text kubespray问题的ansible日志
Posted
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了text kubespray问题的ansible日志相关的知识,希望对你有一定的参考价值。
Using /home/ubuntu/kubespray/ansible.cfg as config file
PLAY [localhost] ************************************************************************************************************************************
skipping: no hosts matched
PLAY [k8s-cluster:etcd:calico-rr] *******************************************************************************************************************
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:47:56 +0000 (0:00:00.095) 0:00:00.095 *******
TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017 05:47:56 +0000 (0:00:00.040) 0:00:00.135 *******
TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017 05:47:56 +0000 (0:00:00.048) 0:00:00.183 *******
TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017 05:47:56 +0000 (0:00:00.018) 0:00:00.202 *******
TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017 05:47:56 +0000 (0:00:00.581) 0:00:00.784 *******
TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.618) 0:00:01.402 *******
ok: [node3] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node2] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] **************************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.205) 0:00:01.608 *******
TASK [bootstrap-os : Bootstrap | Install python 2.x and pip] ****************************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.070) 0:00:01.679 *******
TASK [bootstrap-os : set_fact] **********************************************************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.039) 0:00:01.718 *******
TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] **************************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.038) 0:00:01.756 *******
TASK [bootstrap-os : Bootstrap | Install python 2.x, pip, and dbus] *********************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.064) 0:00:01.820 *******
TASK [bootstrap-os : set_fact] **********************************************************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.038) 0:00:01.859 *******
TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] **************************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.039) 0:00:01.898 *******
TASK [bootstrap-os : Bootstrap | Run bootstrap.sh] **************************************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.042) 0:00:01.940 *******
TASK [bootstrap-os : set_fact] **********************************************************************************************************************
Friday 29 December 2017 05:47:57 +0000 (0:00:00.046) 0:00:01.987 *******
TASK [bootstrap-os : Bootstrap | Check if we need to install pip] ***********************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.121) 0:00:02.109 *******
TASK [bootstrap-os : Bootstrap | Copy get-pip.py] ***************************************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.040) 0:00:02.150 *******
TASK [bootstrap-os : Bootstrap | Install pip] *******************************************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.038) 0:00:02.188 *******
TASK [bootstrap-os : Bootstrap | Remove get-pip.py] *************************************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.037) 0:00:02.226 *******
TASK [bootstrap-os : Bootstrap | Install pip launcher] **********************************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.039) 0:00:02.266 *******
TASK [bootstrap-os : Install required python modules] ***********************************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.036) 0:00:02.302 *******
TASK [bootstrap-os : Check presence of fastestmirror.conf] ******************************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.060) 0:00:02.363 *******
TASK [bootstrap-os : Disable fastestmirror plugin] **************************************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.036) 0:00:02.400 *******
TASK [bootstrap-os : Install packages requirements for bootstrap] ***********************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.036) 0:00:02.437 *******
TASK [bootstrap-os : Remove require tty] ************************************************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.036) 0:00:02.474 *******
ok: [node3] => {"backup": "", "changed": false, "found": 0, "msg": ""}
ok: [node1] => {"backup": "", "changed": false, "found": 0, "msg": ""}
ok: [node2] => {"backup": "", "changed": false, "found": 0, "msg": ""}
TASK [bootstrap-os : check if atomic host] **********************************************************************************************************
Friday 29 December 2017 05:47:58 +0000 (0:00:00.333) 0:00:02.808 *******
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}
TASK [bootstrap-os : set_fact] **********************************************************************************************************************
Friday 29 December 2017 05:47:59 +0000 (0:00:00.334) 0:00:03.142 *******
ok: [node1] => {"ansible_facts": {"is_atomic": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"is_atomic": false}, "changed": false}
ok: [node3] => {"ansible_facts": {"is_atomic": false}, "changed": false}
TASK [bootstrap-os : Gather nodes hostnames] ********************************************************************************************************
Friday 29 December 2017 05:47:59 +0000 (0:00:00.109) 0:00:03.252 *******
ok: [node3]
ok: [node2]
ok: [node1]
TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (non-CoreOS)] ******************************************************************
Friday 29 December 2017 05:47:59 +0000 (0:00:00.582) 0:00:03.834 *******
ok: [node3] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "node3.cluster.local", "ansible_hostname": "node3", "ansible_nodename": "node3"}, "changed": false, "name": "node3"}
ok: [node2] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "node2.cluster.local", "ansible_hostname": "node2", "ansible_nodename": "node2"}, "changed": false, "name": "node2"}
ok: [node1] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "node1.cluster.local", "ansible_hostname": "node1", "ansible_nodename": "node1"}, "changed": false, "name": "node1"}
TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (CoreOS only)] *****************************************************************
Friday 29 December 2017 05:48:00 +0000 (0:00:00.588) 0:00:04.423 *******
TASK [bootstrap-os : Update hostname fact (CoreOS only)] ********************************************************************************************
Friday 29 December 2017 05:48:00 +0000 (0:00:00.039) 0:00:04.462 *******
PLAY [k8s-cluster:etcd:calico-rr] *******************************************************************************************************************
PLAY [k8s-cluster:etcd:calico-rr] *******************************************************************************************************************
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:00 +0000 (0:00:00.105) 0:00:04.568 *******
TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017 05:48:00 +0000 (0:00:00.043) 0:00:04.611 *******
TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017 05:48:00 +0000 (0:00:00.042) 0:00:04.654 *******
TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017 05:48:00 +0000 (0:00:00.021) 0:00:04.676 *******
TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017 05:48:01 +0000 (0:00:00.502) 0:00:05.178 *******
TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017 05:48:01 +0000 (0:00:00.542) 0:00:05.721 *******
ok: [node2] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node3] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017 05:48:01 +0000 (0:00:00.249) 0:00:05.970 *******
ok: [node1] => {"changed": false, "gid": 999, "name": "kube-cert", "state": "present", "system": true}
ok: [node2] => {"changed": false, "gid": 999, "name": "kube-cert", "state": "present", "system": true}
ok: [node3] => {"changed": false, "gid": 999, "name": "kube-cert", "state": "present", "system": true}
TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017 05:48:02 +0000 (0:00:00.410) 0:00:06.381 *******
ok: [node3] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 999, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999}
ok: [node1] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 999, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999}
ok: [node2] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 999, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999}
TASK [kubernetes/preinstall : Stop if ansible version is too low] ***********************************************************************************
Friday 29 December 2017 05:48:02 +0000 (0:00:00.484) 0:00:06.866 *******
ok: [node2] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if non systemd OS type] ******************************************************************************************
Friday 29 December 2017 05:48:02 +0000 (0:00:00.159) 0:00:07.025 *******
ok: [node2] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node3] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node1] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if unknown OS] ***************************************************************************************************
Friday 29 December 2017 05:48:03 +0000 (0:00:00.255) 0:00:07.281 *******
ok: [node1] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node3] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node2] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if unknown network plugin] ***************************************************************************************
Friday 29 December 2017 05:48:03 +0000 (0:00:00.256) 0:00:07.537 *******
TASK [kubernetes/preinstall : Stop if incompatible network plugin and cloudprovider] ****************************************************************
Friday 29 December 2017 05:48:03 +0000 (0:00:00.040) 0:00:07.577 *******
TASK [kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }")] ******************************
Friday 29 December 2017 05:48:03 +0000 (0:00:00.040) 0:00:07.617 *******
ok: [node2] => (item={u'name': u'kubeadm_enabled', u'value': False}) => {
"changed": false,
"item": {
"name": "kubeadm_enabled",
"value": false
},
"msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'download_run_once', u'value': False}) => {
"changed": false,
"item": {
"name": "download_run_once",
"value": false
},
"msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'deploy_netchecker', u'value': False}) => {
"changed": false,
"item": {
"name": "deploy_netchecker",
"value": false
},
"msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'download_always_pull', u'value': False}) => {
"changed": false,
"item": {
"name": "download_always_pull",
"value": false
},
"msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'efk_enabled', u'value': False}) => {
"changed": false,
"item": {
"name": "efk_enabled",
"value": false
},
"msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'helm_enabled', u'value': True}) => {
"changed": false,
"item": {
"name": "helm_enabled",
"value": true
},
"msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'openstack_lbaas_enabled', u'value': False}) => {
"changed": false,
"item": {
"name": "openstack_lbaas_enabled",
"value": false
},
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if even number of etcd hosts] ************************************************************************************
Friday 29 December 2017 05:48:04 +0000 (0:00:00.790) 0:00:08.408 *******
ok: [node2] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node3] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node1] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if memory is too small for masters] ******************************************************************************
Friday 29 December 2017 05:48:04 +0000 (0:00:00.259) 0:00:08.667 *******
ok: [node1] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if memory is too small for nodes] ********************************************************************************
Friday 29 December 2017 05:48:04 +0000 (0:00:00.192) 0:00:08.860 *******
ok: [node2] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node3] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if ip var does not match local ips] ******************************************************************************
Friday 29 December 2017 05:48:04 +0000 (0:00:00.203) 0:00:09.064 *******
TASK [kubernetes/preinstall : Stop if access_ip is not pingable] ************************************************************************************
Friday 29 December 2017 05:48:05 +0000 (0:00:00.040) 0:00:09.105 *******
TASK [kubernetes/preinstall : Stop if swap enabled] *************************************************************************************************
Friday 29 December 2017 05:48:05 +0000 (0:00:00.039) 0:00:09.144 *******
ok: [node2] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node3] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node1] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when dashboard is enabled] ****************************************************************
Friday 29 December 2017 05:48:05 +0000 (0:00:00.274) 0:00:09.418 *******
ok: [node3] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node2] => {
"changed": false,
"msg": "All assertions passed"
}
ok: [node1] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Force binaries directory for Container Linux by CoreOS] ***************************************************************
Friday 29 December 2017 05:48:05 +0000 (0:00:00.266) 0:00:09.685 *******
TASK [kubernetes/preinstall : check bin dir exists] *************************************************************************************************
Friday 29 December 2017 05:48:05 +0000 (0:00:00.042) 0:00:09.728 *******
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 0}
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 0}
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 0}
TASK [kubernetes/preinstall : check if atomic host] *************************************************************************************************
Friday 29 December 2017 05:48:06 +0000 (0:00:00.419) 0:00:10.147 *******
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/preinstall : set_fact] *************************************************************************************************************
Friday 29 December 2017 05:48:06 +0000 (0:00:00.447) 0:00:10.595 *******
ok: [node1] => {"ansible_facts": {"is_atomic": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"is_atomic": false}, "changed": false}
ok: [node3] => {"ansible_facts": {"is_atomic": false}, "changed": false}
TASK [kubernetes/preinstall : set_fact] *************************************************************************************************************
Friday 29 December 2017 05:48:06 +0000 (0:00:00.303) 0:00:10.899 *******
TASK [kubernetes/preinstall : check resolvconf] *****************************************************************************************************
Friday 29 December 2017 05:48:06 +0000 (0:00:00.058) 0:00:10.957 *******
ok: [node2] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.002003", "end": "2017-12-29 05:48:06.010111", "failed_when_result": false, "rc": 0, "start": "2017-12-29 05:48:06.008108", "stderr": "", "stderr_lines": [], "stdout": "/sbin/resolvconf", "stdout_lines": ["/sbin/resolvconf"]}
ok: [node1] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.002474", "end": "2017-12-29 05:48:06.036344", "failed_when_result": false, "rc": 0, "start": "2017-12-29 05:48:06.033870", "stderr": "", "stderr_lines": [], "stdout": "/sbin/resolvconf", "stdout_lines": ["/sbin/resolvconf"]}
ok: [node3] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.001865", "end": "2017-12-29 05:48:05.857209", "failed_when_result": false, "rc": 0, "start": "2017-12-29 05:48:05.855344", "stderr": "", "stderr_lines": [], "stdout": "/sbin/resolvconf", "stdout_lines": ["/sbin/resolvconf"]}
TASK [kubernetes/preinstall : set_fact] *************************************************************************************************************
Friday 29 December 2017 05:48:07 +0000 (0:00:00.436) 0:00:11.393 *******
ok: [node1] => {"ansible_facts": {"resolvconf": true}, "changed": false}
ok: [node2] => {"ansible_facts": {"resolvconf": true}, "changed": false}
ok: [node3] => {"ansible_facts": {"resolvconf": true}, "changed": false}
TASK [kubernetes/preinstall : set_fact] *************************************************************************************************************
Friday 29 December 2017 05:48:07 +0000 (0:00:00.253) 0:00:11.647 *******
ok: [node3] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "default_resolver": "8.8.8.8"}, "changed": false}
ok: [node2] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "default_resolver": "8.8.8.8"}, "changed": false}
ok: [node1] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "default_resolver": "8.8.8.8"}, "changed": false}
TASK [kubernetes/preinstall : check if kubelet is configured] ***************************************************************************************
Friday 29 December 2017 05:48:07 +0000 (0:00:00.297) 0:00:11.945 *******
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/preinstall : check if early DNS configuration stage] *******************************************************************************
Friday 29 December 2017 05:48:08 +0000 (0:00:00.425) 0:00:12.370 *******
ok: [node2] => {"ansible_facts": {"dns_early": true}, "changed": false}
ok: [node1] => {"ansible_facts": {"dns_early": true}, "changed": false}
ok: [node3] => {"ansible_facts": {"dns_early": true}, "changed": false}
TASK [kubernetes/preinstall : target resolv.conf files] *********************************************************************************************
Friday 29 December 2017 05:48:08 +0000 (0:00:00.283) 0:00:12.654 *******
ok: [node1] => {"ansible_facts": {"base": "/etc/resolvconf/resolv.conf.d/base", "head": "/etc/resolvconf/resolv.conf.d/head", "resolvconffile": "/etc/resolv.conf"}, "changed": false}
ok: [node2] => {"ansible_facts": {"base": "/etc/resolvconf/resolv.conf.d/base", "head": "/etc/resolvconf/resolv.conf.d/head", "resolvconffile": "/etc/resolv.conf"}, "changed": false}
ok: [node3] => {"ansible_facts": {"base": "/etc/resolvconf/resolv.conf.d/base", "head": "/etc/resolvconf/resolv.conf.d/head", "resolvconffile": "/etc/resolv.conf"}, "changed": false}
TASK [kubernetes/preinstall : target temporary resolvconf cloud init file (Container Linux by CoreOS)] **********************************************
Friday 29 December 2017 05:48:08 +0000 (0:00:00.304) 0:00:12.958 *******
TASK [kubernetes/preinstall : check if /etc/dhclient.conf exists] ***********************************************************************************
Friday 29 December 2017 05:48:08 +0000 (0:00:00.042) 0:00:13.001 *******
ok: [node1] => {"changed": false, "stat": {"exists": false}}
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhclient.conf] *********************************************************************
Friday 29 December 2017 05:48:09 +0000 (0:00:00.364) 0:00:13.366 *******
TASK [kubernetes/preinstall : check if /etc/dhcp/dhclient.conf exists] ******************************************************************************
Friday 29 December 2017 05:48:09 +0000 (0:00:00.041) 0:00:13.407 *******
ok: [node1] => {"changed": false, "stat": {"atime": 1514447924.672, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1487946470.4271395, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1244, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "c3b6c3271031ab8e250a192f4eb18695", "mimetype": "text/plain", "mode": "0644", "mtime": 1452709242.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": "18446744071791663259", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node2] => {"changed": false, "stat": {"atime": 1514447926.496, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1487946470.4271395, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1244, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "c3b6c3271031ab8e250a192f4eb18695", "mimetype": "text/plain", "mode": "0644", "mtime": 1452709242.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": "18446744071791663259", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node3] => {"changed": false, "stat": {"atime": 1514447926.412, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1487946470.4271395, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1244, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "c3b6c3271031ab8e250a192f4eb18695", "mimetype": "text/plain", "mode": "0644", "mtime": 1452709242.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": "18446744071791663259", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhcp/dhclient.conf] ****************************************************************
Friday 29 December 2017 05:48:09 +0000 (0:00:00.372) 0:00:13.780 *******
ok: [node3] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false}
ok: [node1] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false}
ok: [node2] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false}
TASK [kubernetes/preinstall : target dhclient hook file for Red Hat family] *************************************************************************
Friday 29 December 2017 05:48:09 +0000 (0:00:00.274) 0:00:14.055 *******
TASK [kubernetes/preinstall : target dhclient hook file for Debian family] **************************************************************************
Friday 29 December 2017 05:48:10 +0000 (0:00:00.043) 0:00:14.099 *******
