text HTACCESS拒绝所有IP允许我的IP

过滤IP

htaccesfilterip

# BEGIN ADEV TEMP FILTER IP

order deny,allow
deny from all
allow from 105.158.175.169

# END ADEV TEMP FILTER IP

text 如何禁用覆盆子pi上的屏幕消隐。您需要在文件中插入此条目:/etc/lightdm/lightdm.conf

如何禁用覆盆子pi上的屏幕消隐。您需要在文件中插入此条目:/etc/lightdm/lightdm.conf

gistfile1.txt
xserver-command=X -s 0 -dpms

text 为Raspberry Pi添加SSMTP支持。如果使用谷歌Gmail,您需要访问此页面以允许更少的安全应用程序:https://myaccount.googl

为Raspberry Pi添加SSMTP支持。如果使用Google Gmail,您需要访问此页面才能获得更少的安全应用:https://myaccount.google.com/u/1/lesssecureapps?pageId = none

gistfile1.txt
#
# Enable less secure apps:
# https://myaccount.google.com/u/1/lesssecureapps?pageId=none
#

text 以编程方式设置相关产品Magento 2

以编程方式设置相关产品Magento 2

Set related products programatically Magento 2
$obj = \Magento\Framework\App\ObjectManager::getInstance();

        /** @var \Magento\Catalog\Model\Product $product */
        $productObject = $obj->get('Magento\Catalog\Model\Product');

        $product = $productObject->loadByAttribute('sku', 'Test Test');

        $linkDataAll = [];
        $skuLinks = "0012365,test1233,789456";
        $skuLinks = explode(",",$skuLinks);

        foreach($skuLinks as $skuLink) {
            //check first that the product exist
            $linkedProduct = $productObject->loadByAttribute("sku",$skuLink);
            if($linkedProduct) {
                /** @var  \Magento\Catalog\Api\Data\ProductLinkInterface $productLinks */
                $productLinks = $obj->create('Magento\Catalog\Api\Data\ProductLinkInterface');
                $linkData = $productLinks //Magento\Catalog\Api\Data\ProductLinkInterface
                    ->setSku($product->getSku())
                    ->setLinkedProductSku($skuLink)
                    ->setLinkType("related");
                $linkDataAll[] = $linkData;
            }

        }
        if($linkDataAll) {
            print(count($linkDataAll)); //gives 3
            $product->setProductLinks($linkDataAll);
        }
//        $product->save();

text 我的第一要点

我的第一要点

gistfile1.txt
this is my first gist

text gistfile1.txt

gistfile1.txt
{% layout none %}

<script>
    var quotes = [];
</script>
{% for link in linklists.collections.links %}
	{% assign parents = link | map: 'object' %}
	{% assign child = link.links | map: 'object' %}
	
	<script>
      	var temp = JSON.parse('{{ parents | json }}');
      	temp[0]['title'] = '{{ link.title }}';
        temp[0]['child'] = JSON.parse('{{ child | json }}');
		var p_id = '{{ forloop.index }}'-1;
      	quotes[p_id] = temp[0];
    </script>

	{% for sub_link in link.links %}
		{% assign s_child = sub_link | map: 'object' %}

		<script>
            var s_id = '{{ forloop.index }}'-1;
            quotes[p_id]['child'][s_id]['child'] = [];
        </script>

		{% for sub_sub_link in sub_link.links %}
			{% assign s_s_child = sub_sub_link | map: 'object' %}

			<script>
                var temp = JSON.parse('{{ s_s_child | json }}');
                var s_s_id = '{{ forloop.index }}'-1;
                quotes[p_id]['child'][s_id]['child'][s_s_id] = temp[0];
            </script>

		{% endfor %}
	{% endfor %}
{% endfor %}

{{ page.content }}

<div>
<script>

  console.log(quotes);
//   document.write(JSON.stringify(quotes));
  document.getElementById('rrr').innerHTML = JSON.stringify(quotes);
</script>
</div>

text ObjectAnimation

ObjectAnimation

ObjectAnimation
 public void Animate(View view)
    {
        Display display = getWindowManager().getDefaultDisplay();
        Point point=new Point();
        display.getSize(point);
        final int width = point.y; // screen height
        final float halfW = width/2.0f;
          //Y orX transactionY or tranX
        ObjectAnimator lftToRgt = ObjectAnimator.ofFloat( view,"Y",200,0f )
                .setDuration(3200); // to animate left to right

        AnimatorSet s = new AnimatorSet();//required to set the sequence

            s.setInterpolator(new BounceInterpolator());
            s.play( lftToRgt ); // manage sequence

        s.start();
    }

text kubespray发布有用的信息

kubespray issue useful informations
PLAY [all] ******************************************************************************************************************************************

TASK [set_fact] *************************************************************************************************************************************
Friday 29 December 2017  06:14:29 +0000 (0:00:00.078)       0:00:00.078 *******
ok: [node3]
ok: [node2]
ok: [node1]

TASK [Storing commands output] **********************************************************************************************************************
Friday 29 December 2017  06:14:29 +0000 (0:00:00.103)       0:00:00.181 *******
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node3] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node3] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)
ok: [node2] => (item=None)
ok: [node1] => (item=None)

TASK [Fetch results] ********************************************************************************************************************************
Friday 29 December 2017  06:14:34 +0000 (0:00:04.404)       0:00:04.586 *******
changed: [node3] => (item={u'cmd': u'timedatectl status', u'name': u'timedate_info'})
changed: [node1] => (item={u'cmd': u'timedatectl status', u'name': u'timedate_info'})
changed: [node2] => (item={u'cmd': u'timedatectl status', u'name': u'timedate_info'})
changed: [node1] => (item={u'cmd': u'uname -r', u'name': u'kernel_info'})
changed: [node3] => (item={u'cmd': u'uname -r', u'name': u'kernel_info'})
changed: [node2] => (item={u'cmd': u'uname -r', u'name': u'kernel_info'})
changed: [node2] => (item={u'cmd': u'/usr/bin/docker info', u'name': u'docker_info'})
changed: [node1] => (item={u'cmd': u'/usr/bin/docker info', u'name': u'docker_info'})
changed: [node3] => (item={u'cmd': u'/usr/bin/docker info', u'name': u'docker_info'})
changed: [node1] => (item={u'cmd': u'ip -4 -o a', u'name': u'ip_info'})
changed: [node3] => (item={u'cmd': u'ip -4 -o a', u'name': u'ip_info'})
changed: [node2] => (item={u'cmd': u'ip -4 -o a', u'name': u'ip_info'})
changed: [node1] => (item={u'cmd': u'ip ro', u'name': u'route_info'})
changed: [node3] => (item={u'cmd': u'ip ro', u'name': u'route_info'})
changed: [node2] => (item={u'cmd': u'ip ro', u'name': u'route_info'})
changed: [node3] => (item={u'cmd': u'ps auxf | grep -v ]$', u'name': u'proc_info'})
changed: [node1] => (item={u'cmd': u'ps auxf | grep -v ]$', u'name': u'proc_info'})
changed: [node2] => (item={u'cmd': u'ps auxf | grep -v ]$', u'name': u'proc_info'})
changed: [node1] => (item={u'cmd': u'systemctl --state=failed --no-pager', u'name': u'systemctl_failed_info'})
changed: [node3] => (item={u'cmd': u'systemctl --state=failed --no-pager', u'name': u'systemctl_failed_info'})
changed: [node2] => (item={u'cmd': u'systemctl --state=failed --no-pager', u'name': u'systemctl_failed_info'})
changed: [node3] => (item={u'cmd': u'kubectl get all --all-namespaces -o wide', u'name': u'k8s_info'})
changed: [node2] => (item={u'cmd': u'kubectl get all --all-namespaces -o wide', u'name': u'k8s_info'})
changed: [node1] => (item={u'cmd': u'kubectl get all --all-namespaces -o wide', u'name': u'k8s_info'})
changed: [node3] => (item={u'cmd': u'journalctl -p err --no-pager', u'name': u'errors_info'})
changed: [node1] => (item={u'cmd': u'journalctl -p err --no-pager', u'name': u'errors_info'})
changed: [node2] => (item={u'cmd': u'journalctl -p err --no-pager', u'name': u'errors_info'})
changed: [node3] => (item={u'cmd': u'etcdctl --peers=https://node1:2379 cluster-health', u'name': u'etcd_info'})
changed: [node1] => (item={u'cmd': u'etcdctl --peers=https://node1:2379 cluster-health', u'name': u'etcd_info'})
changed: [node2] => (item={u'cmd': u'etcdctl --peers=https://node1:2379 cluster-health', u'name': u'etcd_info'})
changed: [node3] => (item={u'cmd': u'/usr/local/bin/calicoctl node status', u'name': u'calico_info'})
changed: [node2] => (item={u'cmd': u'/usr/local/bin/calicoctl node status', u'name': u'calico_info'})
changed: [node1] => (item={u'cmd': u'/usr/local/bin/calicoctl node status', u'name': u'calico_info'})
changed: [node3] => (item={u'cmd': u'/usr/local/bin/calicoctl get workloadEndpoint -o wide', u'name': u'calico_workload_info'})
changed: [node2] => (item={u'cmd': u'/usr/local/bin/calicoctl get workloadEndpoint -o wide', u'name': u'calico_workload_info'})
changed: [node1] => (item={u'cmd': u'/usr/local/bin/calicoctl get workloadEndpoint -o wide', u'name': u'calico_workload_info'})
changed: [node3] => (item={u'cmd': u'/usr/local/bin/calicoctl get ippool -o wide', u'name': u'calico_pool_info'})
changed: [node2] => (item={u'cmd': u'/usr/local/bin/calicoctl get ippool -o wide', u'name': u'calico_pool_info'})
changed: [node1] => (item={u'cmd': u'/usr/local/bin/calicoctl get ippool -o wide', u'name': u'calico_pool_info'})
changed: [node3] => (item={u'cmd': u'weave report', u'name': u'weave_info'})
changed: [node2] => (item={u'cmd': u'weave report', u'name': u'weave_info'})
changed: [node1] => (item={u'cmd': u'weave report', u'name': u'weave_info'})
changed: [node3] => (item={u'cmd': u'/usr/bin/docker logs weave', u'name': u'weave_logs'})
changed: [node1] => (item={u'cmd': u'/usr/bin/docker logs weave', u'name': u'weave_logs'})
changed: [node3] => (item={u'cmd': u'kubectl describe all --all-namespaces', u'name': u'kube_describe_all'})
changed: [node2] => (item={u'cmd': u'/usr/bin/docker logs weave', u'name': u'weave_logs'})
changed: [node1] => (item={u'cmd': u'kubectl describe all --all-namespaces', u'name': u'kube_describe_all'})
changed: [node3] => (item={u'cmd': u'kubectl describe nodes', u'name': u'kube_describe_nodes'})
changed: [node2] => (item={u'cmd': u'kubectl describe all --all-namespaces', u'name': u'kube_describe_all'})
changed: [node3] => (item={u'cmd': u'journalctl -u kubelet --no-pager', u'name': u'kubelet_logs'})
changed: [node2] => (item={u'cmd': u'kubectl describe nodes', u'name': u'kube_describe_nodes'})
changed: [node1] => (item={u'cmd': u'kubectl describe nodes', u'name': u'kube_describe_nodes'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kubedns -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system kubedns; done', u'name': u'kubedns_logs'})
changed: [node2] => (item={u'cmd': u'journalctl -u kubelet --no-pager', u'name': u'kubelet_logs'})
changed: [node1] => (item={u'cmd': u'journalctl -u kubelet --no-pager', u'name': u'kubelet_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kubedns -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system kubedns; done', u'name': u'kubedns_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-apiserver -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'apiserver_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kubedns -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system kubedns; done', u'name': u'kubedns_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-apiserver -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'apiserver_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-controller -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'controller_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-apiserver -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'apiserver_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-scheduler -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'scheduler_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-controller -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'controller_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-controller -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'controller_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-proxy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'proxy_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-scheduler -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'scheduler_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-scheduler -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'scheduler_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-nginx -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'nginx_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-proxy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'proxy_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-proxy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'proxy_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l app=flannel -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel-container; done', u'name': u'flannel_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-nginx -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'nginx_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-nginx -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'nginx_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=canal-node -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel; done', u'name': u'canal_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l app=flannel -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel-container; done', u'name': u'flannel_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l app=flannel -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel-container; done', u'name': u'flannel_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=calico-policy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system calico-policy-controller; done', u'name': u'calico_policy_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=canal-node -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel; done', u'name': u'canal_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=canal-node -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel; done', u'name': u'canal_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=calico-policy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system calico-policy-controller; done', u'name': u'calico_policy_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=calico-policy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system calico-policy-controller; done', u'name': u'calico_policy_logs'})

TASK [Fetch logs] ***********************************************************************************************************************************
Friday 29 December 2017  06:14:38 +0000 (0:00:04.349)       0:00:08.935 *******
changed: [node2] => (item=/var/log/syslog)
changed: [node3] => (item=/var/log/syslog)
changed: [node1] => (item=/var/log/syslog)
ok: [node2] => (item=/var/log/daemon.log)
ok: [node3] => (item=/var/log/daemon.log)
ok: [node1] => (item=/var/log/daemon.log)
changed: [node2] => (item=/var/log/kern.log)
changed: [node3] => (item=/var/log/kern.log)
changed: [node1] => (item=/var/log/kern.log)
changed: [node2] => (item=/var/log/dpkg.log)
changed: [node3] => (item=/var/log/dpkg.log)
changed: [node1] => (item=/var/log/dpkg.log)
changed: [node2] => (item=/var/log/apt/history.log)
changed: [node3] => (item=/var/log/apt/history.log)
ok: [node2] => (item=/var/log/yum.log)
changed: [node1] => (item=/var/log/apt/history.log)
ok: [node3] => (item=/var/log/yum.log)
ok: [node2] => (item=/var/log/calico/bird/current)
ok: [node3] => (item=/var/log/calico/bird/current)
ok: [node1] => (item=/var/log/yum.log)
ok: [node2] => (item=/var/log/calico/bird6/current)
ok: [node3] => (item=/var/log/calico/bird6/current)
ok: [node1] => (item=/var/log/calico/bird/current)
ok: [node2] => (item=/var/log/calico/felix/current)
ok: [node3] => (item=/var/log/calico/felix/current)
ok: [node1] => (item=/var/log/calico/bird6/current)
ok: [node2] => (item=/var/log/calico/confd/current)
ok: [node3] => (item=/var/log/calico/confd/current)
ok: [node1] => (item=/var/log/calico/felix/current)
ok: [node1] => (item=/var/log/calico/confd/current)

TASK [Pack results and logs] ************************************************************************************************************************
Friday 29 December 2017  06:14:40 +0000 (0:00:01.818)       0:00:10.753 *******
changed: [node2 -> localhost]

TASK [Clean up collected command outputs] ***********************************************************************************************************
Friday 29 December 2017  06:14:40 +0000 (0:00:00.143)       0:00:10.897 *******
changed: [node3] => (item={u'cmd': u'timedatectl status', u'name': u'timedate_info'})
changed: [node2] => (item={u'cmd': u'timedatectl status', u'name': u'timedate_info'})
changed: [node1] => (item={u'cmd': u'timedatectl status', u'name': u'timedate_info'})
changed: [node2] => (item={u'cmd': u'uname -r', u'name': u'kernel_info'})
changed: [node3] => (item={u'cmd': u'uname -r', u'name': u'kernel_info'})
changed: [node1] => (item={u'cmd': u'uname -r', u'name': u'kernel_info'})
changed: [node2] => (item={u'cmd': u'/usr/bin/docker info', u'name': u'docker_info'})
changed: [node3] => (item={u'cmd': u'/usr/bin/docker info', u'name': u'docker_info'})
changed: [node1] => (item={u'cmd': u'/usr/bin/docker info', u'name': u'docker_info'})
changed: [node3] => (item={u'cmd': u'ip -4 -o a', u'name': u'ip_info'})
changed: [node2] => (item={u'cmd': u'ip -4 -o a', u'name': u'ip_info'})
changed: [node1] => (item={u'cmd': u'ip -4 -o a', u'name': u'ip_info'})
changed: [node3] => (item={u'cmd': u'ip ro', u'name': u'route_info'})
changed: [node2] => (item={u'cmd': u'ip ro', u'name': u'route_info'})
changed: [node1] => (item={u'cmd': u'ip ro', u'name': u'route_info'})
changed: [node3] => (item={u'cmd': u'ps auxf | grep -v ]$', u'name': u'proc_info'})
changed: [node2] => (item={u'cmd': u'ps auxf | grep -v ]$', u'name': u'proc_info'})
changed: [node1] => (item={u'cmd': u'ps auxf | grep -v ]$', u'name': u'proc_info'})
changed: [node3] => (item={u'cmd': u'systemctl --state=failed --no-pager', u'name': u'systemctl_failed_info'})
changed: [node2] => (item={u'cmd': u'systemctl --state=failed --no-pager', u'name': u'systemctl_failed_info'})
changed: [node1] => (item={u'cmd': u'systemctl --state=failed --no-pager', u'name': u'systemctl_failed_info'})
changed: [node3] => (item={u'cmd': u'kubectl get all --all-namespaces -o wide', u'name': u'k8s_info'})
changed: [node2] => (item={u'cmd': u'kubectl get all --all-namespaces -o wide', u'name': u'k8s_info'})
changed: [node1] => (item={u'cmd': u'kubectl get all --all-namespaces -o wide', u'name': u'k8s_info'})
changed: [node3] => (item={u'cmd': u'journalctl -p err --no-pager', u'name': u'errors_info'})
changed: [node2] => (item={u'cmd': u'journalctl -p err --no-pager', u'name': u'errors_info'})
changed: [node1] => (item={u'cmd': u'journalctl -p err --no-pager', u'name': u'errors_info'})
changed: [node3] => (item={u'cmd': u'etcdctl --peers=https://node1:2379 cluster-health', u'name': u'etcd_info'})
changed: [node2] => (item={u'cmd': u'etcdctl --peers=https://node1:2379 cluster-health', u'name': u'etcd_info'})
changed: [node1] => (item={u'cmd': u'etcdctl --peers=https://node1:2379 cluster-health', u'name': u'etcd_info'})
changed: [node3] => (item={u'cmd': u'/usr/local/bin/calicoctl node status', u'name': u'calico_info'})
changed: [node2] => (item={u'cmd': u'/usr/local/bin/calicoctl node status', u'name': u'calico_info'})
changed: [node1] => (item={u'cmd': u'/usr/local/bin/calicoctl node status', u'name': u'calico_info'})
changed: [node3] => (item={u'cmd': u'/usr/local/bin/calicoctl get workloadEndpoint -o wide', u'name': u'calico_workload_info'})
changed: [node2] => (item={u'cmd': u'/usr/local/bin/calicoctl get workloadEndpoint -o wide', u'name': u'calico_workload_info'})
changed: [node1] => (item={u'cmd': u'/usr/local/bin/calicoctl get workloadEndpoint -o wide', u'name': u'calico_workload_info'})
changed: [node3] => (item={u'cmd': u'/usr/local/bin/calicoctl get ippool -o wide', u'name': u'calico_pool_info'})
changed: [node2] => (item={u'cmd': u'/usr/local/bin/calicoctl get ippool -o wide', u'name': u'calico_pool_info'})
changed: [node1] => (item={u'cmd': u'/usr/local/bin/calicoctl get ippool -o wide', u'name': u'calico_pool_info'})
changed: [node3] => (item={u'cmd': u'weave report', u'name': u'weave_info'})
changed: [node2] => (item={u'cmd': u'weave report', u'name': u'weave_info'})
changed: [node1] => (item={u'cmd': u'weave report', u'name': u'weave_info'})
changed: [node3] => (item={u'cmd': u'/usr/bin/docker logs weave', u'name': u'weave_logs'})
changed: [node1] => (item={u'cmd': u'/usr/bin/docker logs weave', u'name': u'weave_logs'})
changed: [node2] => (item={u'cmd': u'/usr/bin/docker logs weave', u'name': u'weave_logs'})
changed: [node3] => (item={u'cmd': u'kubectl describe all --all-namespaces', u'name': u'kube_describe_all'})
changed: [node2] => (item={u'cmd': u'kubectl describe all --all-namespaces', u'name': u'kube_describe_all'})
changed: [node3] => (item={u'cmd': u'kubectl describe nodes', u'name': u'kube_describe_nodes'})
changed: [node1] => (item={u'cmd': u'kubectl describe all --all-namespaces', u'name': u'kube_describe_all'})
changed: [node3] => (item={u'cmd': u'journalctl -u kubelet --no-pager', u'name': u'kubelet_logs'})
changed: [node2] => (item={u'cmd': u'kubectl describe nodes', u'name': u'kube_describe_nodes'})
changed: [node1] => (item={u'cmd': u'kubectl describe nodes', u'name': u'kube_describe_nodes'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kubedns -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system kubedns; done', u'name': u'kubedns_logs'})
changed: [node2] => (item={u'cmd': u'journalctl -u kubelet --no-pager', u'name': u'kubelet_logs'})
changed: [node1] => (item={u'cmd': u'journalctl -u kubelet --no-pager', u'name': u'kubelet_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-apiserver -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'apiserver_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kubedns -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system kubedns; done', u'name': u'kubedns_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kubedns -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system kubedns; done', u'name': u'kubedns_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-controller -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'controller_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-apiserver -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'apiserver_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-apiserver -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'apiserver_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-scheduler -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'scheduler_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-controller -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'controller_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-controller -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'controller_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-proxy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'proxy_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-scheduler -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'scheduler_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-nginx -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'nginx_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-scheduler -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'scheduler_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l app=flannel -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel-container; done', u'name': u'flannel_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-proxy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'proxy_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-proxy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'proxy_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=canal-node -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel; done', u'name': u'canal_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-nginx -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'nginx_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=kube-nginx -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system; done', u'name': u'nginx_logs'})
changed: [node3] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=calico-policy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system calico-policy-controller; done', u'name': u'calico_policy_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l app=flannel -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel-container; done', u'name': u'flannel_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l app=flannel -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel-container; done', u'name': u'flannel_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=canal-node -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel; done', u'name': u'canal_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=canal-node -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system flannel; done', u'name': u'canal_logs'})
changed: [node2] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=calico-policy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system calico-policy-controller; done', u'name': u'calico_policy_logs'})
changed: [node1] => (item={u'cmd': u'for i in `kubectl get pods --all-namespaces -l k8s-app=calico-policy -o jsonpath={.items..metadata.name}`; do kubectl logs ${i} --namespace kube-system calico-policy-controller; done', u'name': u'calico_policy_logs'})

