91] ListHostedZonesPages {

}

*********************************************************************************

A new kubernetes version is available: 1.12.10
Upgrading is recommended (try kops upgrade cluster)

More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.12.10

*********************************************************************************


*********************************************************************************

Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities.
It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster'

See https://github.com/kubernetes/kops/blob/master/docs/security.md#kubelet-api

*********************************************************************************

I0822 04:24:16.777094    1658 zones.go:91] ListHostedZonesPages {

}
I0822 04:24:16.894149    1658 executor.go:103] Tasks: 0 done / 98 total; 48 can run
I0822 04:24:16.896476    1658 dnszone.go:316] Check for existing route53 zone to re-use with name ""
I0822 04:24:16.896572    1658 zones.go:40] GetHostedZone {
  Id: "Z1AFAKE1ZON3YO"
}
I0822 04:24:16.896623    1658 dnszone.go:323] Existing zone "example.com." found; will configure cloudformation to reuse
W0822 04:24:16.896882    1658 sshkey.go:209] Cloudformation does not manage SSH keys; pre-creating SSH key
I0822 04:24:16.896905    1658 keypairs.go:81] DescribeKeyPairs: {
  KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"]
}
I0822 04:24:16.896941    1658 keypairs.go:46] ImportKeyPair: {
  KeyName: "kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57",
  PublicKeyMaterial: <binary> len 213
}
I0822 04:24:16.901055    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I0822 04:24:16.903617    1658 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main"
I0822 04:24:16.906364    1658 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca"
I0822 04:24:16.908215    1658 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events"
I0822 04:24:16.911730    1658 vfs_castore.go:729] Issuing new certificate: "ca"
I0822 04:24:16.917652    1658 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main"
I0822 04:24:16.918763    1658 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events"
I0822 04:24:16.920338    1658 executor.go:103] Tasks: 48 done / 98 total; 26 can run
W0822 04:24:16.920591    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:16.920651    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 04:24:16.920682    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
W0822 04:24:16.920931    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:16.920981    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main"
W0822 04:24:16.920993    1658 iam_builder.go:428] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events"
I0822 04:24:16.943919    1658 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I0822 04:24:16.947258    1658 vfs_castore.go:729] Issuing new certificate: "kubelet"
I0822 04:24:16.954362    1658 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I0822 04:24:16.959225    1658 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I0822 04:24:16.965213    1658 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I0822 04:24:16.966783    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
W0822 04:24:16.983559    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
W0822 04:24:16.983787    1658 iam_builder.go:402] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder
I0822 04:24:17.012884    1658 vfs_castore.go:729] Issuing new certificate: "master"
I0822 04:24:17.016609    1658 vfs_castore.go:729] Issuing new certificate: "kops"
I0822 04:24:17.022789    1658 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I0822 04:24:17.022938    1658 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I0822 04:24:17.024996    1658 executor.go:103] Tasks: 74 done / 98 total; 20 can run
I0822 04:24:17.025277    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.025394    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.027378    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.027519    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.029645    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.030822    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.031028    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.031121    1658 images.go:46] DescribeImages: {
  Filters: [{
      Name: "name",
      Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"]
    }],
  Owners: ["383156758163"]
}
I0822 04:24:17.033798    1658 executor.go:103] Tasks: 94 done / 98 total; 4 can run
I0822 04:24:17.034235    1658 executor.go:103] Tasks: 98 done / 98 total; 0 can run
I0822 04:24:17.037565    1658 target.go:171] Cloudformation output is in /tmp/test764643196/out
--- FAIL: TestMixedInstancesSpotASG (0.77s)
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1amastersmixedinstancesexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances_spot/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1bmastersmixedinstancesexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances_spot/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSAutoScalingLaunchConfigurationmasterustest1cmastersmixedinstancesexamplecom.Properties.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances_spot/cloudformation.json.extracted.yaml
    integration_test.go:644: diff for key Resources.AWSEC2LaunchTemplatenodesmixedinstancesexamplecom.Properties.LaunchTemplateData.UserData:
        ...
                  if ! curl -f --ipv4 -Lo "${file}" --connect-timeout 20 --retry 6 --retry-delay 10 "${url}"; then
                    echo "== Failed to curl ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                else
                  if ! wget --inet4-only -O "${file}" --connect-timeout=20 --tries=6 --wait=10 "${url}"; then
                    echo "== Failed to wget ${url}. Retrying. =="
        +           continue
        -           break
                  fi
                fi
        ...
        
        
        
        
        
        
    integration_test.go:645: cloudformation output differed from expected. Test file: ../../tests/integration/update_cluster/mixed_instances_spot/cloudformation.json.extracted.yaml
FAIL

				from junit_bazel.xml

Filter through log files | View test history on testgrid


Show 65 Passed Tests