ok: [node3] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false}
ok: [node2] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false}
ok: [node1] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false}
TASK [kubernetes/preinstall : generate search domains to resolvconf] ********************************************************************************
Friday 29 December 2017 05:48:10 +0000 (0:00:00.269) 0:00:14.368 *******
ok: [node2] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false}
ok: [node3] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false}
ok: [node1] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false}
TASK [kubernetes/preinstall : pick dnsmasq cluster IP or default resolver] **************************************************************************
Friday 29 December 2017 05:48:10 +0000 (0:00:00.271) 0:00:14.640 *******
ok: [node1] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false}
ok: [node2] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false}
ok: [node3] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false}
TASK [kubernetes/preinstall : generate nameservers to resolvconf] ***********************************************************************************
Friday 29 December 2017 05:48:10 +0000 (0:00:00.275) 0:00:14.915 *******
ok: [node2] => {"ansible_facts": {"nameserverentries": "nameserver 8.8.8.8", "supersede_nameserver": "supersede domain-name-servers 8.8.8.8;"}, "changed": false}
ok: [node3] => {"ansible_facts": {"nameserverentries": "nameserver 8.8.8.8", "supersede_nameserver": "supersede domain-name-servers 8.8.8.8;"}, "changed": false}
ok: [node1] => {"ansible_facts": {"nameserverentries": "nameserver 8.8.8.8", "supersede_nameserver": "supersede domain-name-servers 8.8.8.8;"}, "changed": false}
TASK [kubernetes/preinstall : gather os specific variables] *****************************************************************************************
Friday 29 December 2017 05:48:11 +0000 (0:00:00.263) 0:00:15.179 *******
ok: [node2] => (item=/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"}
ok: [node1] => (item=/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"}
ok: [node3] => (item=/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"}
TASK [kubernetes/preinstall : Create kubernetes directories] ****************************************************************************************
Friday 29 December 2017 05:48:11 +0000 (0:00:00.327) 0:00:15.507 *******
ok: [node3] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 999, "group": "kube-cert", "item": "/etc/kubernetes/ssl", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 999, "group": "kube-cert", "item": "/etc/kubernetes/ssl", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 999, "group": "kube-cert", "item": "/etc/kubernetes/ssl", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/mnt/disks) => {"changed": false, "gid": 0, "group": "root", "item": "/mnt/disks", "mode": "0755", "owner": "kube", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/mnt/disks) => {"changed": false, "gid": 0, "group": "root", "item": "/mnt/disks", "mode": "0755", "owner": "kube", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/mnt/disks) => {"changed": false, "gid": 0, "group": "root", "item": "/mnt/disks", "mode": "0755", "owner": "kube", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 999}
TASK [kubernetes/preinstall : check cloud_provider value] *******************************************************************************************
Friday 29 December 2017 05:48:12 +0000 (0:00:01.369) 0:00:16.876 *******
TASK [kubernetes/preinstall : include] **************************************************************************************************************
Friday 29 December 2017 05:48:12 +0000 (0:00:00.039) 0:00:16.915 *******
TASK [kubernetes/preinstall : Create cni directories] ***********************************************************************************************
Friday 29 December 2017 05:48:12 +0000 (0:00:00.039) 0:00:16.954 *******
ok: [node3] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/opt/cni/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/opt/cni/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/opt/cni/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 4096, "state": "directory", "uid": 999}
TASK [kubernetes/preinstall : create temporary resolveconf cloud init file] *************************************************************************
Friday 29 December 2017 05:48:13 +0000 (0:00:00.623) 0:00:17.578 *******
TASK [kubernetes/preinstall : Add domain/search/nameservers/options to resolv.conf] *****************************************************************
Friday 29 December 2017 05:48:13 +0000 (0:00:00.045) 0:00:17.624 *******
TASK [kubernetes/preinstall : Remove search/domain/nameserver options before block] *****************************************************************
Friday 29 December 2017 05:48:13 +0000 (0:00:00.040) 0:00:17.664 *******
TASK [kubernetes/preinstall : Remove search/domain/nameserver options after block] ******************************************************************
Friday 29 December 2017 05:48:13 +0000 (0:00:00.229) 0:00:17.894 *******
TASK [kubernetes/preinstall : get temporary resolveconf cloud init file content] ********************************************************************
Friday 29 December 2017 05:48:14 +0000 (0:00:00.227) 0:00:18.122 *******
TASK [kubernetes/preinstall : persist resolvconf cloud init file] ***********************************************************************************
Friday 29 December 2017 05:48:14 +0000 (0:00:00.042) 0:00:18.164 *******
TASK [kubernetes/preinstall : Update package management cache (YUM)] ********************************************************************************
Friday 29 December 2017 05:48:14 +0000 (0:00:00.041) 0:00:18.206 *******
TASK [kubernetes/preinstall : Expire management cache (YUM) for Updation - Redhat] ******************************************************************
Friday 29 December 2017 05:48:14 +0000 (0:00:00.038) 0:00:18.245 *******
TASK [kubernetes/preinstall : Update package management cache (YUM) - Redhat] ***********************************************************************
Friday 29 December 2017 05:48:14 +0000 (0:00:00.038) 0:00:18.284 *******
TASK [kubernetes/preinstall : Install latest version of python-apt for Debian distribs] *************************************************************
Friday 29 December 2017 05:48:14 +0000 (0:00:00.036) 0:00:18.320 *******
ok: [node3] => {"cache_update_time": 1514525140, "cache_updated": false, "changed": false}
ok: [node2] => {"cache_update_time": 1514525141, "cache_updated": false, "changed": false}
ok: [node1] => {"cache_update_time": 1514525140, "cache_updated": false, "changed": false}
TASK [kubernetes/preinstall : Install python-dnf for latest RedHat versions] ************************************************************************
Friday 29 December 2017 05:48:14 +0000 (0:00:00.730) 0:00:19.051 *******
TASK [kubernetes/preinstall : Install epel-release on RedHat/CentOS] ********************************************************************************
Friday 29 December 2017 05:48:15 +0000 (0:00:00.039) 0:00:19.090 *******
TASK [kubernetes/preinstall : Install packages requirements] ****************************************************************************************
Friday 29 December 2017 05:48:15 +0000 (0:00:00.036) 0:00:19.127 *******
ok: [node3] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"]}
ok: [node2] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "cache_update_time": 1514525141, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"]}
ok: [node1] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"]}
TASK [kubernetes/preinstall : Confirm selinux deployed] *********************************************************************************************
Friday 29 December 2017 05:48:15 +0000 (0:00:00.662) 0:00:19.789 *******
TASK [kubernetes/preinstall : Set selinux policy] ***************************************************************************************************
Friday 29 December 2017 05:48:15 +0000 (0:00:00.039) 0:00:19.829 *******
TASK [kubernetes/preinstall : Disable IPv6 DNS lookup] **********************************************************************************************
Friday 29 December 2017 05:48:15 +0000 (0:00:00.037) 0:00:19.866 *******
TASK [kubernetes/preinstall : set default sysctl file path] *****************************************************************************************
Friday 29 December 2017 05:48:15 +0000 (0:00:00.034) 0:00:19.901 *******
ok: [node3] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.d/99-sysctl.conf"}, "changed": false}
ok: [node2] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.d/99-sysctl.conf"}, "changed": false}
ok: [node1] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.d/99-sysctl.conf"}, "changed": false}
TASK [kubernetes/preinstall : Stat sysctl file configuration] ***************************************************************************************
Friday 29 December 2017 05:48:16 +0000 (0:00:00.272) 0:00:20.174 *******
ok: [node2] => {"changed": false, "stat": {"atime": 1514459619.172, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1514448132.296, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 29239, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1509099119.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}}
ok: [node3] => {"changed": false, "stat": {"atime": 1514459618.796, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1514448161.348, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 29239, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1509099119.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}}
ok: [node1] => {"changed": false, "stat": {"atime": 1514459619.224, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1514448124.792, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 29239, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1509099119.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}}
TASK [kubernetes/preinstall : Change sysctl file path to link source if linked] *********************************************************************
Friday 29 December 2017 05:48:16 +0000 (0:00:00.373) 0:00:20.547 *******
ok: [node3] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false}
ok: [node1] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false}
ok: [node2] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false}
TASK [kubernetes/preinstall : Enable ip forwarding] *************************************************************************************************
Friday 29 December 2017 05:48:16 +0000 (0:00:00.276) 0:00:20.823 *******
ok: [node3] => {"changed": false}
ok: [node2] => {"changed": false}
ok: [node1] => {"changed": false}
TASK [kubernetes/preinstall : Write cloud-config] ***************************************************************************************************
Friday 29 December 2017 05:48:17 +0000 (0:00:00.488) 0:00:21.312 *******
TASK [kubernetes/preinstall : Hosts | populate inventory into hosts file] ***************************************************************************
Friday 29 December 2017 05:48:17 +0000 (0:00:00.040) 0:00:21.353 *******
ok: [node3] => {"changed": false, "msg": ""}
ok: [node2] => {"changed": false, "msg": ""}
ok: [node1] => {"changed": false, "msg": ""}
TASK [kubernetes/preinstall : Hosts | populate kubernetes loadbalancer address into hosts file] *****************************************************
Friday 29 December 2017 05:48:17 +0000 (0:00:00.512) 0:00:21.865 *******
TASK [kubernetes/preinstall : Hosts | localhost ipv4 in hosts file] *********************************************************************************
Friday 29 December 2017 05:48:17 +0000 (0:00:00.040) 0:00:21.906 *******
ok: [node1] => {"backup": "", "changed": false, "msg": ""}
ok: [node2] => {"backup": "", "changed": false, "msg": ""}
ok: [node3] => {"backup": "", "changed": false, "msg": ""}
TASK [kubernetes/preinstall : Hosts | localhost ipv6 in hosts file] *********************************************************************************
Friday 29 December 2017 05:48:18 +0000 (0:00:00.363) 0:00:22.269 *******
ok: [node3] => {"backup": "", "changed": false, "msg": ""}
ok: [node1] => {"backup": "", "changed": false, "msg": ""}
ok: [node2] => {"backup": "", "changed": false, "msg": ""}
TASK [kubernetes/preinstall : Configure dhclient to supersede search/domain/nameservers] ************************************************************
Friday 29 December 2017 05:48:18 +0000 (0:00:00.377) 0:00:22.646 *******
TASK [kubernetes/preinstall : Configue dhclient hooks for resolv.conf (non-RH)] *********************************************************************
Friday 29 December 2017 05:48:18 +0000 (0:00:00.045) 0:00:22.692 *******
TASK [kubernetes/preinstall : Configue dhclient hooks for resolv.conf (RH-only)] ********************************************************************
Friday 29 December 2017 05:48:18 +0000 (0:00:00.040) 0:00:22.732 *******
TASK [kubernetes/preinstall : Remove kubespray specific config from dhclient config] ****************************************************************
Friday 29 December 2017 05:48:18 +0000 (0:00:00.043) 0:00:22.776 *******
ok: [node1] => {"changed": false, "msg": ""}
ok: [node2] => {"changed": false, "msg": ""}
ok: [node3] => {"changed": false, "msg": ""}
TASK [kubernetes/preinstall : Remove kubespray specific dhclient hook] ******************************************************************************
Friday 29 December 2017 05:48:19 +0000 (0:00:00.382) 0:00:23.159 *******
ok: [node1] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"}
ok: [node2] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"}
ok: [node3] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"}
TASK [kubernetes/preinstall : Check if we are running inside a Azure VM] ****************************************************************************
Friday 29 December 2017 05:48:19 +0000 (0:00:00.388) 0:00:23.547 *******
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/preinstall : install growpart] *****************************************************************************************************
Friday 29 December 2017 05:48:19 +0000 (0:00:00.370) 0:00:23.918 *******
TASK [kubernetes/preinstall : check if growpart needs to be run] ************************************************************************************
Friday 29 December 2017 05:48:19 +0000 (0:00:00.039) 0:00:23.957 *******
TASK [kubernetes/preinstall : check fs type] ********************************************************************************************************
Friday 29 December 2017 05:48:19 +0000 (0:00:00.039) 0:00:23.997 *******
TASK [kubernetes/preinstall : run growpart] *********************************************************************************************************
Friday 29 December 2017 05:48:19 +0000 (0:00:00.040) 0:00:24.037 *******
TASK [kubernetes/preinstall : run xfs_growfs] *******************************************************************************************************
Friday 29 December 2017 05:48:20 +0000 (0:00:00.041) 0:00:24.079 *******
TASK [docker/docker-storage : docker-storage-setup | install git and make] **************************************************************************
Friday 29 December 2017 05:48:20 +0000 (0:00:00.046) 0:00:24.125 *******
TASK [docker/docker-storage : docker-storage-setup | docker-storage-setup sysconfig template] *******************************************************
Friday 29 December 2017 05:48:20 +0000 (0:00:00.056) 0:00:24.182 *******
TASK [docker/docker-storage : docker-storage-override-directory | docker service storage-setup override dir] ****************************************
Friday 29 December 2017 05:48:20 +0000 (0:00:00.041) 0:00:24.224 *******
TASK [docker/docker-storage : docker-storage-override | docker service storage-setup override file] *************************************************
Friday 29 December 2017 05:48:20 +0000 (0:00:00.038) 0:00:24.262 *******
TASK [docker/docker-storage : docker-storage-setup | install and run container-storage-setup] *******************************************************
Friday 29 December 2017 05:48:20 +0000 (0:00:00.040) 0:00:24.303 *******
TASK [docker : gather os specific variables] ********************************************************************************************************
Friday 29 December 2017 05:48:20 +0000 (0:00:00.040) 0:00:24.343 *******
ok: [node3] => (item=/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb {{ docker_apt_repo_base_url }} {{ ansible_distribution|lower }}-{{ ansible_distribution_release|lower }} main\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["58118E89F3A912897C070ADBF76221572C52609D"], "url": "{{ docker_apt_repo_gpgkey }}"}, "docker_versioned_pkg": {"1.11": "docker-engine=1.11.1-0~{{ ansible_distribution_release|lower }}", "1.12": "docker-engine=1.12.6-0~ubuntu-{{ ansible_distribution_release|lower }}", "1.13": "docker-engine=1.13.1-0~ubuntu-{{ ansible_distribution_release|lower }}", "17.03": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-engine=17.05.0~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "latest": "docker-engine", "stable": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}"}}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/docker/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml"}
ok: [node2] => (item=/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb {{ docker_apt_repo_base_url }} {{ ansible_distribution|lower }}-{{ ansible_distribution_release|lower }} main\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["58118E89F3A912897C070ADBF76221572C52609D"], "url": "{{ docker_apt_repo_gpgkey }}"}, "docker_versioned_pkg": {"1.11": "docker-engine=1.11.1-0~{{ ansible_distribution_release|lower }}", "1.12": "docker-engine=1.12.6-0~ubuntu-{{ ansible_distribution_release|lower }}", "1.13": "docker-engine=1.13.1-0~ubuntu-{{ ansible_distribution_release|lower }}", "17.03": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-engine=17.05.0~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "latest": "docker-engine", "stable": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}"}}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/docker/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml"}
ok: [node1] => (item=/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb {{ docker_apt_repo_base_url }} {{ ansible_distribution|lower }}-{{ ansible_distribution_release|lower }} main\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["58118E89F3A912897C070ADBF76221572C52609D"], "url": "{{ docker_apt_repo_gpgkey }}"}, "docker_versioned_pkg": {"1.11": "docker-engine=1.11.1-0~{{ ansible_distribution_release|lower }}", "1.12": "docker-engine=1.12.6-0~ubuntu-{{ ansible_distribution_release|lower }}", "1.13": "docker-engine=1.13.1-0~ubuntu-{{ ansible_distribution_release|lower }}", "17.03": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-engine=17.05.0~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "latest": "docker-engine", "stable": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}"}}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/docker/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml"}
TASK [docker : set dns server for docker] ***********************************************************************************************************
Friday 29 December 2017 05:48:20 +0000 (0:00:00.296) 0:00:24.640 *******
ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
TASK [docker : set base docker dns facts] ***********************************************************************************************************
Friday 29 December 2017 05:48:20 +0000 (0:00:00.322) 0:00:24.962 *******
ok: [node2] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
ok: [node1] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
TASK [docker : add upstream dns servers (only when dnsmasq is not used)] ****************************************************************************
Friday 29 December 2017 05:48:21 +0000 (0:00:00.324) 0:00:25.286 *******
ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
TASK [docker : add global searchdomains] ************************************************************************************************************
Friday 29 December 2017 05:48:21 +0000 (0:00:00.314) 0:00:25.601 *******
ok: [node1] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
ok: [node2] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
TASK [docker : check system nameservers] ************************************************************************************************************
Friday 29 December 2017 05:48:21 +0000 (0:00:00.308) 0:00:25.909 *******
ok: [node3] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002842", "end": "2017-12-29 05:48:20.743502", "rc": 0, "start": "2017-12-29 05:48:20.740660", "stderr": "", "stderr_lines": [], "stdout": "8.8.8.8\n8.8.4.4", "stdout_lines": ["8.8.8.8", "8.8.4.4"]}
ok: [node2] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002365", "end": "2017-12-29 05:48:20.916484", "rc": 0, "start": "2017-12-29 05:48:20.914119", "stderr": "", "stderr_lines": [], "stdout": "8.8.8.8\n8.8.4.4", "stdout_lines": ["8.8.8.8", "8.8.4.4"]}
ok: [node1] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002883", "end": "2017-12-29 05:48:21.013035", "rc": 0, "start": "2017-12-29 05:48:21.010152", "stderr": "", "stderr_lines": [], "stdout": "8.8.8.8\n8.8.4.4", "stdout_lines": ["8.8.8.8", "8.8.4.4"]}