PLAY RECAP ******************************************************************************************************************************************
node1                      : ok=5    changed=4    unreachable=0    failed=0
node2                      : ok=6    changed=5    unreachable=0    failed=0
node3                      : ok=5    changed=4    unreachable=0    failed=0

Friday 29 December 2017  06:14:44 +0000 (0:00:04.309)       0:00:15.207 *******
===============================================================================
Storing commands output ---------------------------------------------------------------------------------------------------------------------- 4.40s
Fetch results -------------------------------------------------------------------------------------------------------------------------------- 4.35s
Clean up collected command outputs ----------------------------------------------------------------------------------------------------------- 4.31s
Fetch logs ----------------------------------------------------------------------------------------------------------------------------------- 1.82s
Pack results and logs ------------------------------------------------------------------------------------------------------------------------ 0.14s
set_fact ------------------------------------------------------------------------------------------------------------------------------------- 0.10s

text kubespray问题的ansible日志

kubespray问题的ansible日志

ansible log
Using /home/ubuntu/kubespray/ansible.cfg as config file

PLAY [localhost] ************************************************************************************************************************************
skipping: no hosts matched

PLAY [k8s-cluster:etcd:calico-rr] *******************************************************************************************************************

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:47:56 +0000 (0:00:00.095)       0:00:00.095 ******* 

TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017  05:47:56 +0000 (0:00:00.040)       0:00:00.135 ******* 

TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017  05:47:56 +0000 (0:00:00.048)       0:00:00.183 ******* 

TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017  05:47:56 +0000 (0:00:00.018)       0:00:00.202 ******* 

TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017  05:47:56 +0000 (0:00:00.581)       0:00:00.784 ******* 

TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.618)       0:00:01.402 ******* 
ok: [node3] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node2] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}

TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] **************************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.205)       0:00:01.608 ******* 

TASK [bootstrap-os : Bootstrap | Install python 2.x and pip] ****************************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.070)       0:00:01.679 ******* 

TASK [bootstrap-os : set_fact] **********************************************************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.039)       0:00:01.718 ******* 

TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] **************************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.038)       0:00:01.756 ******* 

TASK [bootstrap-os : Bootstrap | Install python 2.x, pip, and dbus] *********************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.064)       0:00:01.820 ******* 

TASK [bootstrap-os : set_fact] **********************************************************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.038)       0:00:01.859 ******* 

TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] **************************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.039)       0:00:01.898 ******* 

TASK [bootstrap-os : Bootstrap | Run bootstrap.sh] **************************************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.042)       0:00:01.940 ******* 

TASK [bootstrap-os : set_fact] **********************************************************************************************************************
Friday 29 December 2017  05:47:57 +0000 (0:00:00.046)       0:00:01.987 ******* 

TASK [bootstrap-os : Bootstrap | Check if we need to install pip] ***********************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.121)       0:00:02.109 ******* 

TASK [bootstrap-os : Bootstrap | Copy get-pip.py] ***************************************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.040)       0:00:02.150 ******* 

TASK [bootstrap-os : Bootstrap | Install pip] *******************************************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.038)       0:00:02.188 ******* 

TASK [bootstrap-os : Bootstrap | Remove get-pip.py] *************************************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.037)       0:00:02.226 ******* 

TASK [bootstrap-os : Bootstrap | Install pip launcher] **********************************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.039)       0:00:02.266 ******* 

TASK [bootstrap-os : Install required python modules] ***********************************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.036)       0:00:02.302 ******* 

TASK [bootstrap-os : Check presence of fastestmirror.conf] ******************************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.060)       0:00:02.363 ******* 

TASK [bootstrap-os : Disable fastestmirror plugin] **************************************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.036)       0:00:02.400 ******* 

TASK [bootstrap-os : Install packages requirements for bootstrap] ***********************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.036)       0:00:02.437 ******* 

TASK [bootstrap-os : Remove require tty] ************************************************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.036)       0:00:02.474 ******* 
ok: [node3] => {"backup": "", "changed": false, "found": 0, "msg": ""}
ok: [node1] => {"backup": "", "changed": false, "found": 0, "msg": ""}
ok: [node2] => {"backup": "", "changed": false, "found": 0, "msg": ""}

TASK [bootstrap-os : check if atomic host] **********************************************************************************************************
Friday 29 December 2017  05:47:58 +0000 (0:00:00.333)       0:00:02.808 ******* 
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}

TASK [bootstrap-os : set_fact] **********************************************************************************************************************
Friday 29 December 2017  05:47:59 +0000 (0:00:00.334)       0:00:03.142 ******* 
ok: [node1] => {"ansible_facts": {"is_atomic": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"is_atomic": false}, "changed": false}
ok: [node3] => {"ansible_facts": {"is_atomic": false}, "changed": false}

TASK [bootstrap-os : Gather nodes hostnames] ********************************************************************************************************
Friday 29 December 2017  05:47:59 +0000 (0:00:00.109)       0:00:03.252 ******* 
ok: [node3]
ok: [node2]
ok: [node1]

TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (non-CoreOS)] ******************************************************************
Friday 29 December 2017  05:47:59 +0000 (0:00:00.582)       0:00:03.834 ******* 
ok: [node3] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "node3.cluster.local", "ansible_hostname": "node3", "ansible_nodename": "node3"}, "changed": false, "name": "node3"}
ok: [node2] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "node2.cluster.local", "ansible_hostname": "node2", "ansible_nodename": "node2"}, "changed": false, "name": "node2"}
ok: [node1] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "node1.cluster.local", "ansible_hostname": "node1", "ansible_nodename": "node1"}, "changed": false, "name": "node1"}

TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (CoreOS only)] *****************************************************************
Friday 29 December 2017  05:48:00 +0000 (0:00:00.588)       0:00:04.423 ******* 

TASK [bootstrap-os : Update hostname fact (CoreOS only)] ********************************************************************************************
Friday 29 December 2017  05:48:00 +0000 (0:00:00.039)       0:00:04.462 ******* 

PLAY [k8s-cluster:etcd:calico-rr] *******************************************************************************************************************

PLAY [k8s-cluster:etcd:calico-rr] *******************************************************************************************************************

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:00 +0000 (0:00:00.105)       0:00:04.568 ******* 

TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017  05:48:00 +0000 (0:00:00.043)       0:00:04.611 ******* 

TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017  05:48:00 +0000 (0:00:00.042)       0:00:04.654 ******* 

TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017  05:48:00 +0000 (0:00:00.021)       0:00:04.676 ******* 

TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017  05:48:01 +0000 (0:00:00.502)       0:00:05.178 ******* 

TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017  05:48:01 +0000 (0:00:00.542)       0:00:05.721 ******* 
ok: [node2] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node3] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}

TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017  05:48:01 +0000 (0:00:00.249)       0:00:05.970 ******* 
ok: [node1] => {"changed": false, "gid": 999, "name": "kube-cert", "state": "present", "system": true}
ok: [node2] => {"changed": false, "gid": 999, "name": "kube-cert", "state": "present", "system": true}
ok: [node3] => {"changed": false, "gid": 999, "name": "kube-cert", "state": "present", "system": true}

TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017  05:48:02 +0000 (0:00:00.410)       0:00:06.381 ******* 
ok: [node3] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 999, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999}
ok: [node1] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 999, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999}
ok: [node2] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 999, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999}

TASK [kubernetes/preinstall : Stop if ansible version is too low] ***********************************************************************************
Friday 29 December 2017  05:48:02 +0000 (0:00:00.484)       0:00:06.866 ******* 
ok: [node2] => {
    "changed": false, 
    "msg": "All assertions passed"
}

TASK [kubernetes/preinstall : Stop if non systemd OS type] ******************************************************************************************
Friday 29 December 2017  05:48:02 +0000 (0:00:00.159)       0:00:07.025 ******* 
ok: [node2] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node3] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node1] => {
    "changed": false, 
    "msg": "All assertions passed"
}

TASK [kubernetes/preinstall : Stop if unknown OS] ***************************************************************************************************
Friday 29 December 2017  05:48:03 +0000 (0:00:00.255)       0:00:07.281 ******* 
ok: [node1] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node3] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node2] => {
    "changed": false, 
    "msg": "All assertions passed"
}

TASK [kubernetes/preinstall : Stop if unknown network plugin] ***************************************************************************************
Friday 29 December 2017  05:48:03 +0000 (0:00:00.256)       0:00:07.537 ******* 

TASK [kubernetes/preinstall : Stop if incompatible network plugin and cloudprovider] ****************************************************************
Friday 29 December 2017  05:48:03 +0000 (0:00:00.040)       0:00:07.577 ******* 

TASK [kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }")] ******************************
Friday 29 December 2017  05:48:03 +0000 (0:00:00.040)       0:00:07.617 ******* 
ok: [node2] => (item={u'name': u'kubeadm_enabled', u'value': False}) => {
    "changed": false, 
    "item": {
        "name": "kubeadm_enabled", 
        "value": false
    }, 
    "msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'download_run_once', u'value': False}) => {
    "changed": false, 
    "item": {
        "name": "download_run_once", 
        "value": false
    }, 
    "msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'deploy_netchecker', u'value': False}) => {
    "changed": false, 
    "item": {
        "name": "deploy_netchecker", 
        "value": false
    }, 
    "msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'download_always_pull', u'value': False}) => {
    "changed": false, 
    "item": {
        "name": "download_always_pull", 
        "value": false
    }, 
    "msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'efk_enabled', u'value': False}) => {
    "changed": false, 
    "item": {
        "name": "efk_enabled", 
        "value": false
    }, 
    "msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'helm_enabled', u'value': True}) => {
    "changed": false, 
    "item": {
        "name": "helm_enabled", 
        "value": true
    }, 
    "msg": "All assertions passed"
}
ok: [node2] => (item={u'name': u'openstack_lbaas_enabled', u'value': False}) => {
    "changed": false, 
    "item": {
        "name": "openstack_lbaas_enabled", 
        "value": false
    }, 
    "msg": "All assertions passed"
}

TASK [kubernetes/preinstall : Stop if even number of etcd hosts] ************************************************************************************
Friday 29 December 2017  05:48:04 +0000 (0:00:00.790)       0:00:08.408 ******* 
ok: [node2] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node3] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node1] => {
    "changed": false, 
    "msg": "All assertions passed"
}

TASK [kubernetes/preinstall : Stop if memory is too small for masters] ******************************************************************************
Friday 29 December 2017  05:48:04 +0000 (0:00:00.259)       0:00:08.667 ******* 
ok: [node1] => {
    "changed": false, 
    "msg": "All assertions passed"
}

TASK [kubernetes/preinstall : Stop if memory is too small for nodes] ********************************************************************************
Friday 29 December 2017  05:48:04 +0000 (0:00:00.192)       0:00:08.860 ******* 
ok: [node2] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node3] => {
    "changed": false, 
    "msg": "All assertions passed"
}

TASK [kubernetes/preinstall : Stop if ip var does not match local ips] ******************************************************************************
Friday 29 December 2017  05:48:04 +0000 (0:00:00.203)       0:00:09.064 ******* 

TASK [kubernetes/preinstall : Stop if access_ip is not pingable] ************************************************************************************
Friday 29 December 2017  05:48:05 +0000 (0:00:00.040)       0:00:09.105 ******* 

TASK [kubernetes/preinstall : Stop if swap enabled] *************************************************************************************************
Friday 29 December 2017  05:48:05 +0000 (0:00:00.039)       0:00:09.144 ******* 
ok: [node2] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node3] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node1] => {
    "changed": false, 
    "msg": "All assertions passed"
}

TASK [kubernetes/preinstall : Stop if RBAC is not enabled when dashboard is enabled] ****************************************************************
Friday 29 December 2017  05:48:05 +0000 (0:00:00.274)       0:00:09.418 ******* 
ok: [node3] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node2] => {
    "changed": false, 
    "msg": "All assertions passed"
}
ok: [node1] => {
    "changed": false, 
    "msg": "All assertions passed"
}

TASK [kubernetes/preinstall : Force binaries directory for Container Linux by CoreOS] ***************************************************************
Friday 29 December 2017  05:48:05 +0000 (0:00:00.266)       0:00:09.685 ******* 

TASK [kubernetes/preinstall : check bin dir exists] *************************************************************************************************
Friday 29 December 2017  05:48:05 +0000 (0:00:00.042)       0:00:09.728 ******* 
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 0}
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 0}
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 0}

TASK [kubernetes/preinstall : check if atomic host] *************************************************************************************************
Friday 29 December 2017  05:48:06 +0000 (0:00:00.419)       0:00:10.147 ******* 
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}

TASK [kubernetes/preinstall : set_fact] *************************************************************************************************************
Friday 29 December 2017  05:48:06 +0000 (0:00:00.447)       0:00:10.595 ******* 
ok: [node1] => {"ansible_facts": {"is_atomic": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"is_atomic": false}, "changed": false}
ok: [node3] => {"ansible_facts": {"is_atomic": false}, "changed": false}

TASK [kubernetes/preinstall : set_fact] *************************************************************************************************************
Friday 29 December 2017  05:48:06 +0000 (0:00:00.303)       0:00:10.899 ******* 

TASK [kubernetes/preinstall : check resolvconf] *****************************************************************************************************
Friday 29 December 2017  05:48:06 +0000 (0:00:00.058)       0:00:10.957 ******* 
ok: [node2] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.002003", "end": "2017-12-29 05:48:06.010111", "failed_when_result": false, "rc": 0, "start": "2017-12-29 05:48:06.008108", "stderr": "", "stderr_lines": [], "stdout": "/sbin/resolvconf", "stdout_lines": ["/sbin/resolvconf"]}
ok: [node1] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.002474", "end": "2017-12-29 05:48:06.036344", "failed_when_result": false, "rc": 0, "start": "2017-12-29 05:48:06.033870", "stderr": "", "stderr_lines": [], "stdout": "/sbin/resolvconf", "stdout_lines": ["/sbin/resolvconf"]}
ok: [node3] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.001865", "end": "2017-12-29 05:48:05.857209", "failed_when_result": false, "rc": 0, "start": "2017-12-29 05:48:05.855344", "stderr": "", "stderr_lines": [], "stdout": "/sbin/resolvconf", "stdout_lines": ["/sbin/resolvconf"]}

TASK [kubernetes/preinstall : set_fact] *************************************************************************************************************
Friday 29 December 2017  05:48:07 +0000 (0:00:00.436)       0:00:11.393 ******* 
ok: [node1] => {"ansible_facts": {"resolvconf": true}, "changed": false}
ok: [node2] => {"ansible_facts": {"resolvconf": true}, "changed": false}
ok: [node3] => {"ansible_facts": {"resolvconf": true}, "changed": false}

TASK [kubernetes/preinstall : set_fact] *************************************************************************************************************
Friday 29 December 2017  05:48:07 +0000 (0:00:00.253)       0:00:11.647 ******* 
ok: [node3] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "default_resolver": "8.8.8.8"}, "changed": false}
ok: [node2] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "default_resolver": "8.8.8.8"}, "changed": false}
ok: [node1] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "default_resolver": "8.8.8.8"}, "changed": false}

TASK [kubernetes/preinstall : check if kubelet is configured] ***************************************************************************************
Friday 29 December 2017  05:48:07 +0000 (0:00:00.297)       0:00:11.945 ******* 
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}

TASK [kubernetes/preinstall : check if early DNS configuration stage] *******************************************************************************
Friday 29 December 2017  05:48:08 +0000 (0:00:00.425)       0:00:12.370 ******* 
ok: [node2] => {"ansible_facts": {"dns_early": true}, "changed": false}
ok: [node1] => {"ansible_facts": {"dns_early": true}, "changed": false}
ok: [node3] => {"ansible_facts": {"dns_early": true}, "changed": false}

TASK [kubernetes/preinstall : target resolv.conf files] *********************************************************************************************
Friday 29 December 2017  05:48:08 +0000 (0:00:00.283)       0:00:12.654 ******* 
ok: [node1] => {"ansible_facts": {"base": "/etc/resolvconf/resolv.conf.d/base", "head": "/etc/resolvconf/resolv.conf.d/head", "resolvconffile": "/etc/resolv.conf"}, "changed": false}
ok: [node2] => {"ansible_facts": {"base": "/etc/resolvconf/resolv.conf.d/base", "head": "/etc/resolvconf/resolv.conf.d/head", "resolvconffile": "/etc/resolv.conf"}, "changed": false}
ok: [node3] => {"ansible_facts": {"base": "/etc/resolvconf/resolv.conf.d/base", "head": "/etc/resolvconf/resolv.conf.d/head", "resolvconffile": "/etc/resolv.conf"}, "changed": false}

TASK [kubernetes/preinstall : target temporary resolvconf cloud init file (Container Linux by CoreOS)] **********************************************
Friday 29 December 2017  05:48:08 +0000 (0:00:00.304)       0:00:12.958 ******* 

TASK [kubernetes/preinstall : check if /etc/dhclient.conf exists] ***********************************************************************************
Friday 29 December 2017  05:48:08 +0000 (0:00:00.042)       0:00:13.001 ******* 
ok: [node1] => {"changed": false, "stat": {"exists": false}}
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}

TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhclient.conf] *********************************************************************
Friday 29 December 2017  05:48:09 +0000 (0:00:00.364)       0:00:13.366 ******* 

TASK [kubernetes/preinstall : check if /etc/dhcp/dhclient.conf exists] ******************************************************************************
Friday 29 December 2017  05:48:09 +0000 (0:00:00.041)       0:00:13.407 ******* 
ok: [node1] => {"changed": false, "stat": {"atime": 1514447924.672, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1487946470.4271395, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1244, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "c3b6c3271031ab8e250a192f4eb18695", "mimetype": "text/plain", "mode": "0644", "mtime": 1452709242.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": "18446744071791663259", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node2] => {"changed": false, "stat": {"atime": 1514447926.496, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1487946470.4271395, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1244, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "c3b6c3271031ab8e250a192f4eb18695", "mimetype": "text/plain", "mode": "0644", "mtime": 1452709242.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": "18446744071791663259", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node3] => {"changed": false, "stat": {"atime": 1514447926.412, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1487946470.4271395, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1244, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "c3b6c3271031ab8e250a192f4eb18695", "mimetype": "text/plain", "mode": "0644", "mtime": 1452709242.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": "18446744071791663259", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}

TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhcp/dhclient.conf] ****************************************************************
Friday 29 December 2017  05:48:09 +0000 (0:00:00.372)       0:00:13.780 ******* 
ok: [node3] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false}
ok: [node1] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false}
ok: [node2] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false}

TASK [kubernetes/preinstall : target dhclient hook file for Red Hat family] *************************************************************************
Friday 29 December 2017  05:48:09 +0000 (0:00:00.274)       0:00:14.055 ******* 

TASK [kubernetes/preinstall : target dhclient hook file for Debian family] **************************************************************************
Friday 29 December 2017  05:48:10 +0000 (0:00:00.043)       0:00:14.099 ******* 
ok: [node3] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false}
ok: [node2] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false}
ok: [node1] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false}

TASK [kubernetes/preinstall : generate search domains to resolvconf] ********************************************************************************
Friday 29 December 2017  05:48:10 +0000 (0:00:00.269)       0:00:14.368 ******* 
ok: [node2] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false}
ok: [node3] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false}
ok: [node1] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false}

TASK [kubernetes/preinstall : pick dnsmasq cluster IP or default resolver] **************************************************************************
Friday 29 December 2017  05:48:10 +0000 (0:00:00.271)       0:00:14.640 ******* 
ok: [node1] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false}
ok: [node2] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false}
ok: [node3] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false}

TASK [kubernetes/preinstall : generate nameservers to resolvconf] ***********************************************************************************
Friday 29 December 2017  05:48:10 +0000 (0:00:00.275)       0:00:14.915 ******* 
ok: [node2] => {"ansible_facts": {"nameserverentries": "nameserver 8.8.8.8", "supersede_nameserver": "supersede domain-name-servers 8.8.8.8;"}, "changed": false}
ok: [node3] => {"ansible_facts": {"nameserverentries": "nameserver 8.8.8.8", "supersede_nameserver": "supersede domain-name-servers 8.8.8.8;"}, "changed": false}
ok: [node1] => {"ansible_facts": {"nameserverentries": "nameserver 8.8.8.8", "supersede_nameserver": "supersede domain-name-servers 8.8.8.8;"}, "changed": false}

TASK [kubernetes/preinstall : gather os specific variables] *****************************************************************************************
Friday 29 December 2017  05:48:11 +0000 (0:00:00.263)       0:00:15.179 ******* 
ok: [node2] => (item=/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"}
ok: [node1] => (item=/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"}
ok: [node3] => (item=/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"}

TASK [kubernetes/preinstall : Create kubernetes directories] ****************************************************************************************
Friday 29 December 2017  05:48:11 +0000 (0:00:00.327)       0:00:15.507 ******* 
ok: [node3] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 999, "group": "kube-cert", "item": "/etc/kubernetes/ssl", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 999, "group": "kube-cert", "item": "/etc/kubernetes/ssl", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 999, "group": "kube-cert", "item": "/etc/kubernetes/ssl", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/mnt/disks) => {"changed": false, "gid": 0, "group": "root", "item": "/mnt/disks", "mode": "0755", "owner": "kube", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/mnt/disks) => {"changed": false, "gid": 0, "group": "root", "item": "/mnt/disks", "mode": "0755", "owner": "kube", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/mnt/disks) => {"changed": false, "gid": 0, "group": "root", "item": "/mnt/disks", "mode": "0755", "owner": "kube", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 999}

TASK [kubernetes/preinstall : check cloud_provider value] *******************************************************************************************
Friday 29 December 2017  05:48:12 +0000 (0:00:01.369)       0:00:16.876 ******* 

TASK [kubernetes/preinstall : include] **************************************************************************************************************
Friday 29 December 2017  05:48:12 +0000 (0:00:00.039)       0:00:16.915 ******* 

TASK [kubernetes/preinstall : Create cni directories] ***********************************************************************************************
Friday 29 December 2017  05:48:12 +0000 (0:00:00.039)       0:00:16.954 ******* 
ok: [node3] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => (item=/opt/cni/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => (item=/opt/cni/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => (item=/opt/cni/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 4096, "state": "directory", "uid": 999}

TASK [kubernetes/preinstall : create temporary resolveconf cloud init file] *************************************************************************
Friday 29 December 2017  05:48:13 +0000 (0:00:00.623)       0:00:17.578 ******* 

TASK [kubernetes/preinstall : Add domain/search/nameservers/options to resolv.conf] *****************************************************************
Friday 29 December 2017  05:48:13 +0000 (0:00:00.045)       0:00:17.624 ******* 

TASK [kubernetes/preinstall : Remove search/domain/nameserver options before block] *****************************************************************
Friday 29 December 2017  05:48:13 +0000 (0:00:00.040)       0:00:17.664 ******* 

TASK [kubernetes/preinstall : Remove search/domain/nameserver options after block] ******************************************************************
Friday 29 December 2017  05:48:13 +0000 (0:00:00.229)       0:00:17.894 ******* 

TASK [kubernetes/preinstall : get temporary resolveconf cloud init file content] ********************************************************************
Friday 29 December 2017  05:48:14 +0000 (0:00:00.227)       0:00:18.122 ******* 

TASK [kubernetes/preinstall : persist resolvconf cloud init file] ***********************************************************************************
Friday 29 December 2017  05:48:14 +0000 (0:00:00.042)       0:00:18.164 ******* 

TASK [kubernetes/preinstall : Update package management cache (YUM)] ********************************************************************************
Friday 29 December 2017  05:48:14 +0000 (0:00:00.041)       0:00:18.206 ******* 

TASK [kubernetes/preinstall : Expire management cache (YUM) for Updation - Redhat] ******************************************************************
Friday 29 December 2017  05:48:14 +0000 (0:00:00.038)       0:00:18.245 ******* 

TASK [kubernetes/preinstall : Update package management cache (YUM) - Redhat] ***********************************************************************
Friday 29 December 2017  05:48:14 +0000 (0:00:00.038)       0:00:18.284 ******* 

TASK [kubernetes/preinstall : Install latest version of python-apt for Debian distribs] *************************************************************
Friday 29 December 2017  05:48:14 +0000 (0:00:00.036)       0:00:18.320 ******* 
ok: [node3] => {"cache_update_time": 1514525140, "cache_updated": false, "changed": false}
ok: [node2] => {"cache_update_time": 1514525141, "cache_updated": false, "changed": false}
ok: [node1] => {"cache_update_time": 1514525140, "cache_updated": false, "changed": false}

TASK [kubernetes/preinstall : Install python-dnf for latest RedHat versions] ************************************************************************
Friday 29 December 2017  05:48:14 +0000 (0:00:00.730)       0:00:19.051 ******* 

TASK [kubernetes/preinstall : Install epel-release on RedHat/CentOS] ********************************************************************************
Friday 29 December 2017  05:48:15 +0000 (0:00:00.039)       0:00:19.090 ******* 

TASK [kubernetes/preinstall : Install packages requirements] ****************************************************************************************
Friday 29 December 2017  05:48:15 +0000 (0:00:00.036)       0:00:19.127 ******* 
ok: [node3] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"]}
ok: [node2] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "cache_update_time": 1514525141, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"]}
ok: [node1] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"]}

TASK [kubernetes/preinstall : Confirm selinux deployed] *********************************************************************************************
Friday 29 December 2017  05:48:15 +0000 (0:00:00.662)       0:00:19.789 ******* 

TASK [kubernetes/preinstall : Set selinux policy] ***************************************************************************************************
Friday 29 December 2017  05:48:15 +0000 (0:00:00.039)       0:00:19.829 ******* 

TASK [kubernetes/preinstall : Disable IPv6 DNS lookup] **********************************************************************************************
Friday 29 December 2017  05:48:15 +0000 (0:00:00.037)       0:00:19.866 ******* 

TASK [kubernetes/preinstall : set default sysctl file path] *****************************************************************************************
Friday 29 December 2017  05:48:15 +0000 (0:00:00.034)       0:00:19.901 ******* 
ok: [node3] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.d/99-sysctl.conf"}, "changed": false}
ok: [node2] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.d/99-sysctl.conf"}, "changed": false}
ok: [node1] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.d/99-sysctl.conf"}, "changed": false}

TASK [kubernetes/preinstall : Stat sysctl file configuration] ***************************************************************************************
Friday 29 December 2017  05:48:16 +0000 (0:00:00.272)       0:00:20.174 ******* 
ok: [node2] => {"changed": false, "stat": {"atime": 1514459619.172, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1514448132.296, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 29239, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1509099119.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}}
ok: [node3] => {"changed": false, "stat": {"atime": 1514459618.796, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1514448161.348, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 29239, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1509099119.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}}
ok: [node1] => {"changed": false, "stat": {"atime": 1514459619.224, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1514448124.792, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 29239, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1509099119.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}}

TASK [kubernetes/preinstall : Change sysctl file path to link source if linked] *********************************************************************
Friday 29 December 2017  05:48:16 +0000 (0:00:00.373)       0:00:20.547 ******* 
ok: [node3] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false}
ok: [node1] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false}
ok: [node2] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false}

TASK [kubernetes/preinstall : Enable ip forwarding] *************************************************************************************************
Friday 29 December 2017  05:48:16 +0000 (0:00:00.276)       0:00:20.823 ******* 
ok: [node3] => {"changed": false}
ok: [node2] => {"changed": false}
ok: [node1] => {"changed": false}

TASK [kubernetes/preinstall : Write cloud-config] ***************************************************************************************************
Friday 29 December 2017  05:48:17 +0000 (0:00:00.488)       0:00:21.312 ******* 

TASK [kubernetes/preinstall : Hosts | populate inventory into hosts file] ***************************************************************************
Friday 29 December 2017  05:48:17 +0000 (0:00:00.040)       0:00:21.353 ******* 
ok: [node3] => {"changed": false, "msg": ""}
ok: [node2] => {"changed": false, "msg": ""}
ok: [node1] => {"changed": false, "msg": ""}

TASK [kubernetes/preinstall : Hosts | populate kubernetes loadbalancer address into hosts file] *****************************************************
Friday 29 December 2017  05:48:17 +0000 (0:00:00.512)       0:00:21.865 ******* 

TASK [kubernetes/preinstall : Hosts | localhost ipv4 in hosts file] *********************************************************************************
Friday 29 December 2017  05:48:17 +0000 (0:00:00.040)       0:00:21.906 ******* 
ok: [node1] => {"backup": "", "changed": false, "msg": ""}
ok: [node2] => {"backup": "", "changed": false, "msg": ""}
ok: [node3] => {"backup": "", "changed": false, "msg": ""}

TASK [kubernetes/preinstall : Hosts | localhost ipv6 in hosts file] *********************************************************************************
Friday 29 December 2017  05:48:18 +0000 (0:00:00.363)       0:00:22.269 ******* 
ok: [node3] => {"backup": "", "changed": false, "msg": ""}
ok: [node1] => {"backup": "", "changed": false, "msg": ""}
ok: [node2] => {"backup": "", "changed": false, "msg": ""}

TASK [kubernetes/preinstall : Configure dhclient to supersede search/domain/nameservers] ************************************************************
Friday 29 December 2017  05:48:18 +0000 (0:00:00.377)       0:00:22.646 ******* 

TASK [kubernetes/preinstall : Configue dhclient hooks for resolv.conf (non-RH)] *********************************************************************
Friday 29 December 2017  05:48:18 +0000 (0:00:00.045)       0:00:22.692 ******* 

TASK [kubernetes/preinstall : Configue dhclient hooks for resolv.conf (RH-only)] ********************************************************************
Friday 29 December 2017  05:48:18 +0000 (0:00:00.040)       0:00:22.732 ******* 

TASK [kubernetes/preinstall : Remove kubespray specific config from dhclient config] ****************************************************************
Friday 29 December 2017  05:48:18 +0000 (0:00:00.043)       0:00:22.776 ******* 
ok: [node1] => {"changed": false, "msg": ""}
ok: [node2] => {"changed": false, "msg": ""}
ok: [node3] => {"changed": false, "msg": ""}

TASK [kubernetes/preinstall : Remove kubespray specific dhclient hook] ******************************************************************************
Friday 29 December 2017  05:48:19 +0000 (0:00:00.382)       0:00:23.159 ******* 
ok: [node1] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"}
ok: [node2] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"}
ok: [node3] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"}

TASK [kubernetes/preinstall : Check if we are running inside a Azure VM] ****************************************************************************
Friday 29 December 2017  05:48:19 +0000 (0:00:00.388)       0:00:23.547 ******* 
ok: [node3] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}
ok: [node2] => {"changed": false, "stat": {"exists": false}}

TASK [kubernetes/preinstall : install growpart] *****************************************************************************************************
Friday 29 December 2017  05:48:19 +0000 (0:00:00.370)       0:00:23.918 ******* 

TASK [kubernetes/preinstall : check if growpart needs to be run] ************************************************************************************
Friday 29 December 2017  05:48:19 +0000 (0:00:00.039)       0:00:23.957 ******* 

TASK [kubernetes/preinstall : check fs type] ********************************************************************************************************
Friday 29 December 2017  05:48:19 +0000 (0:00:00.039)       0:00:23.997 ******* 

TASK [kubernetes/preinstall : run growpart] *********************************************************************************************************
Friday 29 December 2017  05:48:19 +0000 (0:00:00.040)       0:00:24.037 ******* 

TASK [kubernetes/preinstall : run xfs_growfs] *******************************************************************************************************
Friday 29 December 2017  05:48:20 +0000 (0:00:00.041)       0:00:24.079 ******* 

TASK [docker/docker-storage : docker-storage-setup | install git and make] **************************************************************************
Friday 29 December 2017  05:48:20 +0000 (0:00:00.046)       0:00:24.125 ******* 

TASK [docker/docker-storage : docker-storage-setup | docker-storage-setup sysconfig template] *******************************************************
Friday 29 December 2017  05:48:20 +0000 (0:00:00.056)       0:00:24.182 ******* 

TASK [docker/docker-storage : docker-storage-override-directory | docker service storage-setup override dir] ****************************************
Friday 29 December 2017  05:48:20 +0000 (0:00:00.041)       0:00:24.224 ******* 

TASK [docker/docker-storage : docker-storage-override | docker service storage-setup override file] *************************************************
Friday 29 December 2017  05:48:20 +0000 (0:00:00.038)       0:00:24.262 ******* 

TASK [docker/docker-storage : docker-storage-setup | install and run container-storage-setup] *******************************************************
Friday 29 December 2017  05:48:20 +0000 (0:00:00.040)       0:00:24.303 ******* 

TASK [docker : gather os specific variables] ********************************************************************************************************
Friday 29 December 2017  05:48:20 +0000 (0:00:00.040)       0:00:24.343 ******* 
ok: [node3] => (item=/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb {{ docker_apt_repo_base_url }} {{ ansible_distribution|lower }}-{{ ansible_distribution_release|lower }} main\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["58118E89F3A912897C070ADBF76221572C52609D"], "url": "{{ docker_apt_repo_gpgkey }}"}, "docker_versioned_pkg": {"1.11": "docker-engine=1.11.1-0~{{ ansible_distribution_release|lower }}", "1.12": "docker-engine=1.12.6-0~ubuntu-{{ ansible_distribution_release|lower }}", "1.13": "docker-engine=1.13.1-0~ubuntu-{{ ansible_distribution_release|lower }}", "17.03": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-engine=17.05.0~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "latest": "docker-engine", "stable": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}"}}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/docker/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml"}
ok: [node2] => (item=/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb {{ docker_apt_repo_base_url }} {{ ansible_distribution|lower }}-{{ ansible_distribution_release|lower }} main\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["58118E89F3A912897C070ADBF76221572C52609D"], "url": "{{ docker_apt_repo_gpgkey }}"}, "docker_versioned_pkg": {"1.11": "docker-engine=1.11.1-0~{{ ansible_distribution_release|lower }}", "1.12": "docker-engine=1.12.6-0~ubuntu-{{ ansible_distribution_release|lower }}", "1.13": "docker-engine=1.13.1-0~ubuntu-{{ ansible_distribution_release|lower }}", "17.03": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-engine=17.05.0~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "latest": "docker-engine", "stable": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}"}}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/docker/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml"}
ok: [node1] => (item=/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb {{ docker_apt_repo_base_url }} {{ ansible_distribution|lower }}-{{ ansible_distribution_release|lower }} main\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["58118E89F3A912897C070ADBF76221572C52609D"], "url": "{{ docker_apt_repo_gpgkey }}"}, "docker_versioned_pkg": {"1.11": "docker-engine=1.11.1-0~{{ ansible_distribution_release|lower }}", "1.12": "docker-engine=1.12.6-0~ubuntu-{{ ansible_distribution_release|lower }}", "1.13": "docker-engine=1.13.1-0~ubuntu-{{ ansible_distribution_release|lower }}", "17.03": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-engine=17.05.0~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "latest": "docker-engine", "stable": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}"}}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/docker/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml"}

TASK [docker : set dns server for docker] ***********************************************************************************************************
Friday 29 December 2017  05:48:20 +0000 (0:00:00.296)       0:00:24.640 ******* 
ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}

TASK [docker : set base docker dns facts] ***********************************************************************************************************
Friday 29 December 2017  05:48:20 +0000 (0:00:00.322)       0:00:24.962 ******* 
ok: [node2] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
ok: [node1] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}

TASK [docker : add upstream dns servers (only when dnsmasq is not used)] ****************************************************************************
Friday 29 December 2017  05:48:21 +0000 (0:00:00.324)       0:00:25.286 ******* 
ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}
ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false}

TASK [docker : add global searchdomains] ************************************************************************************************************
Friday 29 December 2017  05:48:21 +0000 (0:00:00.314)       0:00:25.601 ******* 
ok: [node1] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
ok: [node2] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}

TASK [docker : check system nameservers] ************************************************************************************************************
Friday 29 December 2017  05:48:21 +0000 (0:00:00.308)       0:00:25.909 ******* 
ok: [node3] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002842", "end": "2017-12-29 05:48:20.743502", "rc": 0, "start": "2017-12-29 05:48:20.740660", "stderr": "", "stderr_lines": [], "stdout": "8.8.8.8\n8.8.4.4", "stdout_lines": ["8.8.8.8", "8.8.4.4"]}
ok: [node2] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002365", "end": "2017-12-29 05:48:20.916484", "rc": 0, "start": "2017-12-29 05:48:20.914119", "stderr": "", "stderr_lines": [], "stdout": "8.8.8.8\n8.8.4.4", "stdout_lines": ["8.8.8.8", "8.8.4.4"]}
ok: [node1] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002883", "end": "2017-12-29 05:48:21.013035", "rc": 0, "start": "2017-12-29 05:48:21.010152", "stderr": "", "stderr_lines": [], "stdout": "8.8.8.8\n8.8.4.4", "stdout_lines": ["8.8.8.8", "8.8.4.4"]}

TASK [docker : check system search domains] *********************************************************************************************************
Friday 29 December 2017  05:48:22 +0000 (0:00:00.448)       0:00:26.358 ******* 
ok: [node3] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.003266", "end": "2017-12-29 05:48:21.151184", "rc": 0, "start": "2017-12-29 05:48:21.147918", "stderr": "", "stderr_lines": [], "stdout": "openstacklocal", "stdout_lines": ["openstacklocal"]}
ok: [node2] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.002844", "end": "2017-12-29 05:48:21.385837", "rc": 0, "start": "2017-12-29 05:48:21.382993", "stderr": "", "stderr_lines": [], "stdout": "openstacklocal", "stdout_lines": ["openstacklocal"]}
ok: [node1] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.002593", "end": "2017-12-29 05:48:21.451827", "rc": 0, "start": "2017-12-29 05:48:21.449234", "stderr": "", "stderr_lines": [], "stdout": "openstacklocal", "stdout_lines": ["openstacklocal"]}

TASK [docker : add system nameservers to docker options] ********************************************************************************************
Friday 29 December 2017  05:48:22 +0000 (0:00:00.439)       0:00:26.797 ******* 
ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "8.8.8.8", "8.8.4.4"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "8.8.8.8", "8.8.4.4"]}, "changed": false}
ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "8.8.8.8", "8.8.4.4"]}, "changed": false}

TASK [docker : add system search domains to docker options] *****************************************************************************************
Friday 29 December 2017  05:48:23 +0000 (0:00:00.326)       0:00:27.124 ******* 
ok: [node2] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "openstacklocal"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "openstacklocal"]}, "changed": false}
ok: [node1] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "openstacklocal"]}, "changed": false}

TASK [docker : check number of nameservers] *********************************************************************************************************
Friday 29 December 2017  05:48:23 +0000 (0:00:00.339)       0:00:27.464 ******* 

TASK [docker : rtrim number of nameservers to 3] ****************************************************************************************************
Friday 29 December 2017  05:48:23 +0000 (0:00:00.043)       0:00:27.508 ******* 

TASK [docker : check number of search domains] ******************************************************************************************************
Friday 29 December 2017  05:48:23 +0000 (0:00:00.042)       0:00:27.551 ******* 

TASK [docker : check length of search domains] ******************************************************************************************************
Friday 29 December 2017  05:48:23 +0000 (0:00:00.042)       0:00:27.594 ******* 

TASK [docker : check for minimum kernel version] ****************************************************************************************************
Friday 29 December 2017  05:48:23 +0000 (0:00:00.043)       0:00:27.637 ******* 

TASK [docker : ensure docker repository public key is installed] ************************************************************************************
Friday 29 December 2017  05:48:23 +0000 (0:00:00.039)       0:00:27.677 ******* 
ok: [node3] => (item=58118E89F3A912897C070ADBF76221572C52609D) => {"attempts": 1, "changed": false, "item": "58118E89F3A912897C070ADBF76221572C52609D"}
ok: [node2] => (item=58118E89F3A912897C070ADBF76221572C52609D) => {"attempts": 1, "changed": false, "item": "58118E89F3A912897C070ADBF76221572C52609D"}
ok: [node1] => (item=58118E89F3A912897C070ADBF76221572C52609D) => {"attempts": 1, "changed": false, "item": "58118E89F3A912897C070ADBF76221572C52609D"}

TASK [docker : ensure docker repository is enabled] *************************************************************************************************
Friday 29 December 2017  05:48:24 +0000 (0:00:00.685)       0:00:28.362 ******* 
ok: [node3] => (item=deb https://apt.dockerproject.org/repo ubuntu-xenial main
) => {"changed": false, "item": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "repo": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "state": "present"}
ok: [node2] => (item=deb https://apt.dockerproject.org/repo ubuntu-xenial main
) => {"changed": false, "item": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "repo": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "state": "present"}
ok: [node1] => (item=deb https://apt.dockerproject.org/repo ubuntu-xenial main
) => {"changed": false, "item": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "repo": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "state": "present"}

TASK [docker : Configure docker repository on RedHat/CentOS] ****************************************************************************************
Friday 29 December 2017  05:48:24 +0000 (0:00:00.699)       0:00:29.061 ******* 

TASK [docker : ensure docker packages are installed] ************************************************************************************************
Friday 29 December 2017  05:48:25 +0000 (0:00:00.040)       0:00:29.102 ******* 
ok: [node3] => (item={u'force': True, u'name': u'docker-engine=17.03.1~ce-0~ubuntu-xenial'}) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": {"force": true, "name": "docker-engine=17.03.1~ce-0~ubuntu-xenial"}}
ok: [node2] => (item={u'force': True, u'name': u'docker-engine=17.03.1~ce-0~ubuntu-xenial'}) => {"attempts": 1, "cache_update_time": 1514525141, "cache_updated": false, "changed": false, "item": {"force": true, "name": "docker-engine=17.03.1~ce-0~ubuntu-xenial"}}
ok: [node1] => (item={u'force': True, u'name': u'docker-engine=17.03.1~ce-0~ubuntu-xenial'}) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": {"force": true, "name": "docker-engine=17.03.1~ce-0~ubuntu-xenial"}}

TASK [docker : set fact for docker_version] *********************************************************************************************************
Friday 29 December 2017  05:48:25 +0000 (0:00:00.697)       0:00:29.799 ******* 
ok: [node1] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.014017", "end": "2017-12-29 05:48:24.793994", "rc": 0, "start": "2017-12-29 05:48:24.779977", "stderr": "", "stderr_lines": [], "stdout": "17.03.1-ce", "stdout_lines": ["17.03.1-ce"]}
ok: [node2] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.011415", "end": "2017-12-29 05:48:24.845708", "rc": 0, "start": "2017-12-29 05:48:24.834293", "stderr": "", "stderr_lines": [], "stdout": "17.03.1-ce", "stdout_lines": ["17.03.1-ce"]}
ok: [node3] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.010490", "end": "2017-12-29 05:48:24.690459", "rc": 0, "start": "2017-12-29 05:48:24.679969", "stderr": "", "stderr_lines": [], "stdout": "17.03.1-ce", "stdout_lines": ["17.03.1-ce"]}

TASK [docker : check minimum docker version for docker_dns mode. You need at least docker version >= 1.12 for resolvconf_mode=docker_dns] ***********
Friday 29 December 2017  05:48:26 +0000 (0:00:00.426)       0:00:30.226 ******* 

TASK [docker : Create docker service systemd directory if it doesn't exist] *************************************************************************
Friday 29 December 2017  05:48:26 +0000 (0:00:00.041)       0:00:30.267 ******* 
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4096, "state": "directory", "uid": 0}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4096, "state": "directory", "uid": 0}
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4096, "state": "directory", "uid": 0}

TASK [docker : Write docker proxy drop-in] **********************************************************************************************************
Friday 29 December 2017  05:48:26 +0000 (0:00:00.426)       0:00:30.693 ******* 

TASK [docker : get systemd version] *****************************************************************************************************************
Friday 29 December 2017  05:48:26 +0000 (0:00:00.041)       0:00:30.735 ******* 

TASK [docker : Write docker.service systemd file] ***************************************************************************************************
Friday 29 December 2017  05:48:26 +0000 (0:00:00.043)       0:00:30.778 ******* 
ok: [node3] => {"changed": false, "checksum": "860b79c32d9bf8a46a7167a7c7ee51cba9eb07e7", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 591, "state": "file", "uid": 0}
ok: [node2] => {"changed": false, "checksum": "860b79c32d9bf8a46a7167a7c7ee51cba9eb07e7", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 591, "state": "file", "uid": 0}
ok: [node1] => {"changed": false, "checksum": "860b79c32d9bf8a46a7167a7c7ee51cba9eb07e7", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 591, "state": "file", "uid": 0}

TASK [docker : Write docker options systemd drop-in] ************************************************************************************************
Friday 29 December 2017  05:48:27 +0000 (0:00:00.697)       0:00:31.475 ******* 
ok: [node1] => {"changed": false, "checksum": "0ad16aa2e450ad8037a3c98c14a9c6aaf43be722", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 158, "state": "file", "uid": 0}
ok: [node3] => {"changed": false, "checksum": "0ad16aa2e450ad8037a3c98c14a9c6aaf43be722", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 158, "state": "file", "uid": 0}
ok: [node2] => {"changed": false, "checksum": "0ad16aa2e450ad8037a3c98c14a9c6aaf43be722", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 158, "state": "file", "uid": 0}

TASK [docker : Write docker dns systemd drop-in] ****************************************************************************************************
Friday 29 December 2017  05:48:28 +0000 (0:00:00.692)       0:00:32.168 ******* 
ok: [node3] => {"changed": false, "checksum": "184aebc82d8f32a930b94076bcb88307e73e5201", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 268, "state": "file", "uid": 0}
ok: [node1] => {"changed": false, "checksum": "184aebc82d8f32a930b94076bcb88307e73e5201", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 268, "state": "file", "uid": 0}
ok: [node2] => {"changed": false, "checksum": "184aebc82d8f32a930b94076bcb88307e73e5201", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 268, "state": "file", "uid": 0}

TASK [docker : ensure docker service is started and enabled] ****************************************************************************************
Friday 29 December 2017  05:48:28 +0000 (0:00:00.690)       0:00:32.858 ******* 
ok: [node3] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:14:28 UTC", "ActiveEnterTimestampMonotonic": "11747813615", "ActiveExitTimestamp": "Thu 2017-12-28 11:14:25 UTC", "ActiveExitTimestampMonotonic": "11745680614", "ActiveState": "active", "After": "sysinit.target systemd-journald.socket network.target docker.socket system.slice basic.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:14:26 UTC", "AssertTimestampMonotonic": "11746697034", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "131041520728", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ConditionTimestampMonotonic": "11746697034", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x208.8.8.8\\x20--dns\\x208.8.4.4\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20openstacklocal\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "20828", "ExecMainStartTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ExecMainStartTimestampMonotonic": "11746708168", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:14:26 UTC] ; stop_time=[n/a] ; pid=20828 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:14:26 UTC", "InactiveEnterTimestampMonotonic": "11746694163", "InactiveExitTimestamp": "Thu 2017-12-28 11:14:26 UTC", "InactiveExitTimestampMonotonic": "11746708194", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "20828", "MemoryAccounting": "no", "MemoryCurrent": "1844580352", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "sysinit.target system.slice", "Restart": "on-abnormal", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:14:28 UTC", "StateChangeTimestampMonotonic": "11747813615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "21", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:14:28 UTC", "WatchdogTimestampMonotonic": "11747813614", "WatchdogUSec": "0"}}
ok: [node2] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:14:28 UTC", "ActiveEnterTimestampMonotonic": "11748379031", "ActiveExitTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ActiveExitTimestampMonotonic": "11746238519", "ActiveState": "active", "After": "network.target basic.target system.slice sysinit.target docker.socket systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:14:27 UTC", "AssertTimestampMonotonic": "11747252402", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "138815837592", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ConditionTimestampMonotonic": "11747252401", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x208.8.8.8\\x20--dns\\x208.8.4.4\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20openstacklocal\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "20784", "ExecMainStartTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ExecMainStartTimestampMonotonic": "11747260177", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:14:27 UTC] ; stop_time=[n/a] ; pid=20784 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveEnterTimestampMonotonic": "11747250465", "InactiveExitTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveExitTimestampMonotonic": "11747260211", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "20784", "MemoryAccounting": "no", "MemoryCurrent": "1844490240", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "sysinit.target system.slice", "Restart": "on-abnormal", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:14:28 UTC", "StateChangeTimestampMonotonic": "11748379031", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "22", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:14:28 UTC", "WatchdogTimestampMonotonic": "11748379030", "WatchdogUSec": "0"}}
ok: [node1] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:14:28 UTC", "ActiveEnterTimestampMonotonic": "11750578084", "ActiveExitTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ActiveExitTimestampMonotonic": "11748443756", "ActiveState": "active", "After": "network.target systemd-journald.socket docker.socket basic.target system.slice sysinit.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:14:27 UTC", "AssertTimestampMonotonic": "11749460513", "Before": "etcd.service shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "147571016825", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ConditionTimestampMonotonic": "11749460513", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x208.8.8.8\\x20--dns\\x208.8.4.4\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20openstacklocal\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "20839", "ExecMainStartTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ExecMainStartTimestampMonotonic": "11749472130", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveEnterTimestampMonotonic": "11749458467", "InactiveExitTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveExitTimestampMonotonic": "11749472171", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "20839", "MemoryAccounting": "no", "MemoryCurrent": "1853849600", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice sysinit.target", "Restart": "on-abnormal", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:14:28 UTC", "StateChangeTimestampMonotonic": "11750578084", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "33", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:14:28 UTC", "WatchdogTimestampMonotonic": "11750578083", "WatchdogUSec": "0"}}

TASK [rkt : gather os specific variables for rkt] ***************************************************************************************************
Friday 29 December 2017  05:48:29 +0000 (0:00:00.526)       0:00:33.385 ******* 

TASK [rkt : install rkt pkg on ubuntu] **************************************************************************************************************
Friday 29 December 2017  05:48:29 +0000 (0:00:00.052)       0:00:33.437 ******* 

TASK [rkt : install rkt pkg on centos] **************************************************************************************************************
Friday 29 December 2017  05:48:29 +0000 (0:00:00.044)       0:00:33.482 ******* 

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:29 +0000 (0:00:00.040)       0:00:33.522 ******* 
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017  05:48:29 +0000 (0:00:00.375)       0:00:33.898 ******* 
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ubuntu", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 1000}
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ubuntu", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 1000}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ubuntu", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 1000}

TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017  05:48:30 +0000 (0:00:00.423)       0:00:34.321 ******* 

TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017  05:48:30 +0000 (0:00:00.021)       0:00:34.342 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_file.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:31 +0000 (0:00:01.228)       0:00:35.570 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:31 +0000 (0:00:00.146)       0:00:35.716 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:32 +0000 (0:00:00.472)       0:00:36.189 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.1"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.1"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.1"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:32 +0000 (0:00:00.492)       0:00:36.682 ******* 
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:33 +0000 (0:00:00.426)       0:00:37.108 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:33 +0000 (0:00:00.360)       0:00:37.469 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:33 +0000 (0:00:00.065)       0:00:37.534 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:33 +0000 (0:00:00.019)       0:00:37.554 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:33 +0000 (0:00:00.068)       0:00:37.623 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:33 +0000 (0:00:00.147)       0:00:37.770 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:34 +0000 (0:00:00.346)       0:00:38.116 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/hyperkube:v1.9.0_coreos.0"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/hyperkube:v1.9.0_coreos.0"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/hyperkube:v1.9.0_coreos.0"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:34 +0000 (0:00:00.373)       0:00:38.490 ******* 
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:34 +0000 (0:00:00.442)       0:00:38.933 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:35 +0000 (0:00:00.348)       0:00:39.281 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:35 +0000 (0:00:00.063)       0:00:39.345 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:35 +0000 (0:00:00.019)       0:00:39.365 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:35 +0000 (0:00:00.063)       0:00:39.429 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:35 +0000 (0:00:00.141)       0:00:39.570 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:35 +0000 (0:00:00.337)       0:00:39.908 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.4"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.4"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.4"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:36 +0000 (0:00:00.428)       0:00:40.337 ******* 
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:36 +0000 (0:00:00.505)       0:00:40.842 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:37 +0000 (0:00:00.433)       0:00:41.276 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:37 +0000 (0:00:00.065)       0:00:41.341 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:37 +0000 (0:00:00.021)       0:00:41.363 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:37 +0000 (0:00:00.059)       0:00:41.422 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:37 +0000 (0:00:00.141)       0:00:41.564 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:37 +0000 (0:00:00.359)       0:00:41.923 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.1"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.1"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.1"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:38 +0000 (0:00:00.374)       0:00:42.298 ******* 
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:38 +0000 (0:00:00.442)       0:00:42.740 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:39 +0000 (0:00:00.355)       0:00:43.095 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:39 +0000 (0:00:00.062)       0:00:43.158 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:39 +0000 (0:00:00.019)       0:00:43.178 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:39 +0000 (0:00:00.068)       0:00:43.246 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:39 +0000 (0:00:00.141)       0:00:43.387 ******* 
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:39 +0000 (0:00:00.337)       0:00:43.724 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.2"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.2"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.2"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:39 +0000 (0:00:00.344)       0:00:44.068 ******* 
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:40 +0000 (0:00:00.445)       0:00:44.514 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:40 +0000 (0:00:00.348)       0:00:44.862 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:40 +0000 (0:00:00.063)       0:00:44.926 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:40 +0000 (0:00:00.020)       0:00:44.947 ******* 

TASK [download : file_download | Downloading...] ****************************************************************************************************
Friday 29 December 2017  05:48:40 +0000 (0:00:00.054)       0:00:45.001 ******* 
ok: [node3] => {
    "msg": [
        "URL: https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux", 
        "Dest: istio/istioctl"
    ]
}
ok: [node2] => {
    "msg": [
        "URL: https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux", 
        "Dest: istio/istioctl"
    ]
}
ok: [node1] => {
    "msg": [
        "URL: https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux", 
        "Dest: istio/istioctl"
    ]
}

TASK [download : file_download | Create dest directory] *********************************************************************************************
Friday 29 December 2017  05:48:41 +0000 (0:00:00.351)       0:00:45.353 ******* 
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/istio", "size": 4096, "state": "directory", "uid": 0}
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/istio", "size": 4096, "state": "directory", "uid": 0}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/istio", "size": 4096, "state": "directory", "uid": 0}

TASK [download : file_download | Download item] *****************************************************************************************************
Friday 29 December 2017  05:48:41 +0000 (0:00:00.459)       0:00:45.812 ******* 
ok: [node3] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/istio/istioctl", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 38262799, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux"}
ok: [node2] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/istio/istioctl", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 38262799, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux"}
ok: [node1] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/istio/istioctl", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 38262799, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux"}