TASK [docker : check system search domains] *********************************************************************************************************
Friday 29 December 2017 05:48:22 +0000 (0:00:00.448) 0:00:26.358 *******
ok: [node3] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.003266", "end": "2017-12-29 05:48:21.151184", "rc": 0, "start": "2017-12-29 05:48:21.147918", "stderr": "", "stderr_lines": [], "stdout": "openstacklocal", "stdout_lines": ["openstacklocal"]}
ok: [node2] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.002844", "end": "2017-12-29 05:48:21.385837", "rc": 0, "start": "2017-12-29 05:48:21.382993", "stderr": "", "stderr_lines": [], "stdout": "openstacklocal", "stdout_lines": ["openstacklocal"]}
ok: [node1] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.002593", "end": "2017-12-29 05:48:21.451827", "rc": 0, "start": "2017-12-29 05:48:21.449234", "stderr": "", "stderr_lines": [], "stdout": "openstacklocal", "stdout_lines": ["openstacklocal"]}
TASK [docker : add system nameservers to docker options] ********************************************************************************************
Friday 29 December 2017 05:48:22 +0000 (0:00:00.439) 0:00:26.797 *******
ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "8.8.8.8", "8.8.4.4"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "8.8.8.8", "8.8.4.4"]}, "changed": false}
ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "8.8.8.8", "8.8.4.4"]}, "changed": false}
TASK [docker : add system search domains to docker options] *****************************************************************************************
Friday 29 December 2017 05:48:23 +0000 (0:00:00.326) 0:00:27.124 *******
ok: [node2] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "openstacklocal"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "openstacklocal"]}, "changed": false}
ok: [node1] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "openstacklocal"]}, "changed": false}
TASK [docker : check number of nameservers] *********************************************************************************************************
Friday 29 December 2017 05:48:23 +0000 (0:00:00.339) 0:00:27.464 *******
TASK [docker : rtrim number of nameservers to 3] ****************************************************************************************************
Friday 29 December 2017 05:48:23 +0000 (0:00:00.043) 0:00:27.508 *******
TASK [docker : check number of search domains] ******************************************************************************************************
Friday 29 December 2017 05:48:23 +0000 (0:00:00.042) 0:00:27.551 *******
TASK [docker : check length of search domains] ******************************************************************************************************
Friday 29 December 2017 05:48:23 +0000 (0:00:00.042) 0:00:27.594 *******
TASK [docker : check for minimum kernel version] ****************************************************************************************************
Friday 29 December 2017 05:48:23 +0000 (0:00:00.043) 0:00:27.637 *******
TASK [docker : ensure docker repository public key is installed] ************************************************************************************
Friday 29 December 2017 05:48:23 +0000 (0:00:00.039) 0:00:27.677 *******
ok: [node3] => (item=58118E89F3A912897C070ADBF76221572C52609D) => {"attempts": 1, "changed": false, "item": "58118E89F3A912897C070ADBF76221572C52609D"}
ok: [node2] => (item=58118E89F3A912897C070ADBF76221572C52609D) => {"attempts": 1, "changed": false, "item": "58118E89F3A912897C070ADBF76221572C52609D"}
ok: [node1] => (item=58118E89F3A912897C070ADBF76221572C52609D) => {"attempts": 1, "changed": false, "item": "58118E89F3A912897C070ADBF76221572C52609D"}
TASK [docker : ensure docker repository is enabled] *************************************************************************************************
Friday 29 December 2017 05:48:24 +0000 (0:00:00.685) 0:00:28.362 *******
ok: [node3] => (item=deb https://apt.dockerproject.org/repo ubuntu-xenial main
) => {"changed": false, "item": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "repo": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "state": "present"}
ok: [node2] => (item=deb https://apt.dockerproject.org/repo ubuntu-xenial main
) => {"changed": false, "item": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "repo": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "state": "present"}
ok: [node1] => (item=deb https://apt.dockerproject.org/repo ubuntu-xenial main
) => {"changed": false, "item": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "repo": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "state": "present"}
TASK [docker : Configure docker repository on RedHat/CentOS] ****************************************************************************************
Friday 29 December 2017 05:48:24 +0000 (0:00:00.699) 0:00:29.061 *******
TASK [docker : ensure docker packages are installed] ************************************************************************************************
Friday 29 December 2017 05:48:25 +0000 (0:00:00.040) 0:00:29.102 *******
ok: [node3] => (item={u'force': True, u'name': u'docker-engine=17.03.1~ce-0~ubuntu-xenial'}) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": {"force": true, "name": "docker-engine=17.03.1~ce-0~ubuntu-xenial"}}
ok: [node2] => (item={u'force': True, u'name': u'docker-engine=17.03.1~ce-0~ubuntu-xenial'}) => {"attempts": 1, "cache_update_time": 1514525141, "cache_updated": false, "changed": false, "item": {"force": true, "name": "docker-engine=17.03.1~ce-0~ubuntu-xenial"}}
ok: [node1] => (item={u'force': True, u'name': u'docker-engine=17.03.1~ce-0~ubuntu-xenial'}) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": {"force": true, "name": "docker-engine=17.03.1~ce-0~ubuntu-xenial"}}
TASK [docker : set fact for docker_version] *********************************************************************************************************
Friday 29 December 2017 05:48:25 +0000 (0:00:00.697) 0:00:29.799 *******
ok: [node1] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.014017", "end": "2017-12-29 05:48:24.793994", "rc": 0, "start": "2017-12-29 05:48:24.779977", "stderr": "", "stderr_lines": [], "stdout": "17.03.1-ce", "stdout_lines": ["17.03.1-ce"]}
ok: [node2] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.011415", "end": "2017-12-29 05:48:24.845708", "rc": 0, "start": "2017-12-29 05:48:24.834293", "stderr": "", "stderr_lines": [], "stdout": "17.03.1-ce", "stdout_lines": ["17.03.1-ce"]}
ok: [node3] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.010490", "end": "2017-12-29 05:48:24.690459", "rc": 0, "start": "2017-12-29 05:48:24.679969", "stderr": "", "stderr_lines": [], "stdout": "17.03.1-ce", "stdout_lines": ["17.03.1-ce"]}
TASK [docker : check minimum docker version for docker_dns mode. You need at least docker version >= 1.12 for resolvconf_mode=docker_dns] ***********
Friday 29 December 2017 05:48:26 +0000 (0:00:00.426) 0:00:30.226 *******
TASK [docker : Create docker service systemd directory if it doesn't exist] *************************************************************************
Friday 29 December 2017 05:48:26 +0000 (0:00:00.041) 0:00:30.267 *******
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4096, "state": "directory", "uid": 0}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4096, "state": "directory", "uid": 0}
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4096, "state": "directory", "uid": 0}
TASK [docker : Write docker proxy drop-in] **********************************************************************************************************
Friday 29 December 2017 05:48:26 +0000 (0:00:00.426) 0:00:30.693 *******
TASK [docker : get systemd version] *****************************************************************************************************************
Friday 29 December 2017 05:48:26 +0000 (0:00:00.041) 0:00:30.735 *******
TASK [docker : Write docker.service systemd file] ***************************************************************************************************
Friday 29 December 2017 05:48:26 +0000 (0:00:00.043) 0:00:30.778 *******
ok: [node3] => {"changed": false, "checksum": "860b79c32d9bf8a46a7167a7c7ee51cba9eb07e7", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 591, "state": "file", "uid": 0}
ok: [node2] => {"changed": false, "checksum": "860b79c32d9bf8a46a7167a7c7ee51cba9eb07e7", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 591, "state": "file", "uid": 0}
ok: [node1] => {"changed": false, "checksum": "860b79c32d9bf8a46a7167a7c7ee51cba9eb07e7", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 591, "state": "file", "uid": 0}
TASK [docker : Write docker options systemd drop-in] ************************************************************************************************
Friday 29 December 2017 05:48:27 +0000 (0:00:00.697) 0:00:31.475 *******
ok: [node1] => {"changed": false, "checksum": "0ad16aa2e450ad8037a3c98c14a9c6aaf43be722", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 158, "state": "file", "uid": 0}
ok: [node3] => {"changed": false, "checksum": "0ad16aa2e450ad8037a3c98c14a9c6aaf43be722", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 158, "state": "file", "uid": 0}
ok: [node2] => {"changed": false, "checksum": "0ad16aa2e450ad8037a3c98c14a9c6aaf43be722", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 158, "state": "file", "uid": 0}
TASK [docker : Write docker dns systemd drop-in] ****************************************************************************************************
Friday 29 December 2017 05:48:28 +0000 (0:00:00.692) 0:00:32.168 *******
ok: [node3] => {"changed": false, "checksum": "184aebc82d8f32a930b94076bcb88307e73e5201", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 268, "state": "file", "uid": 0}
ok: [node1] => {"changed": false, "checksum": "184aebc82d8f32a930b94076bcb88307e73e5201", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 268, "state": "file", "uid": 0}
ok: [node2] => {"changed": false, "checksum": "184aebc82d8f32a930b94076bcb88307e73e5201", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 268, "state": "file", "uid": 0}
TASK [docker : ensure docker service is started and enabled] ****************************************************************************************
Friday 29 December 2017 05:48:28 +0000 (0:00:00.690) 0:00:32.858 *******
ok: [node3] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:14:28 UTC", "ActiveEnterTimestampMonotonic": "11747813615", "ActiveExitTimestamp": "Thu 2017-12-28 11:14:25 UTC", "ActiveExitTimestampMonotonic": "11745680614", "ActiveState": "active", "After": "sysinit.target systemd-journald.socket network.target docker.socket system.slice basic.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:14:26 UTC", "AssertTimestampMonotonic": "11746697034", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "131041520728", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ConditionTimestampMonotonic": "11746697034", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x208.8.8.8\\x20--dns\\x208.8.4.4\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20openstacklocal\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "20828", "ExecMainStartTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ExecMainStartTimestampMonotonic": "11746708168", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:14:26 UTC] ; stop_time=[n/a] ; pid=20828 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:14:26 UTC", "InactiveEnterTimestampMonotonic": "11746694163", "InactiveExitTimestamp": "Thu 2017-12-28 11:14:26 UTC", "InactiveExitTimestampMonotonic": "11746708194", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "20828", "MemoryAccounting": "no", "MemoryCurrent": "1844580352", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "sysinit.target system.slice", "Restart": "on-abnormal", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:14:28 UTC", "StateChangeTimestampMonotonic": "11747813615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "21", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:14:28 UTC", "WatchdogTimestampMonotonic": "11747813614", "WatchdogUSec": "0"}}
ok: [node2] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:14:28 UTC", "ActiveEnterTimestampMonotonic": "11748379031", "ActiveExitTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ActiveExitTimestampMonotonic": "11746238519", "ActiveState": "active", "After": "network.target basic.target system.slice sysinit.target docker.socket systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:14:27 UTC", "AssertTimestampMonotonic": "11747252402", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "138815837592", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ConditionTimestampMonotonic": "11747252401", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x208.8.8.8\\x20--dns\\x208.8.4.4\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20openstacklocal\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "20784", "ExecMainStartTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ExecMainStartTimestampMonotonic": "11747260177", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:14:27 UTC] ; stop_time=[n/a] ; pid=20784 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveEnterTimestampMonotonic": "11747250465", "InactiveExitTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveExitTimestampMonotonic": "11747260211", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "20784", "MemoryAccounting": "no", "MemoryCurrent": "1844490240", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "sysinit.target system.slice", "Restart": "on-abnormal", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:14:28 UTC", "StateChangeTimestampMonotonic": "11748379031", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "22", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:14:28 UTC", "WatchdogTimestampMonotonic": "11748379030", "WatchdogUSec": "0"}}
ok: [node1] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:14:28 UTC", "ActiveEnterTimestampMonotonic": "11750578084", "ActiveExitTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ActiveExitTimestampMonotonic": "11748443756", "ActiveState": "active", "After": "network.target systemd-journald.socket docker.socket basic.target system.slice sysinit.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:14:27 UTC", "AssertTimestampMonotonic": "11749460513", "Before": "etcd.service shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "147571016825", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ConditionTimestampMonotonic": "11749460513", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x208.8.8.8\\x20--dns\\x208.8.4.4\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20openstacklocal\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "20839", "ExecMainStartTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ExecMainStartTimestampMonotonic": "11749472130", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveEnterTimestampMonotonic": "11749458467", "InactiveExitTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveExitTimestampMonotonic": "11749472171", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "20839", "MemoryAccounting": "no", "MemoryCurrent": "1853849600", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice sysinit.target", "Restart": "on-abnormal", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:14:28 UTC", "StateChangeTimestampMonotonic": "11750578084", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "33", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:14:28 UTC", "WatchdogTimestampMonotonic": "11750578083", "WatchdogUSec": "0"}}
TASK [rkt : gather os specific variables for rkt] ***************************************************************************************************
Friday 29 December 2017 05:48:29 +0000 (0:00:00.526) 0:00:33.385 *******
TASK [rkt : install rkt pkg on ubuntu] **************************************************************************************************************
Friday 29 December 2017 05:48:29 +0000 (0:00:00.052) 0:00:33.437 *******
TASK [rkt : install rkt pkg on centos] **************************************************************************************************************
Friday 29 December 2017 05:48:29 +0000 (0:00:00.044) 0:00:33.482 *******
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:29 +0000 (0:00:00.040) 0:00:33.522 *******
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017 05:48:29 +0000 (0:00:00.375) 0:00:33.898 *******
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ubuntu", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 1000}
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ubuntu", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 1000}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ubuntu", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 1000}
TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017 05:48:30 +0000 (0:00:00.423) 0:00:34.321 *******
TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017 05:48:30 +0000 (0:00:00.021) 0:00:34.342 *******
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_file.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:31 +0000 (0:00:01.228) 0:00:35.570 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:31 +0000 (0:00:00.146) 0:00:35.716 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:32 +0000 (0:00:00.472) 0:00:36.189 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.1"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.1"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.1"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:32 +0000 (0:00:00.492) 0:00:36.682 *******
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:33 +0000 (0:00:00.426) 0:00:37.108 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:33 +0000 (0:00:00.360) 0:00:37.469 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:33 +0000 (0:00:00.065) 0:00:37.534 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:33 +0000 (0:00:00.019) 0:00:37.554 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:33 +0000 (0:00:00.068) 0:00:37.623 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:33 +0000 (0:00:00.147) 0:00:37.770 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:34 +0000 (0:00:00.346) 0:00:38.116 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/hyperkube:v1.9.0_coreos.0"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/hyperkube:v1.9.0_coreos.0"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/hyperkube:v1.9.0_coreos.0"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:34 +0000 (0:00:00.373) 0:00:38.490 *******
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:34 +0000 (0:00:00.442) 0:00:38.933 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:35 +0000 (0:00:00.348) 0:00:39.281 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:35 +0000 (0:00:00.063) 0:00:39.345 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:35 +0000 (0:00:00.019) 0:00:39.365 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:35 +0000 (0:00:00.063) 0:00:39.429 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:35 +0000 (0:00:00.141) 0:00:39.570 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:35 +0000 (0:00:00.337) 0:00:39.908 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.4"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.4"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.4"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:36 +0000 (0:00:00.428) 0:00:40.337 *******
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:36 +0000 (0:00:00.505) 0:00:40.842 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:37 +0000 (0:00:00.433) 0:00:41.276 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:37 +0000 (0:00:00.065) 0:00:41.341 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:37 +0000 (0:00:00.021) 0:00:41.363 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:37 +0000 (0:00:00.059) 0:00:41.422 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:37 +0000 (0:00:00.141) 0:00:41.564 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:37 +0000 (0:00:00.359) 0:00:41.923 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.1"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.1"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.1"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:38 +0000 (0:00:00.374) 0:00:42.298 *******
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:38 +0000 (0:00:00.442) 0:00:42.740 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:39 +0000 (0:00:00.355) 0:00:43.095 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:39 +0000 (0:00:00.062) 0:00:43.158 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:39 +0000 (0:00:00.019) 0:00:43.178 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:39 +0000 (0:00:00.068) 0:00:43.246 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:39 +0000 (0:00:00.141) 0:00:43.387 *******
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:39 +0000 (0:00:00.337) 0:00:43.724 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.2"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.2"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.2"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:39 +0000 (0:00:00.344) 0:00:44.068 *******
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:40 +0000 (0:00:00.445) 0:00:44.514 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:40 +0000 (0:00:00.348) 0:00:44.862 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:40 +0000 (0:00:00.063) 0:00:44.926 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:40 +0000 (0:00:00.020) 0:00:44.947 *******
TASK [download : file_download | Downloading...] ****************************************************************************************************
Friday 29 December 2017 05:48:40 +0000 (0:00:00.054) 0:00:45.001 *******
ok: [node3] => {
"msg": [
"URL: https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux",
"Dest: istio/istioctl"
]
}
ok: [node2] => {
"msg": [
"URL: https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux",
"Dest: istio/istioctl"
]
}
ok: [node1] => {
"msg": [
"URL: https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux",
"Dest: istio/istioctl"
]
}
TASK [download : file_download | Create dest directory] *********************************************************************************************
Friday 29 December 2017 05:48:41 +0000 (0:00:00.351) 0:00:45.353 *******
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/istio", "size": 4096, "state": "directory", "uid": 0}
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/istio", "size": 4096, "state": "directory", "uid": 0}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/istio", "size": 4096, "state": "directory", "uid": 0}
TASK [download : file_download | Download item] *****************************************************************************************************
Friday 29 December 2017 05:48:41 +0000 (0:00:00.459) 0:00:45.812 *******
ok: [node3] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/istio/istioctl", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 38262799, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux"}
ok: [node2] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/istio/istioctl", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 38262799, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux"}
ok: [node1] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/istio/istioctl", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 38262799, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux"}
TASK [download : file_download | Extract archives] **************************************************************************************************
Friday 29 December 2017 05:48:42 +0000 (0:00:00.729) 0:00:46.542 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:42 +0000 (0:00:00.061) 0:00:46.604 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:42 +0000 (0:00:00.144) 0:00:46.748 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:43 +0000 (0:00:00.337) 0:00:47.086 *******
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:43 +0000 (0:00:00.340) 0:00:47.427 *******
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:43 +0000 (0:00:00.427) 0:00:47.854 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:44 +0000 (0:00:00.351) 0:00:48.205 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:44 +0000 (0:00:00.066) 0:00:48.272 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:44 +0000 (0:00:00.020) 0:00:48.293 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:44 +0000 (0:00:00.068) 0:00:48.361 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:44 +0000 (0:00:00.146) 0:00:48.508 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:44 +0000 (0:00:00.368) 0:00:48.877 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:45 +0000 (0:00:00.352) 0:00:49.230 *******
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:45 +0000 (0:00:00.441) 0:00:49.671 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:45 +0000 (0:00:00.348) 0:00:50.019 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:46 +0000 (0:00:00.065) 0:00:50.085 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:46 +0000 (0:00:00.019) 0:00:50.104 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:46 +0000 (0:00:00.061) 0:00:50.166 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:46 +0000 (0:00:00.146) 0:00:50.313 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:46 +0000 (0:00:00.344) 0:00:50.657 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "lachlanevenson/k8s-helm:v2.7.2"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "lachlanevenson/k8s-helm:v2.7.2"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "lachlanevenson/k8s-helm:v2.7.2"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:46 +0000 (0:00:00.338) 0:00:50.996 *******
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:47 +0000 (0:00:00.429) 0:00:51.425 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:47 +0000 (0:00:00.359) 0:00:51.784 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:47 +0000 (0:00:00.063) 0:00:51.848 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:47 +0000 (0:00:00.019) 0:00:51.868 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:47 +0000 (0:00:00.060) 0:00:51.928 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:47 +0000 (0:00:00.143) 0:00:52.072 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:48 +0000 (0:00:00.359) 0:00:52.432 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/kubernetes-helm/tiller:v2.7.2"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/kubernetes-helm/tiller:v2.7.2"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/kubernetes-helm/tiller:v2.7.2"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:48 +0000 (0:00:00.353) 0:00:52.786 *******
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:49 +0000 (0:00:00.429) 0:00:53.215 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:49 +0000 (0:00:00.351) 0:00:53.567 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:49 +0000 (0:00:00.064) 0:00:53.631 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:49 +0000 (0:00:00.019) 0:00:53.651 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:49 +0000 (0:00:00.060) 0:00:53.712 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:49 +0000 (0:00:00.142) 0:00:53.854 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:50 +0000 (0:00:00.348) 0:00:54.203 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:50 +0000 (0:00:00.349) 0:00:54.553 *******
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:51 +0000 (0:00:00.536) 0:00:55.089 *******
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:51 +0000 (0:00:00.445) 0:00:55.535 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:51 +0000 (0:00:00.064) 0:00:55.599 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:51 +0000 (0:00:00.020) 0:00:55.619 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:51 +0000 (0:00:00.059) 0:00:55.679 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:51 +0000 (0:00:00.140) 0:00:55.820 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:52 +0000 (0:00:00.509) 0:00:56.329 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.0"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.0"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.0"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:52 +0000 (0:00:00.522) 0:00:56.851 *******
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:53 +0000 (0:00:00.459) 0:00:57.311 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:53 +0000 (0:00:00.500) 0:00:57.812 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:53 +0000 (0:00:00.067) 0:00:57.879 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:53 +0000 (0:00:00.021) 0:00:57.901 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:53 +0000 (0:00:00.068) 0:00:57.969 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:54 +0000 (0:00:00.144) 0:00:58.114 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:54 +0000 (0:00:00.360) 0:00:58.474 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:54 +0000 (0:00:00.515) 0:00:58.990 *******
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:55 +0000 (0:00:00.576) 0:00:59.567 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:55 +0000 (0:00:00.486) 0:01:00.053 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:56 +0000 (0:00:00.067) 0:01:00.120 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:56 +0000 (0:00:00.022) 0:01:00.143 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:56 +0000 (0:00:00.060) 0:01:00.203 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:56 +0000 (0:00:00.152) 0:01:00.355 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:56 +0000 (0:00:00.518) 0:01:00.874 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/routereflector:v0.4.0"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/routereflector:v0.4.0"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/routereflector:v0.4.0"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:57 +0000 (0:00:00.507) 0:01:01.382 *******
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:57 +0000 (0:00:00.580) 0:01:01.963 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:48:58 +0000 (0:00:00.515) 0:01:02.479 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:48:58 +0000 (0:00:00.065) 0:01:02.544 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:48:58 +0000 (0:00:00.019) 0:01:02.564 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:48:58 +0000 (0:00:00.063) 0:01:02.627 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:58 +0000 (0:00:00.150) 0:01:02.777 *******
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:48:59 +0000 (0:00:00.548) 0:01:03.326 *******
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "busybox:latest"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "busybox:latest"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "busybox:latest"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:48:59 +0000 (0:00:00.380) 0:01:03.707 *******
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:49:00 +0000 (0:00:00.439) 0:01:04.147 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:49:00 +0000 (0:00:00.367) 0:01:04.514 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:49:00 +0000 (0:00:00.066) 0:01:04.581 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:49:00 +0000 (0:00:00.020) 0:01:04.602 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017 05:49:00 +0000 (0:00:00.065) 0:01:04.668 *******
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:49:00 +0000 (0:00:00.145) 0:01:04.813 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:49:01 +0000 (0:00:00.375) 0:01:05.189 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7"}, "changed": false}
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:49:01 +0000 (0:00:00.346) 0:01:05.535 *******
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:49:01 +0000 (0:00:00.442) 0:01:05.978 *******
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017 05:49:02 +0000 (0:00:00.398) 0:01:06.376 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017 05:49:02 +0000 (0:00:00.067) 0:01:06.444 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017 05:49:02 +0000 (0:00:00.024) 0:01:06.468 *******
TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017 05:49:02 +0000 (0:00:00.052) 0:01:06.520 *******
included: /home/ubuntu/kubespray/roles/download/tasks/sync_container.yml for node2, node3, node1
TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.816) 0:01:07.336 *******
TASK [download : container_download | Set default value for 'container_changed' to false] ***********************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.027) 0:01:07.364 *******
TASK [download : container_download | Update the 'container_changed' fact] **************************************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.051) 0:01:07.415 *******
TASK [download : container_download | Stat saved container image] ***********************************************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.056) 0:01:07.471 *******
TASK [download : container_download | save container images] ****************************************************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.036) 0:01:07.508 *******
TASK [download : container_download | copy container images to ansible host] ************************************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.030) 0:01:07.539 *******
TASK [download : container_download | upload container images to nodes] *****************************************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.030) 0:01:07.569 *******
TASK [download : container_download | load container images] ****************************************************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.056) 0:01:07.626 *******
PLAY [etcd:k8s-cluster:vault:calico-rr] *************************************************************************************************************
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.188) 0:01:07.814 *******
TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.046) 0:01:07.861 *******
TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.044) 0:01:07.905 *******
TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017 05:49:03 +0000 (0:00:00.020) 0:01:07.925 *******
TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017 05:49:04 +0000 (0:00:00.553) 0:01:08.478 *******
TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017 05:49:04 +0000 (0:00:00.536) 0:01:09.015 *******
TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017 05:49:04 +0000 (0:00:00.044) 0:01:09.059 *******
TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.042) 0:01:09.101 *******
TASK [vault : stop vault-temp container] ************************************************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.046) 0:01:09.148 *******
TASK [vault : check_vault | Attempt to pull local https Vault health] *******************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.041) 0:01:09.190 *******
TASK [vault : check_vault | Set facts about local Vault health] *************************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.046) 0:01:09.236 *******
TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] ****************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.045) 0:01:09.282 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.024) 0:01:09.306 *******
TASK [vault : bootstrap/sync_secrets | Set fact based on sync_file_results] *************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.069) 0:01:09.376 *******
TASK [vault : bootstrap/sync_secrets | Reset sync_file_results to avoid variable bleed] *************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.037) 0:01:09.413 *******
TASK [vault : bootstrap/sync_secrets | Print out warning message if secrets are not available and vault is initialized] *****************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.047) 0:01:09.461 *******
TASK [vault : bootstrap/sync_secrets | Cat root_token from a vault host] ****************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.022) 0:01:09.483 *******
TASK [vault : bootstrap/sync_secrets | Cat unseal_keys from a vault host] ***************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.043) 0:01:09.526 *******
TASK [vault : bootstrap/sync_secrets | Set needed facts for Vault API interaction when Vault is already running] ************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.046) 0:01:09.573 *******
TASK [vault : bootstrap/sync_secrets | Update vault_headers if we have the root_token] **************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.044) 0:01:09.617 *******
TASK [vault : find_leader | Find the current http Vault leader] *************************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.045) 0:01:09.662 *******
TASK [vault : find_leader | Set fact for current http leader] ***************************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.041) 0:01:09.704 *******
TASK [vault : find_leader| show vault_leader_url] ***************************************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.054) 0:01:09.758 *******
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.044) 0:01:09.803 *******
TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.049) 0:01:09.853 *******
TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.044) 0:01:09.898 *******
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.047) 0:01:09.945 *******
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.064) 0:01:10.010 *******
TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017 05:49:05 +0000 (0:00:00.050) 0:01:10.061 *******
TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.053) 0:01:10.114 *******
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.063) 0:01:10.177 *******
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.057) 0:01:10.235 *******
TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.074) 0:01:10.309 *******
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.060) 0:01:10.370 *******
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.070) 0:01:10.441 *******
TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.053) 0:01:10.495 *******
TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.061) 0:01:10.557 *******
TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.066) 0:01:10.623 *******
TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.066) 0:01:10.690 *******
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.053) 0:01:10.744 *******
TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.048) 0:01:10.792 *******
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.051) 0:01:10.844 *******
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.075) 0:01:10.919 *******
TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.063) 0:01:10.983 *******
TASK [vault : bootstrap/sync_vault_certs | Set facts for vault sync_file results] *******************************************************************
Friday 29 December 2017 05:49:06 +0000 (0:00:00.061) 0:01:11.044 *******
TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after ca.pem sync] ***************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.057) 0:01:11.102 *******
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.054) 0:01:11.157 *******
TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.049) 0:01:11.206 *******
TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.047) 0:01:11.253 *******
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.051) 0:01:11.304 *******
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.049) 0:01:11.354 *******
TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.047) 0:01:11.402 *******
TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.050) 0:01:11.452 *******
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.052) 0:01:11.504 *******
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.044) 0:01:11.549 *******
TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.045) 0:01:11.594 *******
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.047) 0:01:11.641 *******
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.046) 0:01:11.688 *******
TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.045) 0:01:11.733 *******
TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.050) 0:01:11.784 *******
TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.046) 0:01:11.831 *******
TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.063) 0:01:11.895 *******
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.048) 0:01:11.943 *******
TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017 05:49:07 +0000 (0:00:00.069) 0:01:12.013 *******
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.063) 0:01:12.076 *******
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.052) 0:01:12.129 *******
TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.047) 0:01:12.177 *******
TASK [vault : bootstrap/sync_vault_certs | Set fact if Vault's API cert is needed] ******************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.045) 0:01:12.222 *******
TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after api.pem sync] **************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.041) 0:01:12.264 *******
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.043) 0:01:12.307 *******
TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.047) 0:01:12.354 *******
TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.048) 0:01:12.403 *******
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.045) 0:01:12.449 *******
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.045) 0:01:12.495 *******
TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.052) 0:01:12.548 *******
TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.068) 0:01:12.616 *******
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.085) 0:01:12.701 *******
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.047) 0:01:12.748 *******
TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.046) 0:01:12.795 *******
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.049) 0:01:12.844 *******
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.053) 0:01:12.897 *******
TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.044) 0:01:12.942 *******
TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.048) 0:01:12.990 *******
TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017 05:49:08 +0000 (0:00:00.047) 0:01:13.038 *******
TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.049) 0:01:13.087 *******
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.046) 0:01:13.134 *******
TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.051) 0:01:13.185 *******
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.048) 0:01:13.233 *******
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.055) 0:01:13.289 *******
TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.050) 0:01:13.339 *******
TASK [vault : bootstrap/sync_etcd_certs | Set facts for etcd sync_file results] *********************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.045) 0:01:13.385 *******
TASK [vault : bootstrap/sync_etcd_certs | Unset sync_file_results after ca.pem sync] ****************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.041) 0:01:13.427 *******