TASK [download : file_download | Extract archives] **************************************************************************************************
Friday 29 December 2017  05:48:42 +0000 (0:00:00.729)       0:00:46.542 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:42 +0000 (0:00:00.061)       0:00:46.604 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:42 +0000 (0:00:00.144)       0:00:46.748 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:43 +0000 (0:00:00.337)       0:00:47.086 ******* 
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:43 +0000 (0:00:00.340)       0:00:47.427 ******* 
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:43 +0000 (0:00:00.427)       0:00:47.854 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:44 +0000 (0:00:00.351)       0:00:48.205 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:44 +0000 (0:00:00.066)       0:00:48.272 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:44 +0000 (0:00:00.020)       0:00:48.293 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:44 +0000 (0:00:00.068)       0:00:48.361 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:44 +0000 (0:00:00.146)       0:00:48.508 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:44 +0000 (0:00:00.368)       0:00:48.877 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:45 +0000 (0:00:00.352)       0:00:49.230 ******* 
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:45 +0000 (0:00:00.441)       0:00:49.671 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:45 +0000 (0:00:00.348)       0:00:50.019 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:46 +0000 (0:00:00.065)       0:00:50.085 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:46 +0000 (0:00:00.019)       0:00:50.104 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:46 +0000 (0:00:00.061)       0:00:50.166 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:46 +0000 (0:00:00.146)       0:00:50.313 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:46 +0000 (0:00:00.344)       0:00:50.657 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "lachlanevenson/k8s-helm:v2.7.2"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "lachlanevenson/k8s-helm:v2.7.2"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "lachlanevenson/k8s-helm:v2.7.2"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:46 +0000 (0:00:00.338)       0:00:50.996 ******* 
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:47 +0000 (0:00:00.429)       0:00:51.425 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:47 +0000 (0:00:00.359)       0:00:51.784 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:47 +0000 (0:00:00.063)       0:00:51.848 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:47 +0000 (0:00:00.019)       0:00:51.868 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:47 +0000 (0:00:00.060)       0:00:51.928 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:47 +0000 (0:00:00.143)       0:00:52.072 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:48 +0000 (0:00:00.359)       0:00:52.432 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/kubernetes-helm/tiller:v2.7.2"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/kubernetes-helm/tiller:v2.7.2"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/kubernetes-helm/tiller:v2.7.2"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:48 +0000 (0:00:00.353)       0:00:52.786 ******* 
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:49 +0000 (0:00:00.429)       0:00:53.215 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:49 +0000 (0:00:00.351)       0:00:53.567 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:49 +0000 (0:00:00.064)       0:00:53.631 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:49 +0000 (0:00:00.019)       0:00:53.651 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:49 +0000 (0:00:00.060)       0:00:53.712 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:49 +0000 (0:00:00.142)       0:00:53.854 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:50 +0000 (0:00:00.348)       0:00:54.203 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:50 +0000 (0:00:00.349)       0:00:54.553 ******* 
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:51 +0000 (0:00:00.536)       0:00:55.089 ******* 
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:51 +0000 (0:00:00.445)       0:00:55.535 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:51 +0000 (0:00:00.064)       0:00:55.599 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:51 +0000 (0:00:00.020)       0:00:55.619 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:51 +0000 (0:00:00.059)       0:00:55.679 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:51 +0000 (0:00:00.140)       0:00:55.820 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:52 +0000 (0:00:00.509)       0:00:56.329 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.0"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.0"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.0"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:52 +0000 (0:00:00.522)       0:00:56.851 ******* 
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:53 +0000 (0:00:00.459)       0:00:57.311 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:53 +0000 (0:00:00.500)       0:00:57.812 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:53 +0000 (0:00:00.067)       0:00:57.879 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:53 +0000 (0:00:00.021)       0:00:57.901 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:53 +0000 (0:00:00.068)       0:00:57.969 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:54 +0000 (0:00:00.144)       0:00:58.114 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:54 +0000 (0:00:00.360)       0:00:58.474 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:54 +0000 (0:00:00.515)       0:00:58.990 ******* 
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:55 +0000 (0:00:00.576)       0:00:59.567 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:55 +0000 (0:00:00.486)       0:01:00.053 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:56 +0000 (0:00:00.067)       0:01:00.120 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:56 +0000 (0:00:00.022)       0:01:00.143 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:56 +0000 (0:00:00.060)       0:01:00.203 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:56 +0000 (0:00:00.152)       0:01:00.355 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:56 +0000 (0:00:00.518)       0:01:00.874 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/routereflector:v0.4.0"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/routereflector:v0.4.0"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/routereflector:v0.4.0"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:57 +0000 (0:00:00.507)       0:01:01.382 ******* 
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:57 +0000 (0:00:00.580)       0:01:01.963 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:48:58 +0000 (0:00:00.515)       0:01:02.479 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:48:58 +0000 (0:00:00.065)       0:01:02.544 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:48:58 +0000 (0:00:00.019)       0:01:02.564 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:48:58 +0000 (0:00:00.063)       0:01:02.627 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:58 +0000 (0:00:00.150)       0:01:02.777 ******* 
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:48:59 +0000 (0:00:00.548)       0:01:03.326 ******* 
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "busybox:latest"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "busybox:latest"}, "changed": false}
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "busybox:latest"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:48:59 +0000 (0:00:00.380)       0:01:03.707 ******* 
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:49:00 +0000 (0:00:00.439)       0:01:04.147 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:49:00 +0000 (0:00:00.367)       0:01:04.514 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:49:00 +0000 (0:00:00.066)       0:01:04.581 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:49:00 +0000 (0:00:00.020)       0:01:04.602 ******* 

TASK [download : container_download | Make download decision if pull is required by tag or sha256] **************************************************
Friday 29 December 2017  05:49:00 +0000 (0:00:00.065)       0:01:04.668 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:49:00 +0000 (0:00:00.145)       0:01:04.813 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:49:01 +0000 (0:00:00.375)       0:01:05.189 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7"}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7"}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7"}, "changed": false}

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:49:01 +0000 (0:00:00.346)       0:01:05.535 ******* 
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"}

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:49:01 +0000 (0:00:00.442)       0:01:05.978 ******* 
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false}

TASK [download : Check the local digest sha256 corresponds to the given image tag] ******************************************************************
Friday 29 December 2017  05:49:02 +0000 (0:00:00.398)       0:01:06.376 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************
Friday 29 December 2017  05:49:02 +0000 (0:00:00.067)       0:01:06.444 ******* 

TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ***********************************
Friday 29 December 2017  05:49:02 +0000 (0:00:00.024)       0:01:06.468 ******* 

TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017  05:49:02 +0000 (0:00:00.052)       0:01:06.520 ******* 
included: /home/ubuntu/kubespray/roles/download/tasks/sync_container.yml for node2, node3, node1

TASK [download : set_fact] **************************************************************************************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.816)       0:01:07.336 ******* 

TASK [download : container_download | Set default value for 'container_changed' to false] ***********************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.027)       0:01:07.364 ******* 

TASK [download : container_download | Update the 'container_changed' fact] **************************************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.051)       0:01:07.415 ******* 

TASK [download : container_download | Stat saved container image] ***********************************************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.056)       0:01:07.471 ******* 

TASK [download : container_download | save container images] ****************************************************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.036)       0:01:07.508 ******* 

TASK [download : container_download | copy container images to ansible host] ************************************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.030)       0:01:07.539 ******* 

TASK [download : container_download | upload container images to nodes] *****************************************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.030)       0:01:07.569 ******* 

TASK [download : container_download | load container images] ****************************************************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.056)       0:01:07.626 ******* 

PLAY [etcd:k8s-cluster:vault:calico-rr] *************************************************************************************************************

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.188)       0:01:07.814 ******* 

TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.046)       0:01:07.861 ******* 

TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.044)       0:01:07.905 ******* 

TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017  05:49:03 +0000 (0:00:00.020)       0:01:07.925 ******* 

TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017  05:49:04 +0000 (0:00:00.553)       0:01:08.478 ******* 

TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017  05:49:04 +0000 (0:00:00.536)       0:01:09.015 ******* 

TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017  05:49:04 +0000 (0:00:00.044)       0:01:09.059 ******* 

TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.042)       0:01:09.101 ******* 

TASK [vault : stop vault-temp container] ************************************************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.046)       0:01:09.148 ******* 

TASK [vault : check_vault | Attempt to pull local https Vault health] *******************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.041)       0:01:09.190 ******* 

TASK [vault : check_vault | Set facts about local Vault health] *************************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.046)       0:01:09.236 ******* 

TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] ****************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.045)       0:01:09.282 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.024)       0:01:09.306 ******* 

TASK [vault : bootstrap/sync_secrets | Set fact based on sync_file_results] *************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.069)       0:01:09.376 ******* 

TASK [vault : bootstrap/sync_secrets | Reset sync_file_results to avoid variable bleed] *************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.037)       0:01:09.413 ******* 

TASK [vault : bootstrap/sync_secrets | Print out warning message if secrets are not available and vault is initialized] *****************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.047)       0:01:09.461 ******* 

TASK [vault : bootstrap/sync_secrets | Cat root_token from a vault host] ****************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.022)       0:01:09.483 ******* 

TASK [vault : bootstrap/sync_secrets | Cat unseal_keys from a vault host] ***************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.043)       0:01:09.526 ******* 

TASK [vault : bootstrap/sync_secrets | Set needed facts for Vault API interaction when Vault is already running] ************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.046)       0:01:09.573 ******* 

TASK [vault : bootstrap/sync_secrets | Update vault_headers if we have the root_token] **************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.044)       0:01:09.617 ******* 

TASK [vault : find_leader | Find the current http Vault leader] *************************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.045)       0:01:09.662 ******* 

TASK [vault : find_leader | Set fact for current http leader] ***************************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.041)       0:01:09.704 ******* 

TASK [vault : find_leader| show vault_leader_url] ***************************************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.054)       0:01:09.758 ******* 

TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.044)       0:01:09.803 ******* 

TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.049)       0:01:09.853 ******* 

TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.044)       0:01:09.898 ******* 

TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.047)       0:01:09.945 ******* 

TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.064)       0:01:10.010 ******* 

TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017  05:49:05 +0000 (0:00:00.050)       0:01:10.061 ******* 

TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.053)       0:01:10.114 ******* 

TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.063)       0:01:10.177 ******* 

TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.057)       0:01:10.235 ******* 

TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.074)       0:01:10.309 ******* 

TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.060)       0:01:10.370 ******* 

TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.070)       0:01:10.441 ******* 

TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.053)       0:01:10.495 ******* 

TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.061)       0:01:10.557 ******* 

TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.066)       0:01:10.623 ******* 

TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.066)       0:01:10.690 ******* 

TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.053)       0:01:10.744 ******* 

TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.048)       0:01:10.792 ******* 

TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.051)       0:01:10.844 ******* 

TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.075)       0:01:10.919 ******* 

TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.063)       0:01:10.983 ******* 

TASK [vault : bootstrap/sync_vault_certs | Set facts for vault sync_file results] *******************************************************************
Friday 29 December 2017  05:49:06 +0000 (0:00:00.061)       0:01:11.044 ******* 

TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after ca.pem sync] ***************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.057)       0:01:11.102 ******* 

TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.054)       0:01:11.157 ******* 

TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.049)       0:01:11.206 ******* 

TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.047)       0:01:11.253 ******* 

TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.051)       0:01:11.304 ******* 

TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.049)       0:01:11.354 ******* 

TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.047)       0:01:11.402 ******* 

TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.050)       0:01:11.452 ******* 

TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.052)       0:01:11.504 ******* 

TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.044)       0:01:11.549 ******* 

TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.045)       0:01:11.594 ******* 

TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.047)       0:01:11.641 ******* 

TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.046)       0:01:11.688 ******* 

TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.045)       0:01:11.733 ******* 

TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.050)       0:01:11.784 ******* 

TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.046)       0:01:11.831 ******* 

TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.063)       0:01:11.895 ******* 

TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.048)       0:01:11.943 ******* 

TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017  05:49:07 +0000 (0:00:00.069)       0:01:12.013 ******* 

TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.063)       0:01:12.076 ******* 

TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.052)       0:01:12.129 ******* 

TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.047)       0:01:12.177 ******* 

TASK [vault : bootstrap/sync_vault_certs | Set fact if Vault's API cert is needed] ******************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.045)       0:01:12.222 ******* 

TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after api.pem sync] **************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.041)       0:01:12.264 ******* 

TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.043)       0:01:12.307 ******* 

TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.047)       0:01:12.354 ******* 

TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.048)       0:01:12.403 ******* 

TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.045)       0:01:12.449 ******* 

TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.045)       0:01:12.495 ******* 

TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.052)       0:01:12.548 ******* 

TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.068)       0:01:12.616 ******* 

TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.085)       0:01:12.701 ******* 

TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.047)       0:01:12.748 ******* 

TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.046)       0:01:12.795 ******* 

TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.049)       0:01:12.844 ******* 

TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.053)       0:01:12.897 ******* 

TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.044)       0:01:12.942 ******* 

TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.048)       0:01:12.990 ******* 

TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017  05:49:08 +0000 (0:00:00.047)       0:01:13.038 ******* 

TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.049)       0:01:13.087 ******* 

TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.046)       0:01:13.134 ******* 

TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.051)       0:01:13.185 ******* 

TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.048)       0:01:13.233 ******* 

TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.055)       0:01:13.289 ******* 

TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.050)       0:01:13.339 ******* 

TASK [vault : bootstrap/sync_etcd_certs | Set facts for etcd sync_file results] *********************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.045)       0:01:13.385 ******* 

TASK [vault : bootstrap/sync_etcd_certs | Unset sync_file_results after ca.pem sync] ****************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.041)       0:01:13.427 ******* 

TASK [vault : bootstrap/start_vault_temp | Ensure vault-temp isn't already running] *****************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.044)       0:01:13.471 ******* 

TASK [vault : bootstrap/start_vault_temp | Start single node Vault with file backend] ***************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.046)       0:01:13.517 ******* 

TASK [vault : bootstrap/start_vault_temp | Start again single node Vault with file backend] *********************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.046)       0:01:13.563 ******* 

TASK [vault : bootstrap/start_vault_temp | Initialize vault-temp] ***********************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.046)       0:01:13.609 ******* 

TASK [vault : bootstrap/start_vault_temp | Set needed vault facts] **********************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.045)       0:01:13.655 ******* 

TASK [vault : bootstrap/start_vault_temp | Unseal vault-temp] ***************************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.048)       0:01:13.704 ******* 

TASK [vault : vault | Set fact about vault leader url] **********************************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.036)       0:01:13.741 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.043)       0:01:13.784 ******* 

TASK [vault : shared/auth_backend | Test if the auth backend exists] ********************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.060)       0:01:13.845 ******* 

TASK [vault : shared/auth_backend | Add the cert auth backend if needed] ****************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.043)       0:01:13.889 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.042)       0:01:13.932 ******* 

TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/vault/ssl exists] *****************************************************************************
Friday 29 December 2017  05:49:09 +0000 (0:00:00.100)       0:01:14.033 ******* 

TASK [vault : bootstrap/gen_ca | Generate vault root CA] ********************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.059)       0:01:14.093 ******* 

TASK [vault : bootstrap/gen_ca | Copy vault root CA cert locally] ***********************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.033)       0:01:14.126 ******* 

TASK [vault : bootstrap/gen_ca | Copy vault root CA key locally] ************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.055)       0:01:14.182 ******* 

TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/ssl/etcd/ssl exists] **************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.057)       0:01:14.239 ******* 

TASK [vault : bootstrap/gen_ca | Generate etcd root CA] *********************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.060)       0:01:14.300 ******* 

TASK [vault : bootstrap/gen_ca | Copy etcd root CA cert locally] ************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.035)       0:01:14.336 ******* 

TASK [vault : bootstrap/gen_ca | Copy etcd root CA key locally] *************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.057)       0:01:14.393 ******* 

TASK [vault : issue_cert | Ensure target directory exists] ******************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.043)       0:01:14.436 ******* 

TASK [vault : issue_cert | Read in the local credentials] *******************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.051)       0:01:14.488 ******* 

TASK [vault : gen_certs_vault | Set facts for read Vault Creds] *************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.027)       0:01:14.515 ******* 

TASK [vault : gen_certs_vault | Log into Vault and obtain an token] *********************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.025)       0:01:14.541 ******* 

TASK [vault : gen_certs_vault | Set fact for vault_client_token] ************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.022)       0:01:14.563 ******* 

TASK [vault : gen_certs_vault | Set fact for Vault API token] ***************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.023)       0:01:14.587 ******* 

TASK [vault : issue_cert | Generate /etc/vault/ssl/api.pem for vault role] **************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.039)       0:01:14.627 ******* 

TASK [vault : issue_cert | Copy /etc/vault/ssl/api.pem cert to all hosts] ***************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.026)       0:01:14.653 ******* 

TASK [vault : issue_cert | Copy key for /etc/vault/ssl/api.pem to all hosts] ************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.048)       0:01:14.701 ******* 

TASK [vault : issue_cert | Copy issuing CA cert] ****************************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.048)       0:01:14.750 ******* 

TASK [vault : issue_cert | Copy certificate serial to all hosts] ************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.049)       0:01:14.800 ******* 

TASK [vault : bootstrap/ca_trust | pull CA from cert from {{groups.vault|first}}] *******************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.054)       0:01:14.854 ******* 

TASK [vault : bootstrap/ca_trust | target ca-certificate store file] ********************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.058)       0:01:14.913 ******* 

TASK [vault : bootstrap/ca_trust | add CA to trusted CA dir] ****************************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.043)       0:01:14.956 ******* 

TASK [vault : bootstrap/ca_trust | update ca-certificates (Debian/Ubuntu/CoreOS)] *******************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.045)       0:01:15.001 ******* 

TASK [vault : bootstrap/ca_trust | update ca-certificates (RedHat)] *********************************************************************************
Friday 29 December 2017  05:49:10 +0000 (0:00:00.044)       0:01:15.046 ******* 

TASK [vault : stop vault-temp container] ************************************************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.042)       0:01:15.089 ******* 

TASK [vault : check_vault | Attempt to pull local https Vault health] *******************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.049)       0:01:15.139 ******* 

TASK [vault : check_vault | Set facts about local Vault health] *************************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.042)       0:01:15.181 ******* 

TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] ****************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.046)       0:01:15.227 ******* 

TASK [vault : check_etcd | Check if etcd is up and reachable] ***************************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.030)       0:01:15.257 ******* 

TASK [vault : check_etcd | Set fact based off the etcd_health_check response] ***********************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.021)       0:01:15.279 ******* 

TASK [vault : set_fact] *****************************************************************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.057)       0:01:15.337 ******* 

TASK [vault : check_etcd | Fail if etcd is not available and needed] ********************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.049)       0:01:15.387 ******* 

TASK [vault : cluster/configure | Ensure the vault/config directory exists] *************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.078)       0:01:15.465 ******* 

TASK [vault : cluster/configure | Lay down the configuration file] **********************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.047)       0:01:15.512 ******* 

TASK [vault : cluster/binary | Copy vault binary from downloaddir] **********************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.046)       0:01:15.559 ******* 

TASK [vault : cluster/systemd | Ensure mount points exist prior to vault.service startup] ***********************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.048)       0:01:15.608 ******* 

TASK [vault : cluster/systemd | Ensure the vault user has access to needed directories] *************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.110)       0:01:15.718 ******* 

TASK [vault : cluster/systemd | Copy down vault.service systemd file] *******************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.081)       0:01:15.799 ******* 

TASK [vault : Create vault service systemd directory] ***********************************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.044)       0:01:15.844 ******* 

TASK [vault : cluster/systemd | Add vault proxy env vars] *******************************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.041)       0:01:15.885 ******* 

TASK [vault : cluster/systemd | Enable vault.service] ***********************************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.051)       0:01:15.936 ******* 

TASK [vault : cluster/systemd | Query local vault until service is up] ******************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.046)       0:01:15.983 ******* 

TASK [vault : cluster/init | Initialize Vault] ******************************************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.044)       0:01:16.027 ******* 

TASK [vault : cluster/init | Set facts on the results of the initialization] ************************************************************************
Friday 29 December 2017  05:49:11 +0000 (0:00:00.041)       0:01:16.069 ******* 

TASK [vault : cluster/init | Ensure all hosts have these facts] *************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.044)       0:01:16.114 ******* 

TASK [vault : cluster/init | Ensure the vault_secrets_dir exists] ***********************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.042)       0:01:16.156 ******* 

TASK [vault : cluster/init | Ensure all in groups.vault have the unseal_keys locally] ***************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.046)       0:01:16.202 ******* 

TASK [vault : cluster/init | Ensure all in groups.vault have the root_token locally] ****************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.042)       0:01:16.245 ******* 

TASK [vault : cluster/init | Ensure vault_headers and vault statuses are updated] *******************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.048)       0:01:16.293 ******* 

TASK [vault : cluster/unseal | Current sealed state] ************************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.044)       0:01:16.337 ******* 

TASK [vault : cluster/unseal | Unseal Vault] ********************************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.050)       0:01:16.388 ******* 

TASK [vault : cluster/unseal | Wait until server is ready] ******************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.038)       0:01:16.426 ******* 

TASK [vault : find_leader | Find the current http Vault leader] *************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.044)       0:01:16.470 ******* 

TASK [vault : find_leader | Set fact for current http leader] ***************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.047)       0:01:16.518 ******* 

TASK [vault : find_leader| show vault_leader_url] ***************************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.045)       0:01:16.563 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.046)       0:01:16.610 ******* 

TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/kubernetes/ssl exists] ************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.131)       0:01:16.741 ******* 

TASK [vault : bootstrap/gen_ca | Generate kube root CA] *********************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.060)       0:01:16.802 ******* 

TASK [vault : bootstrap/gen_ca | Copy kube root CA cert locally] ************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.034)       0:01:16.836 ******* 

TASK [vault : bootstrap/gen_ca | Copy kube root CA key locally] *************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.053)       0:01:16.890 ******* 

TASK [vault : shared/auth_backend | Test if the auth backend exists] ********************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.045)       0:01:16.936 ******* 

TASK [vault : shared/auth_backend | Add the cert auth backend if needed] ****************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.045)       0:01:16.981 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:12 +0000 (0:00:00.044)       0:01:17.026 ******* 

PLAY [etcd] *****************************************************************************************************************************************

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:49:13 +0000 (0:00:00.135)       0:01:17.161 ******* 

TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017  05:49:13 +0000 (0:00:00.020)       0:01:17.182 ******* 

TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017  05:49:13 +0000 (0:00:00.022)       0:01:17.205 ******* 

TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017  05:49:13 +0000 (0:00:00.021)       0:01:17.226 ******* 

TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017  05:49:13 +0000 (0:00:00.430)       0:01:17.657 ******* 

TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017  05:49:13 +0000 (0:00:00.401)       0:01:18.058 ******* 
ok: [node1] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}

TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017  05:49:14 +0000 (0:00:00.063)       0:01:18.122 ******* 
ok: [node1] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}

TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017  05:49:14 +0000 (0:00:00.179)       0:01:18.301 ******* 
ok: [node1] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}

TASK [etcd : Check_certs | check if all certs have already been generated on first master] **********************************************************
Friday 29 December 2017  05:49:14 +0000 (0:00:00.214)       0:01:18.516 ******* 
ok: [node1 -> None] => {"changed": false, "examined": 12, "files": [{"atime": 1514459947.704, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459950.54, "checksum": "3bb643c8ddf9ee0b6baaf93805fc63962e5cf57e", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522183, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.196, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "ade3addf27f16aa19093dc3aac030a108d76ef6c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522180, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.152, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "fb8aa806ecc6efa79cce6da17faf99b38d8eb876", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522177, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.88, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "b723851efff5c870f12425122562b9ba747e96fc", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522175, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.868, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514460475.756, "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "0b9f2c142df29f8d45fba6086eca19790b90760c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522178, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.144, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}], "matched": 7, "msg": ""}

TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] **************************************
Friday 29 December 2017  05:49:14 +0000 (0:00:00.277)       0:01:18.793 ******* 
ok: [node1] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}

TASK [etcd : Check certs | check if a cert already exists on node] **********************************************************************************
Friday 29 December 2017  05:49:14 +0000 (0:00:00.071)       0:01:18.864 ******* 
ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459947.704, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "727116751", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"atime": 1514460475.756, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "b39f11dab64683147f180e645aa7f322", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "version": "727116765", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}

TASK [etcd : Check_certs | Set 'gen_certs' to true] *************************************************************************************************
Friday 29 December 2017  05:49:15 +0000 (0:00:00.356)       0:01:19.221 ******* 

TASK [etcd : Check_certs | Set 'gen_node_certs' to true] ********************************************************************************************
Friday 29 December 2017  05:49:15 +0000 (0:00:00.066)       0:01:19.288 ******* 
ok: [node1] => {"ansible_facts": {"gen_node_certs": {"node1": false, "node2": false, "node3": false}}, "changed": false}

TASK [etcd : Check_certs | Set 'sync_certs' to true] ************************************************************************************************
Friday 29 December 2017  05:49:15 +0000 (0:00:00.073)       0:01:19.361 ******* 

TASK [etcd : include] *******************************************************************************************************************************
Friday 29 December 2017  05:49:15 +0000 (0:00:00.038)       0:01:19.400 ******* 
included: /home/ubuntu/kubespray/roles/etcd/tasks/gen_certs_script.yml for node1

TASK [etcd : Gen_certs | create etcd cert dir] ******************************************************************************************************
Friday 29 December 2017  05:49:15 +0000 (0:00:00.091)       0:01:19.491 ******* 
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}

TASK [etcd : Gen_certs | create etcd script dir (on node1)] *****************************************************************************************
Friday 29 December 2017  05:49:15 +0000 (0:00:00.181)       0:01:19.673 ******* 
ok: [node1 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 4096, "state": "directory", "uid": 0}

TASK [etcd : Gen_certs | create etcd cert dir (on node1)] *******************************************************************************************
Friday 29 December 2017  05:49:15 +0000 (0:00:00.180)       0:01:19.853 ******* 
ok: [node1 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}

TASK [etcd : Gen_certs | write openssl config] ******************************************************************************************************
Friday 29 December 2017  05:49:15 +0000 (0:00:00.183)       0:01:20.037 ******* 

TASK [etcd : Gen_certs | copy certs generation script] **********************************************************************************************
Friday 29 December 2017  05:49:15 +0000 (0:00:00.029)       0:01:20.067 ******* 

TASK [etcd : Gen_certs | run cert generation script] ************************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.026)       0:01:20.094 ******* 

TASK [etcd : set_fact] ******************************************************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.021)       0:01:20.115 ******* 
ok: [node1] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "my_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem"]}, "changed": false}

TASK [etcd : Gen_certs | Gather etcd master certs] **************************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.078)       0:01:20.194 ******* 

TASK [etcd : Gen_certs | Gather etcd node certs] ****************************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.027)       0:01:20.222 ******* 

TASK [etcd : Gen_certs | Prepare tempfile for unpacking certs] **************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.023)       0:01:20.245 ******* 

TASK [etcd : Gen_certs | Write master certs to tempfile] ********************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.022)       0:01:20.267 ******* 

TASK [etcd : Gen_certs | Unpack certs on masters] ***************************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.020)       0:01:20.288 ******* 

TASK [etcd : Gen_certs | Cleanup tempfile] **********************************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.021)       0:01:20.309 ******* 

TASK [etcd : Gen_certs | Copy certs on nodes] *******************************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.021)       0:01:20.331 ******* 

TASK [etcd : Gen_certs | check certificate permissions] *********************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.021)       0:01:20.352 ******* 
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}

TASK [etcd : Gen_certs | target ca-certificate store file] ******************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.177)       0:01:20.530 ******* 
ok: [node1] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}

TASK [etcd : Gen_certs | add CA to trusted CA dir] **************************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.069)       0:01:20.599 ******* 
ok: [node1] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}

TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/Container Linux by CoreOS)] **********************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.255)       0:01:20.855 ******* 

TASK [etcd : Gen_certs | update ca-certificates (RedHat)] *******************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.022)       0:01:20.877 ******* 

TASK [etcd : Gen_certs | Get etcd certificate serials] **********************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.020)       0:01:20.897 ******* 
ok: [node1] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.005227", "end": "2017-12-29 05:49:15.729069", "rc": 0, "start": "2017-12-29 05:49:15.723842", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823963", "stdout_lines": ["B13862C721823963"]}

TASK [etcd : Set etcd_client_cert_serial] ***********************************************************************************************************
Friday 29 December 2017  05:49:16 +0000 (0:00:00.176)       0:01:21.074 ******* 
ok: [node1] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823963"}, "changed": false}

TASK [etcd : include] *******************************************************************************************************************************
Friday 29 December 2017  05:49:17 +0000 (0:00:00.068)       0:01:21.143 ******* 
included: /home/ubuntu/kubespray/roles/etcd/tasks/install_docker.yml for node1

TASK [etcd : Install | Copy etcdctl binary from docker container] ***********************************************************************************
Friday 29 December 2017  05:49:17 +0000 (0:00:00.055)       0:01:21.198 ******* 
ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["sh", "-c", "/usr/bin/docker rm -f etcdctl-binarycopy; /usr/bin/docker create --name etcdctl-binarycopy quay.io/coreos/etcd:v3.2.4 && /usr/bin/docker cp etcdctl-binarycopy:/usr/local/bin/etcdctl /usr/local/bin/etcdctl && /usr/bin/docker rm -f etcdctl-binarycopy"], "delta": "0:00:00.144216", "end": "2017-12-29 05:49:16.169502", "rc": 0, "start": "2017-12-29 05:49:16.025286", "stderr": "Error response from daemon: No such container: etcdctl-binarycopy", "stderr_lines": ["Error response from daemon: No such container: etcdctl-binarycopy"], "stdout": "0ce227f738aaba4aa9df1abdae14d2689b1e3676fffb0c47d35f798a8f4de61d\netcdctl-binarycopy", "stdout_lines": ["0ce227f738aaba4aa9df1abdae14d2689b1e3676fffb0c47d35f798a8f4de61d", "etcdctl-binarycopy"]}

TASK [etcd : Configure | Check if cluster is healthy] ***********************************************************************************************
Friday 29 December 2017  05:49:17 +0000 (0:00:00.320)       0:01:21.519 ******* 
ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.12.5.37:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.035846", "end": "2017-12-29 05:49:16.425502", "rc": 0, "start": "2017-12-29 05:49:16.389656", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}

TASK [etcd : Configure | Check if member is in cluster] *********************************************************************************************
Friday 29 December 2017  05:49:17 +0000 (0:00:00.253)       0:01:21.773 ******* 
ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --no-sync --endpoints=https://10.12.5.37:2379 member list | grep -q 10.12.5.37", "delta": "0:00:00.033010", "end": "2017-12-29 05:49:16.681513", "rc": 0, "start": "2017-12-29 05:49:16.648503", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}

TASK [etcd : Install etcd launch script] ************************************************************************************************************
Friday 29 December 2017  05:49:17 +0000 (0:00:00.256)       0:01:22.029 ******* 
ok: [node1] => {"changed": false, "checksum": "c961d8258e45cea8cbd161522a23b7ff778ca0b0", "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/etcd", "size": 383, "state": "file", "uid": 0}

TASK [etcd : Configure | Copy etcd.service systemd file] ********************************************************************************************
Friday 29 December 2017  05:49:18 +0000 (0:00:00.390)       0:01:22.420 ******* 
ok: [node1] => {"changed": false, "checksum": "643a64e6855d3b34a04abbf561fd843945934936", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/etcd.service", "size": 354, "state": "file", "uid": 0}

TASK [etcd : Configure | Join member(s) to cluster one at a time] ***********************************************************************************
Friday 29 December 2017  05:49:18 +0000 (0:00:00.374)       0:01:22.795 ******* 

TASK [etcd : Refresh config | Create etcd config file] **********************************************************************************************
Friday 29 December 2017  05:49:18 +0000 (0:00:00.032)       0:01:22.827 ******* 
ok: [node1] => {"changed": false, "checksum": "3332c5fe8758ea0621847232509f7487a781661e", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 875, "state": "file", "uid": 0}

TASK [etcd : Restart etcd if certs changed] *********************************************************************************************************
Friday 29 December 2017  05:49:19 +0000 (0:00:00.416)       0:01:23.244 ******* 

TASK [etcd : Ensure etcd is running] ****************************************************************************************************************
Friday 29 December 2017  05:49:19 +0000 (0:00:00.023)       0:01:23.268 ******* 
ok: [node1] => {"changed": false, "enabled": true, "name": "etcd", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ActiveEnterTimestampMonotonic": "12021983068", "ActiveExitTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ActiveExitTimestampMonotonic": "12021816849", "ActiveState": "active", "After": "basic.target systemd-journald.socket sysinit.target docker.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:18:59 UTC", "AssertTimestampMonotonic": "12021937928", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "66131984", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ConditionTimestampMonotonic": "12021937928", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/etcd.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "etcd docker wrapper", "DevicePolicy": "auto", "EnvironmentFile": "/etc/etcd.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "24198", "ExecMainStartTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ExecMainStartTimestampMonotonic": "12021983008", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/etcd ; argv[]=/usr/local/bin/etcd ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:18:59 UTC] ; stop_time=[n/a] ; pid=24198 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker rm -f etcd1 ; ignore_errors=yes ; start_time=[Thu 2017-12-28 11:18:59 UTC] ; stop_time=[Thu 2017-12-28 11:18:59 UTC] ; pid=24188 ; code=exited ; status=0 }", "ExecStop": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker stop etcd1 ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:18:59 UTC] ; stop_time=[Thu 2017-12-28 11:18:59 UTC] ; pid=24163 ; code=exited ; status=0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/etcd.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "etcd.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:18:59 UTC", "InactiveEnterTimestampMonotonic": "12021937198", "InactiveExitTimestamp": "Thu 2017-12-28 11:18:59 UTC", "InactiveExitTimestampMonotonic": "12021956288", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "0", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "4096", "LimitNOFILESoft": "1024", "LimitNPROC": "15750", "LimitNPROCSoft": "15750", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "24198", "MemoryAccounting": "no", "MemoryCurrent": "7450624", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "etcd.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "yes", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice sysinit.target", "Restart": "always", "RestartUSec": "15s", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:18:59 UTC", "StateChangeTimestampMonotonic": "12021983068", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "9", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "User": "root", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:18:59 UTC", "WatchdogTimestampMonotonic": "12021983067", "WatchdogUSec": "0"}}

TASK [etcd : Configure | Check if cluster is healthy] ***********************************************************************************************
Friday 29 December 2017  05:49:19 +0000 (0:00:00.184)       0:01:23.453 ******* 
ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.12.5.37:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.033689", "end": "2017-12-29 05:49:18.357445", "rc": 0, "start": "2017-12-29 05:49:18.323756", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}

TASK [etcd : Refresh config | Create etcd config file] **********************************************************************************************
Friday 29 December 2017  05:49:19 +0000 (0:00:00.250)       0:01:23.703 ******* 
ok: [node1] => {"changed": false, "checksum": "3332c5fe8758ea0621847232509f7487a781661e", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 875, "state": "file", "uid": 0}

PLAY [k8s-cluster:calico-rr] ************************************************************************************************************************

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:49:20 +0000 (0:00:00.444)       0:01:24.148 ******* 

TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017  05:49:20 +0000 (0:00:00.042)       0:01:24.191 ******* 

TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017  05:49:20 +0000 (0:00:00.043)       0:01:24.235 ******* 

TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017  05:49:20 +0000 (0:00:00.020)       0:01:24.255 ******* 

TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017  05:49:20 +0000 (0:00:00.528)       0:01:24.784 ******* 

TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017  05:49:21 +0000 (0:00:00.500)       0:01:25.285 ******* 
ok: [node2] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node3] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}

TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017  05:49:21 +0000 (0:00:00.105)       0:01:25.390 ******* 
ok: [node3] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}
ok: [node2] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}
ok: [node1] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}

TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017  05:49:21 +0000 (0:00:00.235)       0:01:25.626 ******* 
ok: [node3] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}
ok: [node2] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}
ok: [node1] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}

TASK [etcd : Check_certs | check if all certs have already been generated on first master] **********************************************************
Friday 29 December 2017  05:49:21 +0000 (0:00:00.269)       0:01:25.895 ******* 
ok: [node2 -> None] => {"changed": false, "examined": 12, "files": [{"atime": 1514459947.704, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459950.54, "checksum": "3bb643c8ddf9ee0b6baaf93805fc63962e5cf57e", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522183, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.196, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "ade3addf27f16aa19093dc3aac030a108d76ef6c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522180, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.152, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "fb8aa806ecc6efa79cce6da17faf99b38d8eb876", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522177, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.88, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "b723851efff5c870f12425122562b9ba747e96fc", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522175, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.868, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514460475.756, "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "0b9f2c142df29f8d45fba6086eca19790b90760c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522178, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.144, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}], "matched": 7, "msg": ""}

TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] **************************************
Friday 29 December 2017  05:49:22 +0000 (0:00:00.179)       0:01:26.075 ******* 
ok: [node1] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}
ok: [node3] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}

TASK [etcd : Check certs | check if a cert already exists on node] **********************************************************************************
Friday 29 December 2017  05:49:22 +0000 (0:00:00.113)       0:01:26.189 ******* 
ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459947.704, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "727116751", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node2] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459948.58, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459948.048, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522070, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "18446744072158681630", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node3] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459948.244, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459947.668, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522154, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "18446744072310589013", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node2] => (item=node-node2-key.pem) => {"changed": false, "item": "node-node2-key.pem", "stat": {"atime": 1514460483.48, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "b723851efff5c870f12425122562b9ba747e96fc", "ctime": 1514459948.048, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522072, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "46d57482cfbfcc2be8c8499f59d90923", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "version": "18446744072158681632", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"atime": 1514460475.756, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "b39f11dab64683147f180e645aa7f322", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "version": "727116765", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}
ok: [node3] => (item=node-node3-key.pem) => {"changed": false, "item": "node-node3-key.pem", "stat": {"atime": 1514460483.092, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "0b9f2c142df29f8d45fba6086eca19790b90760c", "ctime": 1514459947.668, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522156, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "52031e8c0a74b1397285a81d590de184", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459930.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 999, "version": "18446744072310589015", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}}

TASK [etcd : Check_certs | Set 'gen_certs' to true] *************************************************************************************************
Friday 29 December 2017  05:49:22 +0000 (0:00:00.417)       0:01:26.606 ******* 

TASK [etcd : Check_certs | Set 'gen_node_certs' to true] ********************************************************************************************
Friday 29 December 2017  05:49:22 +0000 (0:00:00.065)       0:01:26.672 ******* 
ok: [node2] => {"ansible_facts": {"gen_node_certs": {"node1": false, "node2": false, "node3": false}}, "changed": false}

TASK [etcd : Check_certs | Set 'sync_certs' to true] ************************************************************************************************
Friday 29 December 2017  05:49:22 +0000 (0:00:00.070)       0:01:26.743 ******* 

TASK [etcd : include] *******************************************************************************************************************************
Friday 29 December 2017  05:49:22 +0000 (0:00:00.069)       0:01:26.812 ******* 
included: /home/ubuntu/kubespray/roles/etcd/tasks/gen_certs_script.yml for node2, node3, node1

TASK [etcd : Gen_certs | create etcd cert dir] ******************************************************************************************************
Friday 29 December 2017  05:49:22 +0000 (0:00:00.110)       0:01:26.923 ******* 
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}

TASK [etcd : Gen_certs | create etcd script dir (on node1)] *****************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.239)       0:01:27.162 ******* 
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 4096, "state": "directory", "uid": 0}

TASK [etcd : Gen_certs | create etcd cert dir (on node1)] *******************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.183)       0:01:27.346 ******* 
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}

TASK [etcd : Gen_certs | write openssl config] ******************************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.182)       0:01:27.528 ******* 

TASK [etcd : Gen_certs | copy certs generation script] **********************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.028)       0:01:27.557 ******* 

TASK [etcd : Gen_certs | run cert generation script] ************************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.026)       0:01:27.583 ******* 

TASK [etcd : set_fact] ******************************************************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.021)       0:01:27.604 ******* 
ok: [node1] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "my_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem"]}, "changed": false}
ok: [node2] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node2.pem", "admin-node2-key.pem", "member-node2.pem", "member-node2-key.pem"], "my_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem"]}, "changed": false}
ok: [node3] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node3.pem", "admin-node3-key.pem", "member-node3.pem", "member-node3-key.pem"], "my_node_certs": ["ca.pem", "node-node3.pem", "node-node3-key.pem"]}, "changed": false}

TASK [etcd : Gen_certs | Gather etcd master certs] **************************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.135)       0:01:27.740 ******* 

TASK [etcd : Gen_certs | Gather etcd node certs] ****************************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.059)       0:01:27.800 ******* 

TASK [etcd : Gen_certs | Prepare tempfile for unpacking certs] **************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.054)       0:01:27.854 ******* 

TASK [etcd : Gen_certs | Write master certs to tempfile] ********************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.045)       0:01:27.899 ******* 

TASK [etcd : Gen_certs | Unpack certs on masters] ***************************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.043)       0:01:27.942 ******* 

TASK [etcd : Gen_certs | Cleanup tempfile] **********************************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.046)       0:01:27.988 ******* 

TASK [etcd : Gen_certs | Copy certs on nodes] *******************************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.040)       0:01:28.029 ******* 