TASK [vault : bootstrap/start_vault_temp | Ensure vault-temp isn't already running] *****************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.044) 0:01:13.471 *******
TASK [vault : bootstrap/start_vault_temp | Start single node Vault with file backend] ***************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.046) 0:01:13.517 *******
TASK [vault : bootstrap/start_vault_temp | Start again single node Vault with file backend] *********************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.046) 0:01:13.563 *******
TASK [vault : bootstrap/start_vault_temp | Initialize vault-temp] ***********************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.046) 0:01:13.609 *******
TASK [vault : bootstrap/start_vault_temp | Set needed vault facts] **********************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.045) 0:01:13.655 *******
TASK [vault : bootstrap/start_vault_temp | Unseal vault-temp] ***************************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.048) 0:01:13.704 *******
TASK [vault : vault | Set fact about vault leader url] **********************************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.036) 0:01:13.741 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.043) 0:01:13.784 *******
TASK [vault : shared/auth_backend | Test if the auth backend exists] ********************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.060) 0:01:13.845 *******
TASK [vault : shared/auth_backend | Add the cert auth backend if needed] ****************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.043) 0:01:13.889 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.042) 0:01:13.932 *******
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/vault/ssl exists] *****************************************************************************
Friday 29 December 2017 05:49:09 +0000 (0:00:00.100) 0:01:14.033 *******
TASK [vault : bootstrap/gen_ca | Generate vault root CA] ********************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.059) 0:01:14.093 *******
TASK [vault : bootstrap/gen_ca | Copy vault root CA cert locally] ***********************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.033) 0:01:14.126 *******
TASK [vault : bootstrap/gen_ca | Copy vault root CA key locally] ************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.055) 0:01:14.182 *******
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/ssl/etcd/ssl exists] **************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.057) 0:01:14.239 *******
TASK [vault : bootstrap/gen_ca | Generate etcd root CA] *********************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.060) 0:01:14.300 *******
TASK [vault : bootstrap/gen_ca | Copy etcd root CA cert locally] ************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.035) 0:01:14.336 *******
TASK [vault : bootstrap/gen_ca | Copy etcd root CA key locally] *************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.057) 0:01:14.393 *******
TASK [vault : issue_cert | Ensure target directory exists] ******************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.043) 0:01:14.436 *******
TASK [vault : issue_cert | Read in the local credentials] *******************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.051) 0:01:14.488 *******
TASK [vault : gen_certs_vault | Set facts for read Vault Creds] *************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.027) 0:01:14.515 *******
TASK [vault : gen_certs_vault | Log into Vault and obtain an token] *********************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.025) 0:01:14.541 *******
TASK [vault : gen_certs_vault | Set fact for vault_client_token] ************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.022) 0:01:14.563 *******
TASK [vault : gen_certs_vault | Set fact for Vault API token] ***************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.023) 0:01:14.587 *******
TASK [vault : issue_cert | Generate /etc/vault/ssl/api.pem for vault role] **************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.039) 0:01:14.627 *******
TASK [vault : issue_cert | Copy /etc/vault/ssl/api.pem cert to all hosts] ***************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.026) 0:01:14.653 *******
TASK [vault : issue_cert | Copy key for /etc/vault/ssl/api.pem to all hosts] ************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.048) 0:01:14.701 *******
TASK [vault : issue_cert | Copy issuing CA cert] ****************************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.048) 0:01:14.750 *******
TASK [vault : issue_cert | Copy certificate serial to all hosts] ************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.049) 0:01:14.800 *******
TASK [vault : bootstrap/ca_trust | pull CA from cert from {{groups.vault|first}}] *******************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.054) 0:01:14.854 *******
TASK [vault : bootstrap/ca_trust | target ca-certificate store file] ********************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.058) 0:01:14.913 *******
TASK [vault : bootstrap/ca_trust | add CA to trusted CA dir] ****************************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.043) 0:01:14.956 *******
TASK [vault : bootstrap/ca_trust | update ca-certificates (Debian/Ubuntu/CoreOS)] *******************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.045) 0:01:15.001 *******
TASK [vault : bootstrap/ca_trust | update ca-certificates (RedHat)] *********************************************************************************
Friday 29 December 2017 05:49:10 +0000 (0:00:00.044) 0:01:15.046 *******
TASK [vault : stop vault-temp container] ************************************************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.042) 0:01:15.089 *******
TASK [vault : check_vault | Attempt to pull local https Vault health] *******************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.049) 0:01:15.139 *******
TASK [vault : check_vault | Set facts about local Vault health] *************************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.042) 0:01:15.181 *******
TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] ****************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.046) 0:01:15.227 *******
TASK [vault : check_etcd | Check if etcd is up and reachable] ***************************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.030) 0:01:15.257 *******
TASK [vault : check_etcd | Set fact based off the etcd_health_check response] ***********************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.021) 0:01:15.279 *******
TASK [vault : set_fact] *****************************************************************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.057) 0:01:15.337 *******
TASK [vault : check_etcd | Fail if etcd is not available and needed] ********************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.049) 0:01:15.387 *******
TASK [vault : cluster/configure | Ensure the vault/config directory exists] *************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.078) 0:01:15.465 *******
TASK [vault : cluster/configure | Lay down the configuration file] **********************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.047) 0:01:15.512 *******
TASK [vault : cluster/binary | Copy vault binary from downloaddir] **********************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.046) 0:01:15.559 *******
TASK [vault : cluster/systemd | Ensure mount points exist prior to vault.service startup] ***********************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.048) 0:01:15.608 *******
TASK [vault : cluster/systemd | Ensure the vault user has access to needed directories] *************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.110) 0:01:15.718 *******
TASK [vault : cluster/systemd | Copy down vault.service systemd file] *******************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.081) 0:01:15.799 *******
TASK [vault : Create vault service systemd directory] ***********************************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.044) 0:01:15.844 *******
TASK [vault : cluster/systemd | Add vault proxy env vars] *******************************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.041) 0:01:15.885 *******
TASK [vault : cluster/systemd | Enable vault.service] ***********************************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.051) 0:01:15.936 *******
TASK [vault : cluster/systemd | Query local vault until service is up] ******************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.046) 0:01:15.983 *******
TASK [vault : cluster/init | Initialize Vault] ******************************************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.044) 0:01:16.027 *******
TASK [vault : cluster/init | Set facts on the results of the initialization] ************************************************************************
Friday 29 December 2017 05:49:11 +0000 (0:00:00.041) 0:01:16.069 *******
TASK [vault : cluster/init | Ensure all hosts have these facts] *************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.044) 0:01:16.114 *******
TASK [vault : cluster/init | Ensure the vault_secrets_dir exists] ***********************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.042) 0:01:16.156 *******
TASK [vault : cluster/init | Ensure all in groups.vault have the unseal_keys locally] ***************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.046) 0:01:16.202 *******
TASK [vault : cluster/init | Ensure all in groups.vault have the root_token locally] ****************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.042) 0:01:16.245 *******
TASK [vault : cluster/init | Ensure vault_headers and vault statuses are updated] *******************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.048) 0:01:16.293 *******
TASK [vault : cluster/unseal | Current sealed state] ************************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.044) 0:01:16.337 *******
TASK [vault : cluster/unseal | Unseal Vault] ********************************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.050) 0:01:16.388 *******
TASK [vault : cluster/unseal | Wait until server is ready] ******************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.038) 0:01:16.426 *******
TASK [vault : find_leader | Find the current http Vault leader] *************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.044) 0:01:16.470 *******
TASK [vault : find_leader | Set fact for current http leader] ***************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.047) 0:01:16.518 *******
TASK [vault : find_leader| show vault_leader_url] ***************************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.045) 0:01:16.563 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.046) 0:01:16.610 *******
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/kubernetes/ssl exists] ************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.131) 0:01:16.741 *******
TASK [vault : bootstrap/gen_ca | Generate kube root CA] *********************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.060) 0:01:16.802 *******
TASK [vault : bootstrap/gen_ca | Copy kube root CA cert locally] ************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.034) 0:01:16.836 *******
TASK [vault : bootstrap/gen_ca | Copy kube root CA key locally] *************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.053) 0:01:16.890 *******
TASK [vault : shared/auth_backend | Test if the auth backend exists] ********************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.045) 0:01:16.936 *******
TASK [vault : shared/auth_backend | Add the cert auth backend if needed] ****************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.045) 0:01:16.981 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:12 +0000 (0:00:00.044) 0:01:17.026 *******
PLAY [etcd] *****************************************************************************************************************************************
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:49:13 +0000 (0:00:00.135) 0:01:17.161 *******
TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017 05:49:13 +0000 (0:00:00.020) 0:01:17.182 *******
TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017 05:49:13 +0000 (0:00:00.022) 0:01:17.205 *******
TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017 05:49:13 +0000 (0:00:00.021) 0:01:17.226 *******
TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017 05:49:13 +0000 (0:00:00.430) 0:01:17.657 *******
TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017 05:49:13 +0000 (0:00:00.401) 0:01:18.058 *******
ok: [node1] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017 05:49:14 +0000 (0:00:00.063) 0:01:18.122 *******
ok: [node1] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}
TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017 05:49:14 +0000 (0:00:00.179) 0:01:18.301 *******
ok: [node1] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}
TASK [etcd : Check_certs | check if all certs have already been generated on first master] **********************************************************
Friday 29 December 2017 05:49:14 +0000 (0:00:00.214) 0:01:18.516 *******
ok: [node1 -> None] => {"changed": false, "examined": 12, "files": [{"atime": 1514459947.704, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459950.54, "checksum": "3bb643c8ddf9ee0b6baaf93805fc63962e5cf57e", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522183, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.196, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "ade3addf27f16aa19093dc3aac030a108d76ef6c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522180, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.152, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "fb8aa806ecc6efa79cce6da17faf99b38d8eb876", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522177, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.88, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "b723851efff5c870f12425122562b9ba747e96fc", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522175, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.868, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514460475.756, "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "0b9f2c142df29f8d45fba6086eca19790b90760c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522178, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.144, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}], "matched": 7, "msg": ""}
TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] **************************************
Friday 29 December 2017 05:49:14 +0000 (0:00:00.277) 0:01:18.793 *******
ok: [node1] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}
TASK [etcd : Check certs | check if a cert already exists on node] **********************************************************************************
Friday 29 December 2017 05:49:14 +0000 (0:00:00.071) 0:01:18.864 *******
ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459947.704, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "727116751", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"atime": 1514460475.756, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "b39f11dab64683147f180e645aa7f322", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "version": "727116765", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
TASK [etcd : Check_certs | Set 'gen_certs' to true] *************************************************************************************************
Friday 29 December 2017 05:49:15 +0000 (0:00:00.356) 0:01:19.221 *******
TASK [etcd : Check_certs | Set 'gen_node_certs' to true] ********************************************************************************************
Friday 29 December 2017 05:49:15 +0000 (0:00:00.066) 0:01:19.288 *******
ok: [node1] => {"ansible_facts": {"gen_node_certs": {"node1": false, "node2": false, "node3": false}}, "changed": false}
TASK [etcd : Check_certs | Set 'sync_certs' to true] ************************************************************************************************
Friday 29 December 2017 05:49:15 +0000 (0:00:00.073) 0:01:19.361 *******
TASK [etcd : include] *******************************************************************************************************************************
Friday 29 December 2017 05:49:15 +0000 (0:00:00.038) 0:01:19.400 *******
included: /home/ubuntu/kubespray/roles/etcd/tasks/gen_certs_script.yml for node1
TASK [etcd : Gen_certs | create etcd cert dir] ******************************************************************************************************
Friday 29 December 2017 05:49:15 +0000 (0:00:00.091) 0:01:19.491 *******
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | create etcd script dir (on node1)] *****************************************************************************************
Friday 29 December 2017 05:49:15 +0000 (0:00:00.181) 0:01:19.673 *******
ok: [node1 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 4096, "state": "directory", "uid": 0}
TASK [etcd : Gen_certs | create etcd cert dir (on node1)] *******************************************************************************************
Friday 29 December 2017 05:49:15 +0000 (0:00:00.180) 0:01:19.853 *******
ok: [node1 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | write openssl config] ******************************************************************************************************
Friday 29 December 2017 05:49:15 +0000 (0:00:00.183) 0:01:20.037 *******
TASK [etcd : Gen_certs | copy certs generation script] **********************************************************************************************
Friday 29 December 2017 05:49:15 +0000 (0:00:00.029) 0:01:20.067 *******
TASK [etcd : Gen_certs | run cert generation script] ************************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.026) 0:01:20.094 *******
TASK [etcd : set_fact] ******************************************************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.021) 0:01:20.115 *******
ok: [node1] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "my_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem"]}, "changed": false}
TASK [etcd : Gen_certs | Gather etcd master certs] **************************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.078) 0:01:20.194 *******
TASK [etcd : Gen_certs | Gather etcd node certs] ****************************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.027) 0:01:20.222 *******
TASK [etcd : Gen_certs | Prepare tempfile for unpacking certs] **************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.023) 0:01:20.245 *******
TASK [etcd : Gen_certs | Write master certs to tempfile] ********************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.022) 0:01:20.267 *******
TASK [etcd : Gen_certs | Unpack certs on masters] ***************************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.020) 0:01:20.288 *******
TASK [etcd : Gen_certs | Cleanup tempfile] **********************************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.021) 0:01:20.309 *******
TASK [etcd : Gen_certs | Copy certs on nodes] *******************************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.021) 0:01:20.331 *******
TASK [etcd : Gen_certs | check certificate permissions] *********************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.021) 0:01:20.352 *******
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | target ca-certificate store file] ******************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.177) 0:01:20.530 *******
ok: [node1] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}
TASK [etcd : Gen_certs | add CA to trusted CA dir] **************************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.069) 0:01:20.599 *******
ok: [node1] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}
TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/Container Linux by CoreOS)] **********************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.255) 0:01:20.855 *******
TASK [etcd : Gen_certs | update ca-certificates (RedHat)] *******************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.022) 0:01:20.877 *******
TASK [etcd : Gen_certs | Get etcd certificate serials] **********************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.020) 0:01:20.897 *******
ok: [node1] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.005227", "end": "2017-12-29 05:49:15.729069", "rc": 0, "start": "2017-12-29 05:49:15.723842", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823963", "stdout_lines": ["B13862C721823963"]}
TASK [etcd : Set etcd_client_cert_serial] ***********************************************************************************************************
Friday 29 December 2017 05:49:16 +0000 (0:00:00.176) 0:01:21.074 *******
ok: [node1] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823963"}, "changed": false}
TASK [etcd : include] *******************************************************************************************************************************
Friday 29 December 2017 05:49:17 +0000 (0:00:00.068) 0:01:21.143 *******
included: /home/ubuntu/kubespray/roles/etcd/tasks/install_docker.yml for node1
TASK [etcd : Install | Copy etcdctl binary from docker container] ***********************************************************************************
Friday 29 December 2017 05:49:17 +0000 (0:00:00.055) 0:01:21.198 *******
ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["sh", "-c", "/usr/bin/docker rm -f etcdctl-binarycopy; /usr/bin/docker create --name etcdctl-binarycopy quay.io/coreos/etcd:v3.2.4 && /usr/bin/docker cp etcdctl-binarycopy:/usr/local/bin/etcdctl /usr/local/bin/etcdctl && /usr/bin/docker rm -f etcdctl-binarycopy"], "delta": "0:00:00.144216", "end": "2017-12-29 05:49:16.169502", "rc": 0, "start": "2017-12-29 05:49:16.025286", "stderr": "Error response from daemon: No such container: etcdctl-binarycopy", "stderr_lines": ["Error response from daemon: No such container: etcdctl-binarycopy"], "stdout": "0ce227f738aaba4aa9df1abdae14d2689b1e3676fffb0c47d35f798a8f4de61d\netcdctl-binarycopy", "stdout_lines": ["0ce227f738aaba4aa9df1abdae14d2689b1e3676fffb0c47d35f798a8f4de61d", "etcdctl-binarycopy"]}
TASK [etcd : Configure | Check if cluster is healthy] ***********************************************************************************************
Friday 29 December 2017 05:49:17 +0000 (0:00:00.320) 0:01:21.519 *******
ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.12.5.37:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.035846", "end": "2017-12-29 05:49:16.425502", "rc": 0, "start": "2017-12-29 05:49:16.389656", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [etcd : Configure | Check if member is in cluster] *********************************************************************************************
Friday 29 December 2017 05:49:17 +0000 (0:00:00.253) 0:01:21.773 *******
ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --no-sync --endpoints=https://10.12.5.37:2379 member list | grep -q 10.12.5.37", "delta": "0:00:00.033010", "end": "2017-12-29 05:49:16.681513", "rc": 0, "start": "2017-12-29 05:49:16.648503", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [etcd : Install etcd launch script] ************************************************************************************************************
Friday 29 December 2017 05:49:17 +0000 (0:00:00.256) 0:01:22.029 *******
ok: [node1] => {"changed": false, "checksum": "c961d8258e45cea8cbd161522a23b7ff778ca0b0", "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/etcd", "size": 383, "state": "file", "uid": 0}
TASK [etcd : Configure | Copy etcd.service systemd file] ********************************************************************************************
Friday 29 December 2017 05:49:18 +0000 (0:00:00.390) 0:01:22.420 *******
ok: [node1] => {"changed": false, "checksum": "643a64e6855d3b34a04abbf561fd843945934936", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/etcd.service", "size": 354, "state": "file", "uid": 0}
TASK [etcd : Configure | Join member(s) to cluster one at a time] ***********************************************************************************
Friday 29 December 2017 05:49:18 +0000 (0:00:00.374) 0:01:22.795 *******
TASK [etcd : Refresh config | Create etcd config file] **********************************************************************************************
Friday 29 December 2017 05:49:18 +0000 (0:00:00.032) 0:01:22.827 *******
ok: [node1] => {"changed": false, "checksum": "3332c5fe8758ea0621847232509f7487a781661e", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 875, "state": "file", "uid": 0}
TASK [etcd : Restart etcd if certs changed] *********************************************************************************************************
Friday 29 December 2017 05:49:19 +0000 (0:00:00.416) 0:01:23.244 *******
TASK [etcd : Ensure etcd is running] ****************************************************************************************************************
Friday 29 December 2017 05:49:19 +0000 (0:00:00.023) 0:01:23.268 *******
ok: [node1] => {"changed": false, "enabled": true, "name": "etcd", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ActiveEnterTimestampMonotonic": "12021983068", "ActiveExitTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ActiveExitTimestampMonotonic": "12021816849", "ActiveState": "active", "After": "basic.target systemd-journald.socket sysinit.target docker.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:18:59 UTC", "AssertTimestampMonotonic": "12021937928", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "66131984", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ConditionTimestampMonotonic": "12021937928", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/etcd.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "etcd docker wrapper", "DevicePolicy": "auto", "EnvironmentFile": "/etc/etcd.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "24198", "ExecMainStartTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ExecMainStartTimestampMonotonic": "12021983008", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/etcd ; argv[]=/usr/local/bin/etcd ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:18:59 UTC] ; stop_time=[n/a] ; pid=24198 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker rm -f etcd1 ; ignore_errors=yes ; start_time=[Thu 2017-12-28 11:18:59 UTC] ; stop_time=[Thu 2017-12-28 11:18:59 UTC] ; pid=24188 ; code=exited ; status=0 }", "ExecStop": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker stop etcd1 ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:18:59 UTC] ; stop_time=[Thu 2017-12-28 11:18:59 UTC] ; pid=24163 ; code=exited ; status=0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/etcd.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "etcd.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:18:59 UTC", "InactiveEnterTimestampMonotonic": "12021937198", "InactiveExitTimestamp": "Thu 2017-12-28 11:18:59 UTC", "InactiveExitTimestampMonotonic": "12021956288", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "0", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "4096", "LimitNOFILESoft": "1024", "LimitNPROC": "15750", "LimitNPROCSoft": "15750", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "24198", "MemoryAccounting": "no", "MemoryCurrent": "7450624", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "etcd.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "yes", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice sysinit.target", "Restart": "always", "RestartUSec": "15s", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:18:59 UTC", "StateChangeTimestampMonotonic": "12021983068", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "9", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "User": "root", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:18:59 UTC", "WatchdogTimestampMonotonic": "12021983067", "WatchdogUSec": "0"}}
TASK [etcd : Configure | Check if cluster is healthy] ***********************************************************************************************
Friday 29 December 2017 05:49:19 +0000 (0:00:00.184) 0:01:23.453 *******
ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.12.5.37:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.033689", "end": "2017-12-29 05:49:18.357445", "rc": 0, "start": "2017-12-29 05:49:18.323756", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [etcd : Refresh config | Create etcd config file] **********************************************************************************************
Friday 29 December 2017 05:49:19 +0000 (0:00:00.250) 0:01:23.703 *******
ok: [node1] => {"changed": false, "checksum": "3332c5fe8758ea0621847232509f7487a781661e", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 875, "state": "file", "uid": 0}
PLAY [k8s-cluster:calico-rr] ************************************************************************************************************************
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:49:20 +0000 (0:00:00.444) 0:01:24.148 *******
TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017 05:49:20 +0000 (0:00:00.042) 0:01:24.191 *******
TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017 05:49:20 +0000 (0:00:00.043) 0:01:24.235 *******
TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017 05:49:20 +0000 (0:00:00.020) 0:01:24.255 *******
TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017 05:49:20 +0000 (0:00:00.528) 0:01:24.784 *******
TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017 05:49:21 +0000 (0:00:00.500) 0:01:25.285 *******
ok: [node2] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node3] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017 05:49:21 +0000 (0:00:00.105) 0:01:25.390 *******
ok: [node3] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}
ok: [node2] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}
ok: [node1] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}
TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017 05:49:21 +0000 (0:00:00.235) 0:01:25.626 *******
ok: [node3] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}
ok: [node2] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}
ok: [node1] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}
TASK [etcd : Check_certs | check if all certs have already been generated on first master] **********************************************************
Friday 29 December 2017 05:49:21 +0000 (0:00:00.269) 0:01:25.895 *******
ok: [node2 -> None] => {"changed": false, "examined": 12, "files": [{"atime": 1514459947.704, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459950.54, "checksum": "3bb643c8ddf9ee0b6baaf93805fc63962e5cf57e", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522183, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.196, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "ade3addf27f16aa19093dc3aac030a108d76ef6c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522180, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.152, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "fb8aa806ecc6efa79cce6da17faf99b38d8eb876", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522177, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.88, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "b723851efff5c870f12425122562b9ba747e96fc", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522175, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.868, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514460475.756, "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "0b9f2c142df29f8d45fba6086eca19790b90760c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522178, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.144, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}], "matched": 7, "msg": ""}
TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] **************************************
Friday 29 December 2017 05:49:22 +0000 (0:00:00.179) 0:01:26.075 *******
ok: [node1] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}
ok: [node3] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}
TASK [etcd : Check certs | check if a cert already exists on node] **********************************************************************************
Friday 29 December 2017 05:49:22 +0000 (0:00:00.113) 0:01:26.189 *******
ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459947.704, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "727116751", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node2] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459948.58, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459948.048, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522070, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "18446744072158681630", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node3] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459948.244, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459947.668, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522154, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "18446744072310589013", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node2] => (item=node-node2-key.pem) => {"changed": false, "item": "node-node2-key.pem", "stat": {"atime": 1514460483.48, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "b723851efff5c870f12425122562b9ba747e96fc", "ctime": 1514459948.048, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522072, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "46d57482cfbfcc2be8c8499f59d90923", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "version": "18446744072158681632", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"atime": 1514460475.756, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "b39f11dab64683147f180e645aa7f322", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "version": "727116765", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node3] => (item=node-node3-key.pem) => {"changed": false, "item": "node-node3-key.pem", "stat": {"atime": 1514460483.092, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "0b9f2c142df29f8d45fba6086eca19790b90760c", "ctime": 1514459947.668, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522156, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "52031e8c0a74b1397285a81d590de184", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459930.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 999, "version": "18446744072310589015", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
TASK [etcd : Check_certs | Set 'gen_certs' to true] *************************************************************************************************
Friday 29 December 2017 05:49:22 +0000 (0:00:00.417) 0:01:26.606 *******
TASK [etcd : Check_certs | Set 'gen_node_certs' to true] ********************************************************************************************
Friday 29 December 2017 05:49:22 +0000 (0:00:00.065) 0:01:26.672 *******
ok: [node2] => {"ansible_facts": {"gen_node_certs": {"node1": false, "node2": false, "node3": false}}, "changed": false}
TASK [etcd : Check_certs | Set 'sync_certs' to true] ************************************************************************************************
Friday 29 December 2017 05:49:22 +0000 (0:00:00.070) 0:01:26.743 *******
TASK [etcd : include] *******************************************************************************************************************************
Friday 29 December 2017 05:49:22 +0000 (0:00:00.069) 0:01:26.812 *******
included: /home/ubuntu/kubespray/roles/etcd/tasks/gen_certs_script.yml for node2, node3, node1
TASK [etcd : Gen_certs | create etcd cert dir] ******************************************************************************************************
Friday 29 December 2017 05:49:22 +0000 (0:00:00.110) 0:01:26.923 *******
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | create etcd script dir (on node1)] *****************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.239) 0:01:27.162 *******
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 4096, "state": "directory", "uid": 0}
TASK [etcd : Gen_certs | create etcd cert dir (on node1)] *******************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.183) 0:01:27.346 *******
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | write openssl config] ******************************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.182) 0:01:27.528 *******
TASK [etcd : Gen_certs | copy certs generation script] **********************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.028) 0:01:27.557 *******
TASK [etcd : Gen_certs | run cert generation script] ************************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.026) 0:01:27.583 *******
TASK [etcd : set_fact] ******************************************************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.021) 0:01:27.604 *******
ok: [node1] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "my_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem"]}, "changed": false}
ok: [node2] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node2.pem", "admin-node2-key.pem", "member-node2.pem", "member-node2-key.pem"], "my_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node3.pem", "admin-node3-key.pem", "member-node3.pem", "member-node3-key.pem"], "my_node_certs": ["ca.pem", "node-node3.pem", "node-node3-key.pem"]}, "changed": false}
TASK [etcd : Gen_certs | Gather etcd master certs] **************************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.135) 0:01:27.740 *******
TASK [etcd : Gen_certs | Gather etcd node certs] ****************************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.059) 0:01:27.800 *******
TASK [etcd : Gen_certs | Prepare tempfile for unpacking certs] **************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.054) 0:01:27.854 *******
TASK [etcd : Gen_certs | Write master certs to tempfile] ********************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.045) 0:01:27.899 *******
TASK [etcd : Gen_certs | Unpack certs on masters] ***************************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.043) 0:01:27.942 *******
TASK [etcd : Gen_certs | Cleanup tempfile] **********************************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.046) 0:01:27.988 *******
TASK [etcd : Gen_certs | Copy certs on nodes] *******************************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.040) 0:01:28.029 *******
TASK [etcd : Gen_certs | check certificate permissions] *********************************************************************************************
Friday 29 December 2017 05:49:23 +0000 (0:00:00.041) 0:01:28.070 *******
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | target ca-certificate store file] ******************************************************************************************
Friday 29 December 2017 05:49:24 +0000 (0:00:00.210) 0:01:28.281 *******
ok: [node1] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}
ok: [node2] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}
ok: [node3] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}
TASK [etcd : Gen_certs | add CA to trusted CA dir] **************************************************************************************************
Friday 29 December 2017 05:49:24 +0000 (0:00:00.114) 0:01:28.395 *******
ok: [node1] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}
ok: [node2] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}
ok: [node3] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}
TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/Container Linux by CoreOS)] **********************************************************
Friday 29 December 2017 05:49:24 +0000 (0:00:00.220) 0:01:28.616 *******
TASK [etcd : Gen_certs | update ca-certificates (RedHat)] *******************************************************************************************
Friday 29 December 2017 05:49:24 +0000 (0:00:00.046) 0:01:28.663 *******
TASK [etcd : Gen_certs | Get etcd certificate serials] **********************************************************************************************
Friday 29 December 2017 05:49:24 +0000 (0:00:00.042) 0:01:28.705 *******
ok: [node2] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node2.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.004272", "end": "2017-12-29 05:49:23.519991", "rc": 0, "start": "2017-12-29 05:49:23.515719", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823961", "stdout_lines": ["B13862C721823961"]}
ok: [node3] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node3.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.004302", "end": "2017-12-29 05:49:23.379262", "rc": 0, "start": "2017-12-29 05:49:23.374960", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823962", "stdout_lines": ["B13862C721823962"]}
ok: [node1] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.004650", "end": "2017-12-29 05:49:23.584640", "rc": 0, "start": "2017-12-29 05:49:23.579990", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823963", "stdout_lines": ["B13862C721823963"]}
TASK [etcd : Set etcd_client_cert_serial] ***********************************************************************************************************
Friday 29 December 2017 05:49:24 +0000 (0:00:00.222) 0:01:28.928 *******
ok: [node1] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823963"}, "changed": false}
ok: [node2] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823961"}, "changed": false}
ok: [node3] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823962"}, "changed": false}
TASK [etcd : include] *******************************************************************************************************************************
Friday 29 December 2017 05:49:24 +0000 (0:00:00.112) 0:01:29.041 *******
included: /home/ubuntu/kubespray/roles/etcd/tasks/install_docker.yml for node1
TASK [etcd : Install | Copy etcdctl binary from docker container] ***********************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.094) 0:01:29.136 *******
ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["sh", "-c", "/usr/bin/docker rm -f etcdctl-binarycopy; /usr/bin/docker create --name etcdctl-binarycopy quay.io/coreos/etcd:v3.2.4 && /usr/bin/docker cp etcdctl-binarycopy:/usr/local/bin/etcdctl /usr/local/bin/etcdctl && /usr/bin/docker rm -f etcdctl-binarycopy"], "delta": "0:00:00.140128", "end": "2017-12-29 05:49:24.180702", "rc": 0, "start": "2017-12-29 05:49:24.040574", "stderr": "Error response from daemon: No such container: etcdctl-binarycopy", "stderr_lines": ["Error response from daemon: No such container: etcdctl-binarycopy"], "stdout": "e31da9fe17f72362840ed96a0f21f63fcb5fdf4444dbf72e31d10435be84587f\netcdctl-binarycopy", "stdout_lines": ["e31da9fe17f72362840ed96a0f21f63fcb5fdf4444dbf72e31d10435be84587f", "etcdctl-binarycopy"]}
TASK [etcd : Configure | Check if cluster is healthy] ***********************************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.398) 0:01:29.534 *******
TASK [etcd : Configure | Check if member is in cluster] *********************************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.159) 0:01:29.693 *******
TASK [etcd : Install etcd launch script] ************************************************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.045) 0:01:29.739 *******
TASK [etcd : Configure | Copy etcd.service systemd file] ********************************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.046) 0:01:29.785 *******
TASK [etcd : Configure | Join member(s) to cluster one at a time] ***********************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.052) 0:01:29.837 *******
TASK [etcd : Refresh config | Create etcd config file] **********************************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.063) 0:01:29.900 *******
TASK [etcd : Restart etcd if certs changed] *********************************************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.048) 0:01:29.949 *******
TASK [etcd : Ensure etcd is running] ****************************************************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.045) 0:01:29.995 *******
TASK [etcd : Configure | Check if cluster is healthy] ***********************************************************************************************
Friday 29 December 2017 05:49:25 +0000 (0:00:00.044) 0:01:30.040 *******
TASK [etcd : Refresh config | Create etcd config file] **********************************************************************************************
Friday 29 December 2017 05:49:26 +0000 (0:00:00.046) 0:01:30.087 *******
PLAY [etcd:k8s-cluster:vault:calico-rr] *************************************************************************************************************
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:49:26 +0000 (0:00:00.179) 0:01:30.266 *******
TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017 05:49:26 +0000 (0:00:00.049) 0:01:30.316 *******
TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017 05:49:26 +0000 (0:00:00.045) 0:01:30.361 *******
TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017 05:49:26 +0000 (0:00:00.022) 0:01:30.384 *******
TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017 05:49:26 +0000 (0:00:00.600) 0:01:30.985 *******
TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017 05:49:27 +0000 (0:00:00.506) 0:01:31.491 *******
ok: [node3] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node2] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017 05:49:27 +0000 (0:00:00.323) 0:01:31.814 *******
TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017 05:49:27 +0000 (0:00:00.043) 0:01:31.857 *******
TASK [vault : stop vault-temp container] ************************************************************************************************************
Friday 29 December 2017 05:49:27 +0000 (0:00:00.046) 0:01:31.903 *******
TASK [vault : check_vault | Attempt to pull local https Vault health] *******************************************************************************
Friday 29 December 2017 05:49:27 +0000 (0:00:00.041) 0:01:31.945 *******
TASK [vault : check_vault | Set facts about local Vault health] *************************************************************************************
Friday 29 December 2017 05:49:27 +0000 (0:00:00.047) 0:01:31.993 *******
TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] ****************************************************************
Friday 29 December 2017 05:49:27 +0000 (0:00:00.042) 0:01:32.036 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:27 +0000 (0:00:00.024) 0:01:32.060 *******
TASK [vault : bootstrap/sync_secrets | Set fact based on sync_file_results] *************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.065) 0:01:32.126 *******
TASK [vault : bootstrap/sync_secrets | Reset sync_file_results to avoid variable bleed] *************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.037) 0:01:32.163 *******
TASK [vault : bootstrap/sync_secrets | Print out warning message if secrets are not available and vault is initialized] *****************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.045) 0:01:32.209 *******
TASK [vault : bootstrap/sync_secrets | Cat root_token from a vault host] ****************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.021) 0:01:32.231 *******
TASK [vault : bootstrap/sync_secrets | Cat unseal_keys from a vault host] ***************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.043) 0:01:32.275 *******
TASK [vault : bootstrap/sync_secrets | Set needed facts for Vault API interaction when Vault is already running] ************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.047) 0:01:32.322 *******
TASK [vault : bootstrap/sync_secrets | Update vault_headers if we have the root_token] **************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.044) 0:01:32.366 *******
TASK [vault : find_leader | Find the current http Vault leader] *************************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.045) 0:01:32.412 *******
TASK [vault : find_leader | Set fact for current http leader] ***************************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.048) 0:01:32.461 *******
TASK [vault : find_leader| show vault_leader_url] ***************************************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.049) 0:01:32.510 *******
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.044) 0:01:32.555 *******
TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.052) 0:01:32.607 *******
TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.045) 0:01:32.653 *******
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.049) 0:01:32.702 *******
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.047) 0:01:32.749 *******
TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.048) 0:01:32.797 *******
TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.050) 0:01:32.847 *******
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.049) 0:01:32.897 *******
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.043) 0:01:32.940 *******
TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.049) 0:01:32.990 *******
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017 05:49:28 +0000 (0:00:00.046) 0:01:33.036 *******
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.085 *******
TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.135 *******
TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.046) 0:01:33.182 *******
TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.051) 0:01:33.233 *******
TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.053) 0:01:33.286 *******
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.047) 0:01:33.334 *******
TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.053) 0:01:33.387 *******
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.047) 0:01:33.434 *******
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.050) 0:01:33.485 *******
TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.051) 0:01:33.536 *******
TASK [vault : bootstrap/sync_vault_certs | Set facts for vault sync_file results] *******************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.586 *******
TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after ca.pem sync] ***************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.041) 0:01:33.628 *******
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.677 *******
TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.047) 0:01:33.724 *******
TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.774 *******
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.047) 0:01:33.821 *******
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.050) 0:01:33.871 *******
TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.046) 0:01:33.918 *******
TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.048) 0:01:33.967 *******
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.052) 0:01:34.019 *******
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017 05:49:29 +0000 (0:00:00.045) 0:01:34.065 *******
TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.045) 0:01:34.110 *******
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.048) 0:01:34.159 *******
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.045) 0:01:34.204 *******
TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.044) 0:01:34.249 *******
TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.051) 0:01:34.301 *******
TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.048) 0:01:34.349 *******
TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.052) 0:01:34.401 *******
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.046) 0:01:34.447 *******
TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.052) 0:01:34.500 *******
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.047) 0:01:34.548 *******
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.050) 0:01:34.598 *******
TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.046) 0:01:34.644 *******
TASK [vault : bootstrap/sync_vault_certs | Set fact if Vault's API cert is needed] ******************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.053) 0:01:34.698 *******
TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after api.pem sync] **************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.042) 0:01:34.740 *******
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.043) 0:01:34.784 *******
TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.045) 0:01:34.830 *******
TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.048) 0:01:34.879 *******
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.045) 0:01:34.925 *******
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.047) 0:01:34.972 *******
TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017 05:49:30 +0000 (0:00:00.046) 0:01:35.018 *******
TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.066) 0:01:35.085 *******
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.065) 0:01:35.150 *******
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:35.196 *******
TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.047) 0:01:35.243 *******
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:35.289 *******
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.043) 0:01:35.332 *******
TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:35.378 *******
TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.048) 0:01:35.426 *******
TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.050) 0:01:35.476 *******
TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.048) 0:01:35.525 *******
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.053) 0:01:35.578 *******
TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.046) 0:01:35.625 *******
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.054) 0:01:35.679 *******
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.049) 0:01:35.728 *******
TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.052) 0:01:35.781 *******
TASK [vault : bootstrap/sync_etcd_certs | Set facts for etcd sync_file results] *********************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.044) 0:01:35.825 *******
TASK [vault : bootstrap/sync_etcd_certs | Unset sync_file_results after ca.pem sync] ****************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.043) 0:01:35.868 *******
TASK [vault : bootstrap/start_vault_temp | Ensure vault-temp isn't already running] *****************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:35.914 *******
TASK [vault : bootstrap/start_vault_temp | Start single node Vault with file backend] ***************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.042) 0:01:35.956 *******
TASK [vault : bootstrap/start_vault_temp | Start again single node Vault with file backend] *********************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:36.002 *******
TASK [vault : bootstrap/start_vault_temp | Initialize vault-temp] ***********************************************************************************
Friday 29 December 2017 05:49:31 +0000 (0:00:00.041) 0:01:36.044 *******
TASK [vault : bootstrap/start_vault_temp | Set needed vault facts] **********************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.044) 0:01:36.089 *******
TASK [vault : bootstrap/start_vault_temp | Unseal vault-temp] ***************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.043) 0:01:36.132 *******
TASK [vault : vault | Set fact about vault leader url] **********************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.041) 0:01:36.174 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.043) 0:01:36.217 *******
TASK [vault : shared/auth_backend | Test if the auth backend exists] ********************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.058) 0:01:36.276 *******
TASK [vault : shared/auth_backend | Add the cert auth backend if needed] ****************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.042) 0:01:36.318 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.046) 0:01:36.365 *******
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/vault/ssl exists] *****************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.099) 0:01:36.465 *******
TASK [vault : bootstrap/gen_ca | Generate vault root CA] ********************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.067) 0:01:36.533 *******
TASK [vault : bootstrap/gen_ca | Copy vault root CA cert locally] ***********************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.030) 0:01:36.563 *******
TASK [vault : bootstrap/gen_ca | Copy vault root CA key locally] ************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.054) 0:01:36.617 *******
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/ssl/etcd/ssl exists] **************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.056) 0:01:36.674 *******
TASK [vault : bootstrap/gen_ca | Generate etcd root CA] *********************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.060) 0:01:36.734 *******
TASK [vault : bootstrap/gen_ca | Copy etcd root CA cert locally] ************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.031) 0:01:36.765 *******
TASK [vault : bootstrap/gen_ca | Copy etcd root CA key locally] *************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.059) 0:01:36.825 *******
TASK [vault : issue_cert | Ensure target directory exists] ******************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.044) 0:01:36.870 *******
TASK [vault : issue_cert | Read in the local credentials] *******************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.050) 0:01:36.920 *******
TASK [vault : gen_certs_vault | Set facts for read Vault Creds] *************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.026) 0:01:36.947 *******
TASK [vault : gen_certs_vault | Log into Vault and obtain an token] *********************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.029) 0:01:36.976 *******
TASK [vault : gen_certs_vault | Set fact for vault_client_token] ************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.021) 0:01:36.997 *******
TASK [vault : gen_certs_vault | Set fact for Vault API token] ***************************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.023) 0:01:37.021 *******
TASK [vault : issue_cert | Generate /etc/vault/ssl/api.pem for vault role] **************************************************************************
Friday 29 December 2017 05:49:32 +0000 (0:00:00.041) 0:01:37.062 *******
TASK [vault : issue_cert | Copy /etc/vault/ssl/api.pem cert to all hosts] ***************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.025) 0:01:37.088 *******
TASK [vault : issue_cert | Copy key for /etc/vault/ssl/api.pem to all hosts] ************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.055) 0:01:37.143 *******
TASK [vault : issue_cert | Copy issuing CA cert] ****************************************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.044) 0:01:37.188 *******
TASK [vault : issue_cert | Copy certificate serial to all hosts] ************************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.048) 0:01:37.237 *******
TASK [vault : bootstrap/ca_trust | pull CA from cert from {{groups.vault|first}}] *******************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.054) 0:01:37.292 *******
TASK [vault : bootstrap/ca_trust | target ca-certificate store file] ********************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.047) 0:01:37.339 *******
TASK [vault : bootstrap/ca_trust | add CA to trusted CA dir] ****************************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.045) 0:01:37.384 *******
TASK [vault : bootstrap/ca_trust | update ca-certificates (Debian/Ubuntu/CoreOS)] *******************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.044) 0:01:37.429 *******
TASK [vault : bootstrap/ca_trust | update ca-certificates (RedHat)] *********************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.042) 0:01:37.472 *******
TASK [vault : stop vault-temp container] ************************************************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.043) 0:01:37.515 *******
TASK [vault : check_vault | Attempt to pull local https Vault health] *******************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.042) 0:01:37.558 *******
TASK [vault : check_vault | Set facts about local Vault health] *************************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.046) 0:01:37.605 *******
TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] ****************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.044) 0:01:37.650 *******
TASK [vault : check_etcd | Check if etcd is up and reachable] ***************************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.029) 0:01:37.679 *******
TASK [vault : check_etcd | Set fact based off the etcd_health_check response] ***********************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.024) 0:01:37.703 *******
TASK [vault : set_fact] *****************************************************************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.042) 0:01:37.746 *******
TASK [vault : check_etcd | Fail if etcd is not available and needed] ********************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.043) 0:01:37.789 *******
TASK [vault : cluster/configure | Ensure the vault/config directory exists] *************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.043) 0:01:37.833 *******
TASK [vault : cluster/configure | Lay down the configuration file] **********************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.044) 0:01:37.877 *******
TASK [vault : cluster/binary | Copy vault binary from downloaddir] **********************************************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.043) 0:01:37.921 *******
TASK [vault : cluster/systemd | Ensure mount points exist prior to vault.service startup] ***********************************************************
Friday 29 December 2017 05:49:33 +0000 (0:00:00.045) 0:01:37.966 *******
TASK [vault : cluster/systemd | Ensure the vault user has access to needed directories] *************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.113) 0:01:38.080 *******
TASK [vault : cluster/systemd | Copy down vault.service systemd file] *******************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.084) 0:01:38.164 *******
TASK [vault : Create vault service systemd directory] ***********************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.044) 0:01:38.208 *******
TASK [vault : cluster/systemd | Add vault proxy env vars] *******************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.045) 0:01:38.254 *******
TASK [vault : cluster/systemd | Enable vault.service] ***********************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.041) 0:01:38.296 *******
TASK [vault : cluster/systemd | Query local vault until service is up] ******************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.045) 0:01:38.341 *******
TASK [vault : cluster/init | Initialize Vault] ******************************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.041) 0:01:38.383 *******
TASK [vault : cluster/init | Set facts on the results of the initialization] ************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.044) 0:01:38.428 *******
TASK [vault : cluster/init | Ensure all hosts have these facts] *************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.472 *******
TASK [vault : cluster/init | Ensure the vault_secrets_dir exists] ***********************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.050) 0:01:38.522 *******
TASK [vault : cluster/init | Ensure all in groups.vault have the unseal_keys locally] ***************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.566 *******
TASK [vault : cluster/init | Ensure all in groups.vault have the root_token locally] ****************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.044) 0:01:38.610 *******
TASK [vault : cluster/init | Ensure vault_headers and vault statuses are updated] *******************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.045) 0:01:38.655 *******
TASK [vault : cluster/unseal | Current sealed state] ************************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.699 *******
TASK [vault : cluster/unseal | Unseal Vault] ********************************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.047) 0:01:38.746 *******
TASK [vault : cluster/unseal | Wait until server is ready] ******************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.037) 0:01:38.783 *******
TASK [vault : find_leader | Find the current http Vault leader] *************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.827 *******