TASK [etcd : Gen_certs | check certificate permissions] *********************************************************************************************
Friday 29 December 2017  05:49:23 +0000 (0:00:00.041)       0:01:28.070 ******* 
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999}

TASK [etcd : Gen_certs | target ca-certificate store file] ******************************************************************************************
Friday 29 December 2017  05:49:24 +0000 (0:00:00.210)       0:01:28.281 ******* 
ok: [node1] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}
ok: [node2] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}
ok: [node3] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}

TASK [etcd : Gen_certs | add CA to trusted CA dir] **************************************************************************************************
Friday 29 December 2017  05:49:24 +0000 (0:00:00.114)       0:01:28.395 ******* 
ok: [node1] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}
ok: [node2] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}
ok: [node3] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}

TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/Container Linux by CoreOS)] **********************************************************
Friday 29 December 2017  05:49:24 +0000 (0:00:00.220)       0:01:28.616 ******* 

TASK [etcd : Gen_certs | update ca-certificates (RedHat)] *******************************************************************************************
Friday 29 December 2017  05:49:24 +0000 (0:00:00.046)       0:01:28.663 ******* 

TASK [etcd : Gen_certs | Get etcd certificate serials] **********************************************************************************************
Friday 29 December 2017  05:49:24 +0000 (0:00:00.042)       0:01:28.705 ******* 
ok: [node2] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node2.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.004272", "end": "2017-12-29 05:49:23.519991", "rc": 0, "start": "2017-12-29 05:49:23.515719", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823961", "stdout_lines": ["B13862C721823961"]}
ok: [node3] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node3.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.004302", "end": "2017-12-29 05:49:23.379262", "rc": 0, "start": "2017-12-29 05:49:23.374960", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823962", "stdout_lines": ["B13862C721823962"]}
ok: [node1] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.004650", "end": "2017-12-29 05:49:23.584640", "rc": 0, "start": "2017-12-29 05:49:23.579990", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823963", "stdout_lines": ["B13862C721823963"]}

TASK [etcd : Set etcd_client_cert_serial] ***********************************************************************************************************
Friday 29 December 2017  05:49:24 +0000 (0:00:00.222)       0:01:28.928 ******* 
ok: [node1] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823963"}, "changed": false}
ok: [node2] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823961"}, "changed": false}
ok: [node3] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823962"}, "changed": false}

TASK [etcd : include] *******************************************************************************************************************************
Friday 29 December 2017  05:49:24 +0000 (0:00:00.112)       0:01:29.041 ******* 
included: /home/ubuntu/kubespray/roles/etcd/tasks/install_docker.yml for node1

TASK [etcd : Install | Copy etcdctl binary from docker container] ***********************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.094)       0:01:29.136 ******* 
ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["sh", "-c", "/usr/bin/docker rm -f etcdctl-binarycopy; /usr/bin/docker create --name etcdctl-binarycopy quay.io/coreos/etcd:v3.2.4 && /usr/bin/docker cp etcdctl-binarycopy:/usr/local/bin/etcdctl /usr/local/bin/etcdctl && /usr/bin/docker rm -f etcdctl-binarycopy"], "delta": "0:00:00.140128", "end": "2017-12-29 05:49:24.180702", "rc": 0, "start": "2017-12-29 05:49:24.040574", "stderr": "Error response from daemon: No such container: etcdctl-binarycopy", "stderr_lines": ["Error response from daemon: No such container: etcdctl-binarycopy"], "stdout": "e31da9fe17f72362840ed96a0f21f63fcb5fdf4444dbf72e31d10435be84587f\netcdctl-binarycopy", "stdout_lines": ["e31da9fe17f72362840ed96a0f21f63fcb5fdf4444dbf72e31d10435be84587f", "etcdctl-binarycopy"]}

TASK [etcd : Configure | Check if cluster is healthy] ***********************************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.398)       0:01:29.534 ******* 

TASK [etcd : Configure | Check if member is in cluster] *********************************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.159)       0:01:29.693 ******* 

TASK [etcd : Install etcd launch script] ************************************************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.045)       0:01:29.739 ******* 

TASK [etcd : Configure | Copy etcd.service systemd file] ********************************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.046)       0:01:29.785 ******* 

TASK [etcd : Configure | Join member(s) to cluster one at a time] ***********************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.052)       0:01:29.837 ******* 

TASK [etcd : Refresh config | Create etcd config file] **********************************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.063)       0:01:29.900 ******* 

TASK [etcd : Restart etcd if certs changed] *********************************************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.048)       0:01:29.949 ******* 

TASK [etcd : Ensure etcd is running] ****************************************************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.045)       0:01:29.995 ******* 

TASK [etcd : Configure | Check if cluster is healthy] ***********************************************************************************************
Friday 29 December 2017  05:49:25 +0000 (0:00:00.044)       0:01:30.040 ******* 

TASK [etcd : Refresh config | Create etcd config file] **********************************************************************************************
Friday 29 December 2017  05:49:26 +0000 (0:00:00.046)       0:01:30.087 ******* 

PLAY [etcd:k8s-cluster:vault:calico-rr] *************************************************************************************************************

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:49:26 +0000 (0:00:00.179)       0:01:30.266 ******* 

TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017  05:49:26 +0000 (0:00:00.049)       0:01:30.316 ******* 

TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017  05:49:26 +0000 (0:00:00.045)       0:01:30.361 ******* 

TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017  05:49:26 +0000 (0:00:00.022)       0:01:30.384 ******* 

TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017  05:49:26 +0000 (0:00:00.600)       0:01:30.985 ******* 

TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017  05:49:27 +0000 (0:00:00.506)       0:01:31.491 ******* 
ok: [node3] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node2] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}

TASK [adduser : User | Create User Group] ***********************************************************************************************************
Friday 29 December 2017  05:49:27 +0000 (0:00:00.323)       0:01:31.814 ******* 

TASK [adduser : User | Create User] *****************************************************************************************************************
Friday 29 December 2017  05:49:27 +0000 (0:00:00.043)       0:01:31.857 ******* 

TASK [vault : stop vault-temp container] ************************************************************************************************************
Friday 29 December 2017  05:49:27 +0000 (0:00:00.046)       0:01:31.903 ******* 

TASK [vault : check_vault | Attempt to pull local https Vault health] *******************************************************************************
Friday 29 December 2017  05:49:27 +0000 (0:00:00.041)       0:01:31.945 ******* 

TASK [vault : check_vault | Set facts about local Vault health] *************************************************************************************
Friday 29 December 2017  05:49:27 +0000 (0:00:00.047)       0:01:31.993 ******* 

TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] ****************************************************************
Friday 29 December 2017  05:49:27 +0000 (0:00:00.042)       0:01:32.036 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:27 +0000 (0:00:00.024)       0:01:32.060 ******* 

TASK [vault : bootstrap/sync_secrets | Set fact based on sync_file_results] *************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.065)       0:01:32.126 ******* 

TASK [vault : bootstrap/sync_secrets | Reset sync_file_results to avoid variable bleed] *************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.037)       0:01:32.163 ******* 

TASK [vault : bootstrap/sync_secrets | Print out warning message if secrets are not available and vault is initialized] *****************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.045)       0:01:32.209 ******* 

TASK [vault : bootstrap/sync_secrets | Cat root_token from a vault host] ****************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.021)       0:01:32.231 ******* 

TASK [vault : bootstrap/sync_secrets | Cat unseal_keys from a vault host] ***************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.043)       0:01:32.275 ******* 

TASK [vault : bootstrap/sync_secrets | Set needed facts for Vault API interaction when Vault is already running] ************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.047)       0:01:32.322 ******* 

TASK [vault : bootstrap/sync_secrets | Update vault_headers if we have the root_token] **************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.044)       0:01:32.366 ******* 

TASK [vault : find_leader | Find the current http Vault leader] *************************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.045)       0:01:32.412 ******* 

TASK [vault : find_leader | Set fact for current http leader] ***************************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.048)       0:01:32.461 ******* 

TASK [vault : find_leader| show vault_leader_url] ***************************************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.049)       0:01:32.510 ******* 

TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.044)       0:01:32.555 ******* 

TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.052)       0:01:32.607 ******* 

TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.045)       0:01:32.653 ******* 

TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.049)       0:01:32.702 ******* 

TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.047)       0:01:32.749 ******* 

TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.048)       0:01:32.797 ******* 

TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.050)       0:01:32.847 ******* 

TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.049)       0:01:32.897 ******* 

TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.043)       0:01:32.940 ******* 

TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.049)       0:01:32.990 ******* 

TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017  05:49:28 +0000 (0:00:00.046)       0:01:33.036 ******* 

TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.049)       0:01:33.085 ******* 

TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.049)       0:01:33.135 ******* 

TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.046)       0:01:33.182 ******* 

TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.051)       0:01:33.233 ******* 

TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.053)       0:01:33.286 ******* 

TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.047)       0:01:33.334 ******* 

TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.053)       0:01:33.387 ******* 

TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.047)       0:01:33.434 ******* 

TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.050)       0:01:33.485 ******* 

TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.051)       0:01:33.536 ******* 

TASK [vault : bootstrap/sync_vault_certs | Set facts for vault sync_file results] *******************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.049)       0:01:33.586 ******* 

TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after ca.pem sync] ***************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.041)       0:01:33.628 ******* 

TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.049)       0:01:33.677 ******* 

TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.047)       0:01:33.724 ******* 

TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.049)       0:01:33.774 ******* 

TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.047)       0:01:33.821 ******* 

TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.050)       0:01:33.871 ******* 

TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.046)       0:01:33.918 ******* 

TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.048)       0:01:33.967 ******* 

TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.052)       0:01:34.019 ******* 

TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017  05:49:29 +0000 (0:00:00.045)       0:01:34.065 ******* 

TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.045)       0:01:34.110 ******* 

TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.048)       0:01:34.159 ******* 

TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.045)       0:01:34.204 ******* 

TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.044)       0:01:34.249 ******* 

TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.051)       0:01:34.301 ******* 

TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.048)       0:01:34.349 ******* 

TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.052)       0:01:34.401 ******* 

TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.046)       0:01:34.447 ******* 

TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.052)       0:01:34.500 ******* 

TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.047)       0:01:34.548 ******* 

TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.050)       0:01:34.598 ******* 

TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.046)       0:01:34.644 ******* 

TASK [vault : bootstrap/sync_vault_certs | Set fact if Vault's API cert is needed] ******************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.053)       0:01:34.698 ******* 

TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after api.pem sync] **************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.042)       0:01:34.740 ******* 

TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] **********************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.043)       0:01:34.784 ******* 

TASK [vault : sync_file | Set fact for sync_file_path when undefined] *******************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.045)       0:01:34.830 ******* 

TASK [vault : sync_file | Set fact for key path name] ***********************************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.048)       0:01:34.879 ******* 

TASK [vault : sync_file | Check if {{sync_file_path}} file exists] **********************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.045)       0:01:34.925 ******* 

TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.047)       0:01:34.972 ******* 

TASK [vault : sync_file | Combine all possible file sync sources] ***********************************************************************************
Friday 29 December 2017  05:49:30 +0000 (0:00:00.046)       0:01:35.018 ******* 

TASK [vault : sync_file | Combine all possible key file sync sources] *******************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.066)       0:01:35.085 ******* 

TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] ****************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.065)       0:01:35.150 ******* 

TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] *****************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.045)       0:01:35.196 ******* 

TASK [vault : sync_file | Consolidate file and key sources] *****************************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.047)       0:01:35.243 ******* 

TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.045)       0:01:35.289 ******* 

TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.043)       0:01:35.332 ******* 

TASK [vault : sync_file | Update sync_file_results fact] ********************************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.045)       0:01:35.378 ******* 

TASK [vault : sync_file | Cat the file] *************************************************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.048)       0:01:35.426 ******* 

TASK [vault : sync_file | Cat the key file] *********************************************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.050)       0:01:35.476 ******* 

TASK [vault : sync_file | Set facts for file contents] **********************************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.048)       0:01:35.525 ******* 

TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.053)       0:01:35.578 ******* 

TASK [vault : sync_file | Ensure the directory exists] **********************************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.046)       0:01:35.625 ******* 

TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ********************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.054)       0:01:35.679 ******* 

TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] ****************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.049)       0:01:35.728 ******* 

TASK [vault : Unset local vars to avoid variable bleed into next iteration] *************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.052)       0:01:35.781 ******* 

TASK [vault : bootstrap/sync_etcd_certs | Set facts for etcd sync_file results] *********************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.044)       0:01:35.825 ******* 

TASK [vault : bootstrap/sync_etcd_certs | Unset sync_file_results after ca.pem sync] ****************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.043)       0:01:35.868 ******* 

TASK [vault : bootstrap/start_vault_temp | Ensure vault-temp isn't already running] *****************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.045)       0:01:35.914 ******* 

TASK [vault : bootstrap/start_vault_temp | Start single node Vault with file backend] ***************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.042)       0:01:35.956 ******* 

TASK [vault : bootstrap/start_vault_temp | Start again single node Vault with file backend] *********************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.045)       0:01:36.002 ******* 

TASK [vault : bootstrap/start_vault_temp | Initialize vault-temp] ***********************************************************************************
Friday 29 December 2017  05:49:31 +0000 (0:00:00.041)       0:01:36.044 ******* 

TASK [vault : bootstrap/start_vault_temp | Set needed vault facts] **********************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.044)       0:01:36.089 ******* 

TASK [vault : bootstrap/start_vault_temp | Unseal vault-temp] ***************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.043)       0:01:36.132 ******* 

TASK [vault : vault | Set fact about vault leader url] **********************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.041)       0:01:36.174 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.043)       0:01:36.217 ******* 

TASK [vault : shared/auth_backend | Test if the auth backend exists] ********************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.058)       0:01:36.276 ******* 

TASK [vault : shared/auth_backend | Add the cert auth backend if needed] ****************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.042)       0:01:36.318 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.046)       0:01:36.365 ******* 

TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/vault/ssl exists] *****************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.099)       0:01:36.465 ******* 

TASK [vault : bootstrap/gen_ca | Generate vault root CA] ********************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.067)       0:01:36.533 ******* 

TASK [vault : bootstrap/gen_ca | Copy vault root CA cert locally] ***********************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.030)       0:01:36.563 ******* 

TASK [vault : bootstrap/gen_ca | Copy vault root CA key locally] ************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.054)       0:01:36.617 ******* 

TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/ssl/etcd/ssl exists] **************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.056)       0:01:36.674 ******* 

TASK [vault : bootstrap/gen_ca | Generate etcd root CA] *********************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.060)       0:01:36.734 ******* 

TASK [vault : bootstrap/gen_ca | Copy etcd root CA cert locally] ************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.031)       0:01:36.765 ******* 

TASK [vault : bootstrap/gen_ca | Copy etcd root CA key locally] *************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.059)       0:01:36.825 ******* 

TASK [vault : issue_cert | Ensure target directory exists] ******************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.044)       0:01:36.870 ******* 

TASK [vault : issue_cert | Read in the local credentials] *******************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.050)       0:01:36.920 ******* 

TASK [vault : gen_certs_vault | Set facts for read Vault Creds] *************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.026)       0:01:36.947 ******* 

TASK [vault : gen_certs_vault | Log into Vault and obtain an token] *********************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.029)       0:01:36.976 ******* 

TASK [vault : gen_certs_vault | Set fact for vault_client_token] ************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.021)       0:01:36.997 ******* 

TASK [vault : gen_certs_vault | Set fact for Vault API token] ***************************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.023)       0:01:37.021 ******* 

TASK [vault : issue_cert | Generate /etc/vault/ssl/api.pem for vault role] **************************************************************************
Friday 29 December 2017  05:49:32 +0000 (0:00:00.041)       0:01:37.062 ******* 

TASK [vault : issue_cert | Copy /etc/vault/ssl/api.pem cert to all hosts] ***************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.025)       0:01:37.088 ******* 

TASK [vault : issue_cert | Copy key for /etc/vault/ssl/api.pem to all hosts] ************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.055)       0:01:37.143 ******* 

TASK [vault : issue_cert | Copy issuing CA cert] ****************************************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.044)       0:01:37.188 ******* 

TASK [vault : issue_cert | Copy certificate serial to all hosts] ************************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.048)       0:01:37.237 ******* 

TASK [vault : bootstrap/ca_trust | pull CA from cert from {{groups.vault|first}}] *******************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.054)       0:01:37.292 ******* 

TASK [vault : bootstrap/ca_trust | target ca-certificate store file] ********************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.047)       0:01:37.339 ******* 

TASK [vault : bootstrap/ca_trust | add CA to trusted CA dir] ****************************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.045)       0:01:37.384 ******* 

TASK [vault : bootstrap/ca_trust | update ca-certificates (Debian/Ubuntu/CoreOS)] *******************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.044)       0:01:37.429 ******* 

TASK [vault : bootstrap/ca_trust | update ca-certificates (RedHat)] *********************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.042)       0:01:37.472 ******* 

TASK [vault : stop vault-temp container] ************************************************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.043)       0:01:37.515 ******* 

TASK [vault : check_vault | Attempt to pull local https Vault health] *******************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.042)       0:01:37.558 ******* 

TASK [vault : check_vault | Set facts about local Vault health] *************************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.046)       0:01:37.605 ******* 

TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] ****************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.044)       0:01:37.650 ******* 

TASK [vault : check_etcd | Check if etcd is up and reachable] ***************************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.029)       0:01:37.679 ******* 

TASK [vault : check_etcd | Set fact based off the etcd_health_check response] ***********************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.024)       0:01:37.703 ******* 

TASK [vault : set_fact] *****************************************************************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.042)       0:01:37.746 ******* 

TASK [vault : check_etcd | Fail if etcd is not available and needed] ********************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.043)       0:01:37.789 ******* 

TASK [vault : cluster/configure | Ensure the vault/config directory exists] *************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.043)       0:01:37.833 ******* 

TASK [vault : cluster/configure | Lay down the configuration file] **********************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.044)       0:01:37.877 ******* 

TASK [vault : cluster/binary | Copy vault binary from downloaddir] **********************************************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.043)       0:01:37.921 ******* 

TASK [vault : cluster/systemd | Ensure mount points exist prior to vault.service startup] ***********************************************************
Friday 29 December 2017  05:49:33 +0000 (0:00:00.045)       0:01:37.966 ******* 

TASK [vault : cluster/systemd | Ensure the vault user has access to needed directories] *************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.113)       0:01:38.080 ******* 

TASK [vault : cluster/systemd | Copy down vault.service systemd file] *******************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.084)       0:01:38.164 ******* 

TASK [vault : Create vault service systemd directory] ***********************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.044)       0:01:38.208 ******* 

TASK [vault : cluster/systemd | Add vault proxy env vars] *******************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.045)       0:01:38.254 ******* 

TASK [vault : cluster/systemd | Enable vault.service] ***********************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.041)       0:01:38.296 ******* 

TASK [vault : cluster/systemd | Query local vault until service is up] ******************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.045)       0:01:38.341 ******* 

TASK [vault : cluster/init | Initialize Vault] ******************************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.041)       0:01:38.383 ******* 

TASK [vault : cluster/init | Set facts on the results of the initialization] ************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.044)       0:01:38.428 ******* 

TASK [vault : cluster/init | Ensure all hosts have these facts] *************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.043)       0:01:38.472 ******* 

TASK [vault : cluster/init | Ensure the vault_secrets_dir exists] ***********************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.050)       0:01:38.522 ******* 

TASK [vault : cluster/init | Ensure all in groups.vault have the unseal_keys locally] ***************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.043)       0:01:38.566 ******* 

TASK [vault : cluster/init | Ensure all in groups.vault have the root_token locally] ****************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.044)       0:01:38.610 ******* 

TASK [vault : cluster/init | Ensure vault_headers and vault statuses are updated] *******************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.045)       0:01:38.655 ******* 