TASK [vault : find_leader | Set fact for current http leader] ***************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.041) 0:01:38.868 *******
TASK [vault : find_leader| show vault_leader_url] ***************************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.051) 0:01:38.920 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.964 *******
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/kubernetes/ssl exists] ************************************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.125) 0:01:39.089 *******
TASK [vault : bootstrap/gen_ca | Generate kube root CA] *********************************************************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.057) 0:01:39.147 *******
TASK [vault : bootstrap/gen_ca | Copy kube root CA cert locally] ************************************************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.034) 0:01:39.182 *******
TASK [vault : bootstrap/gen_ca | Copy kube root CA key locally] *************************************************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.054) 0:01:39.236 *******
TASK [vault : shared/auth_backend | Test if the auth backend exists] ********************************************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.044) 0:01:39.281 *******
TASK [vault : shared/auth_backend | Add the cert auth backend if needed] ****************************************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.043) 0:01:39.324 *******
TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.043) 0:01:39.367 *******
PLAY [k8s-cluster] **********************************************************************************************************************************
TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.155) 0:01:39.523 *******
TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.044) 0:01:39.568 *******
TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.047) 0:01:39.615 *******
TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017 05:49:35 +0000 (0:00:00.021) 0:01:39.637 *******
TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017 05:49:36 +0000 (0:00:00.562) 0:01:40.200 *******
TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017 05:49:36 +0000 (0:00:00.664) 0:01:40.864 *******
ok: [node2] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node3] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [kubernetes/secrets : Check_certs | check if the certs have already been generated on first master] ********************************************
Friday 29 December 2017 05:49:37 +0000 (0:00:00.408) 0:01:41.272 *******
ok: [node2 -> None] => {"changed": false, "examined": 4, "files": [{"atime": 1514459963.14, "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514456735.892, "dev": 64769, "gid": 0, "inode": 522100, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1514456735.72, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1514459963.14, "checksum": "cace111fd87fb2c14f7a07fea3e515746edad2ee", "ctime": 1514456736.392, "dev": 64769, "gid": 0, "inode": 522101, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1514456736.208, "nlink": 1, "path": "/etc/kubernetes/ssl/ca-key.pem", "rgrp": true, "roth": true, "rusr": true, "size": 1675, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 2, "msg": ""}
TASK [kubernetes/secrets : Check_certs | Set default value for 'sync_certs', 'gen_certs', and 'secret_changed' to false] ***************************
Friday 29 December 2017 05:49:37 +0000 (0:00:00.324) 0:01:41.597 *******
ok: [node1] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false}
ok: [node3] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false}
TASK [kubernetes/secrets : Check certs | check if a cert already exists on node] ********************************************************************
Friday 29 December 2017 05:49:37 +0000 (0:00:00.359) 0:01:41.957 *******
ok: [node2] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514526363.216, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514525695.876, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 522013, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ba863db0a301f222eabf930ccf7c717", "mimetype": "text/plain", "mode": "0644", "mtime": 1514525695.872, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "version": "18446744072158684721", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node3] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514474667.028, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514474126.648, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 522128, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ba863db0a301f222eabf930ccf7c717", "mimetype": "text/plain", "mode": "0644", "mtime": 1514474126.648, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "version": "18446744072310591063", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459963.14, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514456735.892, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 522100, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ba863db0a301f222eabf930ccf7c717", "mimetype": "text/plain", "mode": "0644", "mtime": 1514456735.72, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "version": "727079457", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node2] => (item=apiserver.pem) => {"changed": false, "item": "apiserver.pem", "stat": {"exists": false}}
ok: [node1] => (item=apiserver.pem) => {"changed": false, "item": "apiserver.pem", "stat": {"exists": false}}
ok: [node3] => (item=apiserver.pem) => {"changed": false, "item": "apiserver.pem", "stat": {"exists": false}}
ok: [node2] => (item=apiserver-key.pem) => {"changed": false, "item": "apiserver-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=apiserver-key.pem) => {"changed": false, "item": "apiserver-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=apiserver-key.pem) => {"changed": false, "item": "apiserver-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-scheduler.pem) => {"changed": false, "item": "kube-scheduler.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-scheduler.pem) => {"changed": false, "item": "kube-scheduler.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-scheduler.pem) => {"changed": false, "item": "kube-scheduler.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-scheduler-key.pem) => {"changed": false, "item": "kube-scheduler-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-scheduler-key.pem) => {"changed": false, "item": "kube-scheduler-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-scheduler-key.pem) => {"changed": false, "item": "kube-scheduler-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-controller-manager.pem) => {"changed": false, "item": "kube-controller-manager.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-controller-manager.pem) => {"changed": false, "item": "kube-controller-manager.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-controller-manager.pem) => {"changed": false, "item": "kube-controller-manager.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-controller-manager-key.pem) => {"changed": false, "item": "kube-controller-manager-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-controller-manager-key.pem) => {"changed": false, "item": "kube-controller-manager-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-controller-manager-key.pem) => {"changed": false, "item": "kube-controller-manager-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=admin-node2.pem) => {"changed": false, "item": "admin-node2.pem", "stat": {"exists": false}}
ok: [node3] => (item=admin-node3.pem) => {"changed": false, "item": "admin-node3.pem", "stat": {"exists": false}}
ok: [node1] => (item=admin-node1.pem) => {"changed": false, "item": "admin-node1.pem", "stat": {"exists": false}}
ok: [node2] => (item=admin-node2-key.pem) => {"changed": false, "item": "admin-node2-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=admin-node3-key.pem) => {"changed": false, "item": "admin-node3-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=admin-node1-key.pem) => {"changed": false, "item": "admin-node1-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=node-node2.pem) => {"changed": false, "item": "node-node2.pem", "stat": {"exists": false}}
ok: [node3] => (item=node-node3.pem) => {"changed": false, "item": "node-node3.pem", "stat": {"exists": false}}
ok: [node1] => (item=node-node1.pem) => {"changed": false, "item": "node-node1.pem", "stat": {"exists": false}}
ok: [node2] => (item=node-node2-key.pem) => {"changed": false, "item": "node-node2-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=node-node3-key.pem) => {"changed": false, "item": "node-node3-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-proxy-node2.pem) => {"changed": false, "item": "kube-proxy-node2.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-proxy-node3.pem) => {"changed": false, "item": "kube-proxy-node3.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-proxy-node2-key.pem) => {"changed": false, "item": "kube-proxy-node2-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-proxy-node1.pem) => {"changed": false, "item": "kube-proxy-node1.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-proxy-node3-key.pem) => {"changed": false, "item": "kube-proxy-node3-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-proxy-node1-key.pem) => {"changed": false, "item": "kube-proxy-node1-key.pem", "stat": {"exists": false}}
TASK [kubernetes/secrets : Check_certs | Set 'gen_certs' to true] ***********************************************************************************
Friday 29 December 2017 05:49:41 +0000 (0:00:03.511) 0:01:45.469 *******
ok: [node2] => (item=['/etc/kubernetes/ssl/ca.pem', '/etc/kubernetes/ssl/apiserver.pem', '/etc/kubernetes/ssl/apiserver-key.pem', '/etc/kubernetes/ssl/kube-scheduler.pem', '/etc/kubernetes/ssl/kube-scheduler-key.pem', '/etc/kubernetes/ssl/kube-controller-manager.pem', '/etc/kubernetes/ssl/kube-controller-manager-key.pem', '/etc/kubernetes/ssl/admin-node1.pem' '/etc/kubernetes/ssl/admin-node1-key.pem' ] '/etc/kubernetes/ssl/node-node2.pem' '/etc/kubernetes/ssl/node-node2-key.pem' '/etc/kubernetes/ssl/kube-proxy-node2.pem' '/etc/kubernetes/ssl/kube-proxy-node2-key.pem' , '/etc/kubernetes/ssl/node-node3.pem' '/etc/kubernetes/ssl/node-node3-key.pem' '/etc/kubernetes/ssl/kube-proxy-node3.pem' '/etc/kubernetes/ssl/kube-proxy-node3-key.pem' , '/etc/kubernetes/ssl/node-node1.pem' '/etc/kubernetes/ssl/node-node1-key.pem' '/etc/kubernetes/ssl/kube-proxy-node1.pem' '/etc/kubernetes/ssl/kube-proxy-node1-key.pem' ]) => {"ansible_facts": {"gen_certs": true}, "ansible_facts_cacheable": false, "changed": false, "item": "['/etc/kubernetes/ssl/ca.pem', '/etc/kubernetes/ssl/apiserver.pem', '/etc/kubernetes/ssl/apiserver-key.pem', '/etc/kubernetes/ssl/kube-scheduler.pem', '/etc/kubernetes/ssl/kube-scheduler-key.pem', '/etc/kubernetes/ssl/kube-controller-manager.pem', '/etc/kubernetes/ssl/kube-controller-manager-key.pem', '/etc/kubernetes/ssl/admin-node1.pem' '/etc/kubernetes/ssl/admin-node1-key.pem' ] '/etc/kubernetes/ssl/node-node2.pem' '/etc/kubernetes/ssl/node-node2-key.pem' '/etc/kubernetes/ssl/kube-proxy-node2.pem' '/etc/kubernetes/ssl/kube-proxy-node2-key.pem' , '/etc/kubernetes/ssl/node-node3.pem' '/etc/kubernetes/ssl/node-node3-key.pem' '/etc/kubernetes/ssl/kube-proxy-node3.pem' '/etc/kubernetes/ssl/kube-proxy-node3-key.pem' , '/etc/kubernetes/ssl/node-node1.pem' '/etc/kubernetes/ssl/node-node1-key.pem' '/etc/kubernetes/ssl/kube-proxy-node1.pem' '/etc/kubernetes/ssl/kube-proxy-node1-key.pem' ]"}
TASK [kubernetes/secrets : Check_certs | Set 'gen_master_certs' to true] ****************************************************************************
Friday 29 December 2017 05:49:41 +0000 (0:00:00.229) 0:01:45.698 *******
ok: [node2] => {"ansible_facts": {"gen_master_certs": " False"}, "changed": false}
TASK [kubernetes/secrets : Check_certs | Set 'gen_node_certs' to true] ******************************************************************************
Friday 29 December 2017 05:49:41 +0000 (0:00:00.223) 0:01:45.922 *******
ok: [node2] => {"ansible_facts": {"gen_node_certs": {"node1": true, "node2": true, "node3": true}}, "changed": false}
TASK [kubernetes/secrets : Check_certs | Set 'sync_certs' to true] **********************************************************************************
Friday 29 December 2017 05:49:42 +0000 (0:00:00.305) 0:01:46.227 *******
ok: [node2] => {"ansible_facts": {"sync_certs": true}, "changed": false}
ok: [node1] => {"ansible_facts": {"sync_certs": true}, "changed": false}
ok: [node3] => {"ansible_facts": {"sync_certs": true}, "changed": false}
TASK [kubernetes/secrets : Check_tokens | check if the tokens have already been generated on first master] ******************************************
Friday 29 December 2017 05:49:42 +0000 (0:00:00.392) 0:01:46.620 *******
ok: [node2 -> None] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/secrets : Check_tokens | Set default value for 'sync_tokens' and 'gen_tokens' to false] ********************************************
Friday 29 December 2017 05:49:42 +0000 (0:00:00.324) 0:01:46.945 *******
ok: [node3] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false}
ok: [node1] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false}
TASK [kubernetes/secrets : Check_tokens | Set 'sync_tokens' and 'gen_tokens' to true] ***************************************************************
Friday 29 December 2017 05:49:43 +0000 (0:00:00.359) 0:01:47.305 *******
ok: [node2] => {"ansible_facts": {"gen_tokens": true}, "changed": false}
TASK [kubernetes/secrets : Check tokens | check if a cert already exists] ***************************************************************************
Friday 29 December 2017 05:49:43 +0000 (0:00:00.209) 0:01:47.514 *******
ok: [node2] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}
ok: [node3] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/secrets : Check_tokens | Set 'sync_tokens' to true] ********************************************************************************
Friday 29 December 2017 05:49:43 +0000 (0:00:00.455) 0:01:47.970 *******
ok: [node2] => {"ansible_facts": {"sync_tokens": true}, "changed": false}
TASK [kubernetes/secrets : Make sure the certificate directory exits] *******************************************************************************
Friday 29 December 2017 05:49:44 +0000 (0:00:00.312) 0:01:48.282 *******
ok: [node2] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
TASK [kubernetes/secrets : Make sure the tokens directory exits] ************************************************************************************
Friday 29 December 2017 05:49:44 +0000 (0:00:00.450) 0:01:48.733 *******
ok: [node1] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0}
ok: [node2] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0}
ok: [node3] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0}
TASK [kubernetes/secrets : Gen_certs | Create kubernetes config directory (on node1)] ***************************************************************
Friday 29 December 2017 05:49:45 +0000 (0:00:00.448) 0:01:49.182 *******
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}
TASK [kubernetes/secrets : Gen_certs | Create kubernetes script directory (on node1)] ***************************************************************
Friday 29 December 2017 05:49:45 +0000 (0:00:00.323) 0:01:49.506 *******
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}
TASK [kubernetes/secrets : Get_tokens | Make sure the tokens directory exits (on node1)] ************************************************************
Friday 29 December 2017 05:49:45 +0000 (0:00:00.333) 0:01:49.839 *******
ok: [node2 -> None] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0}
TASK [kubernetes/secrets : include] *****************************************************************************************************************
Friday 29 December 2017 05:49:46 +0000 (0:00:00.322) 0:01:50.161 *******
included: /home/ubuntu/kubespray/roles/kubernetes/secrets/tasks/gen_certs_script.yml for node2, node3, node1
TASK [kubernetes/secrets : Gen_certs | Create kubernetes config directory (on node1)] ***************************************************************
Friday 29 December 2017 05:49:46 +0000 (0:00:00.151) 0:01:50.313 *******
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}
TASK [kubernetes/secrets : Gen_certs | Create kubernetes script directory (on node1)] ***************************************************************
Friday 29 December 2017 05:49:46 +0000 (0:00:00.428) 0:01:50.742 *******
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}
TASK [kubernetes/secrets : Gen_certs | write openssl config] ****************************************************************************************
Friday 29 December 2017 05:49:47 +0000 (0:00:00.417) 0:01:51.159 *******
ok: [node2 -> None] => {"changed": false, "checksum": "af4239927b2fb01f7b1e15c60e2349694c20e149", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/openssl.conf", "size": 464, "state": "file", "uid": 0}
TASK [kubernetes/secrets : Gen_certs | copy certs generation script] ********************************************************************************
Friday 29 December 2017 05:49:47 +0000 (0:00:00.674) 0:01:51.834 *******
ok: [node2 -> None] => {"changed": false, "checksum": "ca132418c08e69827b1395da46c59957f462dea1", "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/kubernetes-scripts/make-ssl.sh", "size": 3601, "state": "file", "uid": 0}
TASK [kubernetes/secrets : Gen_certs | run cert generation script] **********************************************************************************
Friday 29 December 2017 05:49:48 +0000 (0:00:00.549) 0:01:52.383 *******
fatal: [node2 -> None]: FAILED! => {"changed": true, "cmd": ["/usr/local/bin/kubernetes-scripts/make-ssl.sh", "-f", "/etc/kubernetes/openssl.conf", "-d", "/etc/kubernetes/ssl"], "delta": "0:00:00.089545", "end": "2017-12-29 05:49:47.451046", "msg": "non-zero return code", "rc": 1, "start": "2017-12-29 05:49:47.361501", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
NO MORE HOSTS LEFT **********************************************************************************************************************************
to retry, use: --limit @/home/ubuntu/kubespray/cluster.retry
PLAY RECAP ******************************************************************************************************************************************
node1 : ok=213 changed=0 unreachable=0 failed=0
node2 : ok=204 changed=0 unreachable=0 failed=1
node3 : ok=184 changed=0 unreachable=0 failed=0
Friday 29 December 2017 05:49:48 +0000 (0:00:00.408) 0:01:52.792 *******
===============================================================================
kubernetes/secrets : Check certs | check if a cert already exists on node -------------------------------------------------------------------- 3.51s
kubernetes/preinstall : Create kubernetes directories ---------------------------------------------------------------------------------------- 1.37s
download : Download items -------------------------------------------------------------------------------------------------------------------- 1.23s
download : Sync container -------------------------------------------------------------------------------------------------------------------- 0.82s
kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }") ------------------------------ 0.79s
kubernetes/preinstall : Install latest version of python-apt for Debian distribs ------------------------------------------------------------- 0.73s
download : file_download | Download item ----------------------------------------------------------------------------------------------------- 0.73s
docker : ensure docker repository is enabled ------------------------------------------------------------------------------------------------- 0.70s
docker : Write docker.service systemd file --------------------------------------------------------------------------------------------------- 0.70s
docker : ensure docker packages are installed ------------------------------------------------------------------------------------------------ 0.70s
docker : Write docker options systemd drop-in ------------------------------------------------------------------------------------------------ 0.69s
docker : Write docker dns systemd drop-in ---------------------------------------------------------------------------------------------------- 0.69s
docker : ensure docker repository public key is installed ------------------------------------------------------------------------------------ 0.69s
kubernetes/secrets : Gen_certs | write openssl config ---------------------------------------------------------------------------------------- 0.67s
download : Sync container -------------------------------------------------------------------------------------------------------------------- 0.66s
kubernetes/preinstall : Install packages requirements ---------------------------------------------------------------------------------------- 0.66s
kubernetes/preinstall : Create cni directories ----------------------------------------------------------------------------------------------- 0.62s
download : Sync container -------------------------------------------------------------------------------------------------------------------- 0.62s
download : Download items -------------------------------------------------------------------------------------------------------------------- 0.60s
bootstrap-os : Assign inventory name to unconfigured hostnames (non-CoreOS) ------------------------------------------------------------------ 0.59s
以上是关于text kubespray问题的ansible日志的主要内容,如果未能解决你的问题,请参考以下文章