TASK [vault : cluster/unseal | Current sealed state] ************************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.043)       0:01:38.699 ******* 

TASK [vault : cluster/unseal | Unseal Vault] ********************************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.047)       0:01:38.746 ******* 

TASK [vault : cluster/unseal | Wait until server is ready] ******************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.037)       0:01:38.783 ******* 

TASK [vault : find_leader | Find the current http Vault leader] *************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.043)       0:01:38.827 ******* 

TASK [vault : find_leader | Set fact for current http leader] ***************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.041)       0:01:38.868 ******* 

TASK [vault : find_leader| show vault_leader_url] ***************************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.051)       0:01:38.920 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:34 +0000 (0:00:00.043)       0:01:38.964 ******* 

TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/kubernetes/ssl exists] ************************************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.125)       0:01:39.089 ******* 

TASK [vault : bootstrap/gen_ca | Generate kube root CA] *********************************************************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.057)       0:01:39.147 ******* 

TASK [vault : bootstrap/gen_ca | Copy kube root CA cert locally] ************************************************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.034)       0:01:39.182 ******* 

TASK [vault : bootstrap/gen_ca | Copy kube root CA key locally] *************************************************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.054)       0:01:39.236 ******* 

TASK [vault : shared/auth_backend | Test if the auth backend exists] ********************************************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.044)       0:01:39.281 ******* 

TASK [vault : shared/auth_backend | Add the cert auth backend if needed] ****************************************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.043)       0:01:39.324 ******* 

TASK [vault : include] ******************************************************************************************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.043)       0:01:39.367 ******* 

PLAY [k8s-cluster] **********************************************************************************************************************************

TASK [download : Register docker images info] *******************************************************************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.155)       0:01:39.523 ******* 

TASK [download : container_download | Create dest directory for saved/loaded container images] ******************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.044)       0:01:39.568 ******* 

TASK [download : container_download | create local directory for saved/loaded container images] *****************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.047)       0:01:39.615 ******* 

TASK [download : Download items] ********************************************************************************************************************
Friday 29 December 2017  05:49:35 +0000 (0:00:00.021)       0:01:39.637 ******* 

TASK [download : Sync container] ********************************************************************************************************************
Friday 29 December 2017  05:49:36 +0000 (0:00:00.562)       0:01:40.200 ******* 

TASK [kubespray-defaults : Configure defaults] ******************************************************************************************************
Friday 29 December 2017  05:49:36 +0000 (0:00:00.664)       0:01:40.864 ******* 
ok: [node2] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node3] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
ok: [node1] => {
    "msg": "Check roles/kubespray-defaults/defaults/main.yml"
}

TASK [kubernetes/secrets : Check_certs | check if the certs have already been generated on first master] ********************************************
Friday 29 December 2017  05:49:37 +0000 (0:00:00.408)       0:01:41.272 ******* 
ok: [node2 -> None] => {"changed": false, "examined": 4, "files": [{"atime": 1514459963.14, "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514456735.892, "dev": 64769, "gid": 0, "inode": 522100, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1514456735.72, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1514459963.14, "checksum": "cace111fd87fb2c14f7a07fea3e515746edad2ee", "ctime": 1514456736.392, "dev": 64769, "gid": 0, "inode": 522101, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1514456736.208, "nlink": 1, "path": "/etc/kubernetes/ssl/ca-key.pem", "rgrp": true, "roth": true, "rusr": true, "size": 1675, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 2, "msg": ""}

TASK [kubernetes/secrets : Check_certs | Set default value for 'sync_certs', 'gen_certs', and 'secret_changed'  to false] ***************************
Friday 29 December 2017  05:49:37 +0000 (0:00:00.324)       0:01:41.597 ******* 
ok: [node1] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false}
ok: [node3] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false}

TASK [kubernetes/secrets : Check certs | check if a cert already exists on node] ********************************************************************
Friday 29 December 2017  05:49:37 +0000 (0:00:00.359)       0:01:41.957 ******* 
ok: [node2] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514526363.216, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514525695.876, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 522013, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ba863db0a301f222eabf930ccf7c717", "mimetype": "text/plain", "mode": "0644", "mtime": 1514525695.872, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "version": "18446744072158684721", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node3] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514474667.028, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514474126.648, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 522128, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ba863db0a301f222eabf930ccf7c717", "mimetype": "text/plain", "mode": "0644", "mtime": 1514474126.648, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "version": "18446744072310591063", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459963.14, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514456735.892, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 522100, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ba863db0a301f222eabf930ccf7c717", "mimetype": "text/plain", "mode": "0644", "mtime": 1514456735.72, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "version": "727079457", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [node2] => (item=apiserver.pem) => {"changed": false, "item": "apiserver.pem", "stat": {"exists": false}}
ok: [node1] => (item=apiserver.pem) => {"changed": false, "item": "apiserver.pem", "stat": {"exists": false}}
ok: [node3] => (item=apiserver.pem) => {"changed": false, "item": "apiserver.pem", "stat": {"exists": false}}
ok: [node2] => (item=apiserver-key.pem) => {"changed": false, "item": "apiserver-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=apiserver-key.pem) => {"changed": false, "item": "apiserver-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=apiserver-key.pem) => {"changed": false, "item": "apiserver-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-scheduler.pem) => {"changed": false, "item": "kube-scheduler.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-scheduler.pem) => {"changed": false, "item": "kube-scheduler.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-scheduler.pem) => {"changed": false, "item": "kube-scheduler.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-scheduler-key.pem) => {"changed": false, "item": "kube-scheduler-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-scheduler-key.pem) => {"changed": false, "item": "kube-scheduler-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-scheduler-key.pem) => {"changed": false, "item": "kube-scheduler-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-controller-manager.pem) => {"changed": false, "item": "kube-controller-manager.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-controller-manager.pem) => {"changed": false, "item": "kube-controller-manager.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-controller-manager.pem) => {"changed": false, "item": "kube-controller-manager.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-controller-manager-key.pem) => {"changed": false, "item": "kube-controller-manager-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-controller-manager-key.pem) => {"changed": false, "item": "kube-controller-manager-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-controller-manager-key.pem) => {"changed": false, "item": "kube-controller-manager-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=admin-node2.pem) => {"changed": false, "item": "admin-node2.pem", "stat": {"exists": false}}
ok: [node3] => (item=admin-node3.pem) => {"changed": false, "item": "admin-node3.pem", "stat": {"exists": false}}
ok: [node1] => (item=admin-node1.pem) => {"changed": false, "item": "admin-node1.pem", "stat": {"exists": false}}
ok: [node2] => (item=admin-node2-key.pem) => {"changed": false, "item": "admin-node2-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=admin-node3-key.pem) => {"changed": false, "item": "admin-node3-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=admin-node1-key.pem) => {"changed": false, "item": "admin-node1-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=node-node2.pem) => {"changed": false, "item": "node-node2.pem", "stat": {"exists": false}}
ok: [node3] => (item=node-node3.pem) => {"changed": false, "item": "node-node3.pem", "stat": {"exists": false}}
ok: [node1] => (item=node-node1.pem) => {"changed": false, "item": "node-node1.pem", "stat": {"exists": false}}
ok: [node2] => (item=node-node2-key.pem) => {"changed": false, "item": "node-node2-key.pem", "stat": {"exists": false}}
ok: [node3] => (item=node-node3-key.pem) => {"changed": false, "item": "node-node3-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-proxy-node2.pem) => {"changed": false, "item": "kube-proxy-node2.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-proxy-node3.pem) => {"changed": false, "item": "kube-proxy-node3.pem", "stat": {"exists": false}}
ok: [node2] => (item=kube-proxy-node2-key.pem) => {"changed": false, "item": "kube-proxy-node2-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-proxy-node1.pem) => {"changed": false, "item": "kube-proxy-node1.pem", "stat": {"exists": false}}
ok: [node3] => (item=kube-proxy-node3-key.pem) => {"changed": false, "item": "kube-proxy-node3-key.pem", "stat": {"exists": false}}
ok: [node1] => (item=kube-proxy-node1-key.pem) => {"changed": false, "item": "kube-proxy-node1-key.pem", "stat": {"exists": false}}

TASK [kubernetes/secrets : Check_certs | Set 'gen_certs' to true] ***********************************************************************************
Friday 29 December 2017  05:49:41 +0000 (0:00:03.511)       0:01:45.469 ******* 
ok: [node2] => (item=['/etc/kubernetes/ssl/ca.pem', '/etc/kubernetes/ssl/apiserver.pem', '/etc/kubernetes/ssl/apiserver-key.pem', '/etc/kubernetes/ssl/kube-scheduler.pem', '/etc/kubernetes/ssl/kube-scheduler-key.pem', '/etc/kubernetes/ssl/kube-controller-manager.pem', '/etc/kubernetes/ssl/kube-controller-manager-key.pem',  '/etc/kubernetes/ssl/admin-node1.pem' '/etc/kubernetes/ssl/admin-node1-key.pem'  ]  '/etc/kubernetes/ssl/node-node2.pem' '/etc/kubernetes/ssl/node-node2-key.pem' '/etc/kubernetes/ssl/kube-proxy-node2.pem' '/etc/kubernetes/ssl/kube-proxy-node2-key.pem' ,  '/etc/kubernetes/ssl/node-node3.pem' '/etc/kubernetes/ssl/node-node3-key.pem' '/etc/kubernetes/ssl/kube-proxy-node3.pem' '/etc/kubernetes/ssl/kube-proxy-node3-key.pem' ,  '/etc/kubernetes/ssl/node-node1.pem' '/etc/kubernetes/ssl/node-node1-key.pem' '/etc/kubernetes/ssl/kube-proxy-node1.pem' '/etc/kubernetes/ssl/kube-proxy-node1-key.pem'  ]) => {"ansible_facts": {"gen_certs": true}, "ansible_facts_cacheable": false, "changed": false, "item": "['/etc/kubernetes/ssl/ca.pem', '/etc/kubernetes/ssl/apiserver.pem', '/etc/kubernetes/ssl/apiserver-key.pem', '/etc/kubernetes/ssl/kube-scheduler.pem', '/etc/kubernetes/ssl/kube-scheduler-key.pem', '/etc/kubernetes/ssl/kube-controller-manager.pem', '/etc/kubernetes/ssl/kube-controller-manager-key.pem',  '/etc/kubernetes/ssl/admin-node1.pem' '/etc/kubernetes/ssl/admin-node1-key.pem'  ]  '/etc/kubernetes/ssl/node-node2.pem' '/etc/kubernetes/ssl/node-node2-key.pem' '/etc/kubernetes/ssl/kube-proxy-node2.pem' '/etc/kubernetes/ssl/kube-proxy-node2-key.pem' ,  '/etc/kubernetes/ssl/node-node3.pem' '/etc/kubernetes/ssl/node-node3-key.pem' '/etc/kubernetes/ssl/kube-proxy-node3.pem' '/etc/kubernetes/ssl/kube-proxy-node3-key.pem' ,  '/etc/kubernetes/ssl/node-node1.pem' '/etc/kubernetes/ssl/node-node1-key.pem' '/etc/kubernetes/ssl/kube-proxy-node1.pem' '/etc/kubernetes/ssl/kube-proxy-node1-key.pem'  ]"}

TASK [kubernetes/secrets : Check_certs | Set 'gen_master_certs' to true] ****************************************************************************
Friday 29 December 2017  05:49:41 +0000 (0:00:00.229)       0:01:45.698 ******* 
ok: [node2] => {"ansible_facts": {"gen_master_certs": "            False"}, "changed": false}

TASK [kubernetes/secrets : Check_certs | Set 'gen_node_certs' to true] ******************************************************************************
Friday 29 December 2017  05:49:41 +0000 (0:00:00.223)       0:01:45.922 ******* 
ok: [node2] => {"ansible_facts": {"gen_node_certs": {"node1": true, "node2": true, "node3": true}}, "changed": false}

TASK [kubernetes/secrets : Check_certs | Set 'sync_certs' to true] **********************************************************************************
Friday 29 December 2017  05:49:42 +0000 (0:00:00.305)       0:01:46.227 ******* 
ok: [node2] => {"ansible_facts": {"sync_certs": true}, "changed": false}
ok: [node1] => {"ansible_facts": {"sync_certs": true}, "changed": false}
ok: [node3] => {"ansible_facts": {"sync_certs": true}, "changed": false}

TASK [kubernetes/secrets : Check_tokens | check if the tokens have already been generated on first master] ******************************************
Friday 29 December 2017  05:49:42 +0000 (0:00:00.392)       0:01:46.620 ******* 
ok: [node2 -> None] => {"changed": false, "stat": {"exists": false}}

TASK [kubernetes/secrets : Check_tokens | Set default value for 'sync_tokens' and 'gen_tokens' to false] ********************************************
Friday 29 December 2017  05:49:42 +0000 (0:00:00.324)       0:01:46.945 ******* 
ok: [node3] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false}
ok: [node2] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false}
ok: [node1] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false}

TASK [kubernetes/secrets : Check_tokens | Set 'sync_tokens' and 'gen_tokens' to true] ***************************************************************
Friday 29 December 2017  05:49:43 +0000 (0:00:00.359)       0:01:47.305 ******* 
ok: [node2] => {"ansible_facts": {"gen_tokens": true}, "changed": false}

TASK [kubernetes/secrets : Check tokens | check if a cert already exists] ***************************************************************************
Friday 29 December 2017  05:49:43 +0000 (0:00:00.209)       0:01:47.514 ******* 
ok: [node2] => {"changed": false, "stat": {"exists": false}}
ok: [node1] => {"changed": false, "stat": {"exists": false}}
ok: [node3] => {"changed": false, "stat": {"exists": false}}

TASK [kubernetes/secrets : Check_tokens | Set 'sync_tokens' to true] ********************************************************************************
Friday 29 December 2017  05:49:43 +0000 (0:00:00.455)       0:01:47.970 ******* 
ok: [node2] => {"ansible_facts": {"sync_tokens": true}, "changed": false}

TASK [kubernetes/secrets : Make sure the certificate directory exits] *******************************************************************************
Friday 29 December 2017  05:49:44 +0000 (0:00:00.312)       0:01:48.282 ******* 
ok: [node2] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node3] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}
ok: [node1] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999}

TASK [kubernetes/secrets : Make sure the tokens directory exits] ************************************************************************************
Friday 29 December 2017  05:49:44 +0000 (0:00:00.450)       0:01:48.733 ******* 
ok: [node1] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0}
ok: [node2] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0}
ok: [node3] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0}

TASK [kubernetes/secrets : Gen_certs | Create kubernetes config directory (on node1)] ***************************************************************
Friday 29 December 2017  05:49:45 +0000 (0:00:00.448)       0:01:49.182 ******* 
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}

TASK [kubernetes/secrets : Gen_certs | Create kubernetes script directory (on node1)] ***************************************************************
Friday 29 December 2017  05:49:45 +0000 (0:00:00.323)       0:01:49.506 ******* 
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}

TASK [kubernetes/secrets : Get_tokens | Make sure the tokens directory exits (on node1)] ************************************************************
Friday 29 December 2017  05:49:45 +0000 (0:00:00.333)       0:01:49.839 ******* 
ok: [node2 -> None] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0}

TASK [kubernetes/secrets : include] *****************************************************************************************************************
Friday 29 December 2017  05:49:46 +0000 (0:00:00.322)       0:01:50.161 ******* 
included: /home/ubuntu/kubespray/roles/kubernetes/secrets/tasks/gen_certs_script.yml for node2, node3, node1

TASK [kubernetes/secrets : Gen_certs | Create kubernetes config directory (on node1)] ***************************************************************
Friday 29 December 2017  05:49:46 +0000 (0:00:00.151)       0:01:50.313 ******* 
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999}

TASK [kubernetes/secrets : Gen_certs | Create kubernetes script directory (on node1)] ***************************************************************
Friday 29 December 2017  05:49:46 +0000 (0:00:00.428)       0:01:50.742 ******* 
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999}

TASK [kubernetes/secrets : Gen_certs | write openssl config] ****************************************************************************************
Friday 29 December 2017  05:49:47 +0000 (0:00:00.417)       0:01:51.159 ******* 
ok: [node2 -> None] => {"changed": false, "checksum": "af4239927b2fb01f7b1e15c60e2349694c20e149", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/openssl.conf", "size": 464, "state": "file", "uid": 0}

TASK [kubernetes/secrets : Gen_certs | copy certs generation script] ********************************************************************************
Friday 29 December 2017  05:49:47 +0000 (0:00:00.674)       0:01:51.834 ******* 
ok: [node2 -> None] => {"changed": false, "checksum": "ca132418c08e69827b1395da46c59957f462dea1", "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/kubernetes-scripts/make-ssl.sh", "size": 3601, "state": "file", "uid": 0}

TASK [kubernetes/secrets : Gen_certs | run cert generation script] **********************************************************************************
Friday 29 December 2017  05:49:48 +0000 (0:00:00.549)       0:01:52.383 ******* 
fatal: [node2 -> None]: FAILED! => {"changed": true, "cmd": ["/usr/local/bin/kubernetes-scripts/make-ssl.sh", "-f", "/etc/kubernetes/openssl.conf", "-d", "/etc/kubernetes/ssl"], "delta": "0:00:00.089545", "end": "2017-12-29 05:49:47.451046", "msg": "non-zero return code", "rc": 1, "start": "2017-12-29 05:49:47.361501", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}

NO MORE HOSTS LEFT **********************************************************************************************************************************
	to retry, use: --limit @/home/ubuntu/kubespray/cluster.retry

PLAY RECAP ******************************************************************************************************************************************
node1                      : ok=213  changed=0    unreachable=0    failed=0   
node2                      : ok=204  changed=0    unreachable=0    failed=1   
node3                      : ok=184  changed=0    unreachable=0    failed=0   

Friday 29 December 2017  05:49:48 +0000 (0:00:00.408)       0:01:52.792 ******* 
=============================================================================== 
kubernetes/secrets : Check certs | check if a cert already exists on node -------------------------------------------------------------------- 3.51s
kubernetes/preinstall : Create kubernetes directories ---------------------------------------------------------------------------------------- 1.37s
download : Download items -------------------------------------------------------------------------------------------------------------------- 1.23s
download : Sync container -------------------------------------------------------------------------------------------------------------------- 0.82s
kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }") ------------------------------ 0.79s
kubernetes/preinstall : Install latest version of python-apt for Debian distribs ------------------------------------------------------------- 0.73s
download : file_download | Download item ----------------------------------------------------------------------------------------------------- 0.73s
docker : ensure docker repository is enabled ------------------------------------------------------------------------------------------------- 0.70s
docker : Write docker.service systemd file --------------------------------------------------------------------------------------------------- 0.70s
docker : ensure docker packages are installed ------------------------------------------------------------------------------------------------ 0.70s
docker : Write docker options systemd drop-in ------------------------------------------------------------------------------------------------ 0.69s
docker : Write docker dns systemd drop-in ---------------------------------------------------------------------------------------------------- 0.69s
docker : ensure docker repository public key is installed ------------------------------------------------------------------------------------ 0.69s
kubernetes/secrets : Gen_certs | write openssl config ---------------------------------------------------------------------------------------- 0.67s
download : Sync container -------------------------------------------------------------------------------------------------------------------- 0.66s
kubernetes/preinstall : Install packages requirements ---------------------------------------------------------------------------------------- 0.66s
kubernetes/preinstall : Create cni directories ----------------------------------------------------------------------------------------------- 0.62s
download : Sync container -------------------------------------------------------------------------------------------------------------------- 0.62s
download : Download items -------------------------------------------------------------------------------------------------------------------- 0.60s
bootstrap-os : Assign inventory name to unconfigured hostnames (non-CoreOS) ------------------------------------------------------------------ 0.59s

text vagrantfile

vagrantfile

gistfile1.txt
config.vm.provider "virtualbox" do |vb|
        vb.customize ["modifyvm", :id, "--cableconnected1", "on"]
    end